SlideShare uma empresa Scribd logo
1 de 43
Ehtisham Murtaza
19011556-030
Saad Ahmad
19011556-001
Mirza Umair
19011556-002
Group No:6
Routing Protocols
Routing
Protocols
 Routing protocols are the set of rules used by the the
routers to communicate with the source and the destination.
 Routing protocols don’t move the information from source
to destination they only updates the routing tables.
 Each protocol has its own algorithm to choose the best
path.
 Main Goals of Routing Protocols To fill the routing table
with current best, loop-free routes To notice when routes in
the table are no longer valid and remove them from the
routing table To add new routes or replace lost routes
The time for finding a working route is called convergence.
Types of
Routing Protocols
Static Routing:
When administrator manually assigns the path from
source to destination network.
Dynamic Routing:
Dynamic routing is the process in which the routing
tables are the automatically updated by the routers.
Static Routing
 Manually adding routes to the routing table.
 Routes through data networks are assigned fix
paths.
 Usually entered by network administrator.
 Routing table are maintained and updated
manually.
Static Routing
ADVANTAGES
 Minimal CPU processing
 Easier for administrator to understand
 Easy to configure
DISADVANTAGES
 Configuration and maintenance are time-consuming.
 Configuration is error-prone, especially in large
networks.
 Administrator intervention is required to maintain
changing route information.
 Does not scale well with growing networks;
maintenance becomes cumbersome.
 Requires complete knowledge of the entire network
for proper implementation.
Dynamic Routing
 Discover Remote Path
 Maintain Up-date Routing information
Choosing the best path to the
destination
 Ability to find the new path if current
path is not available
Dynamic Routing
ADVANTAGES
 Administrator has less work in maintaining
the configuration when adding or deleting
networks.
 Protocols automatically react to the topology
changes.
 Configuration is less error-prone.
 More scalable; growing the network usually
does not present a problem.
DISADVANTAGES
 Router resources are used (CPU cycles,
memory, and link bandwidth).
 More administrator knowledge is required
for configuration, verification, and
troubleshooting.
Autonomous
System
 As is the collection of the networks under the
common administration and sharing a common
routing strategy.
 AS divides the global networks into the smaller and
more meaningful networks.
 Each As has its own set of rules and policies.
 The AS number uniquely differ it from other AS in
the word.
Types of Dynamic Routing
INTERIOR GATEWAY PROTOCOLS (IGP): EXTERIOR GATEWAY PROTOCOLS (EGP):
 Used for routing between autonomous
systems. It is also referred to a inter-AS
routing.
 Service providers and large companies may
interconnect using an EGP.
The Border Gateway Protocol (BGP) is the
only currently viable EGP and is the official
routing protocol used by the Internet.
 Used for routing within an AS. It is also
referred to as intra-AS routing.
Companies, organizations, and even
service providers use an IGP on their
internal networks.
 IGPs include RIP, EIGRP, OSPF, and IS-IS.
Distance Vector Routing Algorithm
Routing algorithms are meant for determining the routing of packets in a node.
The Distance vector algorithm is iterative, asynchronous and distributed.
◦ Distributed: It is distributed in that each node receives information from one or more of its directly attached
neighbors, performs calculation and then distributes the result back to its neighbors.
◦ Iterative: It is iterative in that its process continues until no more information is available to be exchanged
between neighbors.
◦ Asynchronous: It does not require that all of its nodes operate in the lock step with each other.
The Distance vector algorithm is a dynamic algorithm.
It is mainly used in ARPANET, and RIP.
Each router maintains a distance table known as Vector.
Three Keys to understand the working
of Distance Vector Routing Algorithm
Knowledge about the whole network: Each router shares its knowledge through the
entire network. The Router sends its collected knowledge about the network to its
neighbors.
Routing only to neighbors: The router sends its knowledge about the network to only
those routers which have direct links. The router sends whatever it has about the
network through the ports. The information is received by the router and uses the
information to update its own routing table.
Information sharing at regular intervals: Within 30 seconds, the router sends the
information to the neighboring routers.
Distance Vector Routing Example
Consider-
There is a network consisting of 4 routers.
The weights are mentioned on the edges.
Weights could be distances or costs or delays.
Step-01:
Each router prepares its routing table using its local knowledge.
Routing table prepared by each router is shown below-
At Router A- A Router B-
Destination Distance Next Hop
A 0 A
B 2 B
C ∞ –
D 1 D
Destination Distance Next Hop
A 2 A
B 0 B
C 3 C
D 7 D
At Router C- At Router D-
Destination Distance Next Hop
A ∞ –
B 3 B
C 0 C
D 11 D
Destination Distance Next Hop
A 1 A
B 7 B
C 11 C
D 0 D
Step-02:
Each router exchanges its distance vector obtained in Step-01 with its neighbors.
After exchanging the distance vectors, each router prepares a new routing table.
This is shown below-
At Router A-
Router A receives distance vectors from its neighbors B and D.
Router A prepares a new routing table as-
Cost of reaching destination B from router A = min { 2+0 , 1+7 } = 2 via B.
Cost of reaching destination C from router A = min { 2+3 , 1+11 } = 5 via B.
Cost of reaching destination D from router A = min { 2+7 , 1+0 } = 1 via D.
Thus, the new routing table at router A is-
Destination Distance Next Hop
A 0 A
B 2 B
C 5 B
D 1 D
At Router B-
Router B receives distance vectors from its neighbors A, C and D.
Router B prepares a new routing table as-
•Cost of reaching destination A from router B = min { 2+0 , 3+∞ , 7+1 } = 2 via A.
•Cost of reaching destination C from router B = min { 2+∞ , 3+0 , 7+11 } = 3 via C.
•Cost of reaching destination D from router B = min { 2+1 , 3+11 , 7+0 } = 3 via A
Thus, the new routing table at router B is-
At Router C-
•Router C receives distance vectors from its
neighbors B and D.
•Router C prepares a new routing table as
Destination Distance Next Hop
A 2 A
B 0 B
C 3 C
D 3 A
Cost of reaching destination A from router C = min { 3+2 , 11+1 } = 5 via
B.
Cost of reaching destination B from router C = min { 3+0 , 11+7 } = 3 via B.
Cost of reaching destination D from router C = min { 3+7 , 11+0 } = 10 via
B
Thus, the new routing table at router C is-
Destination Distance Next Hop
A 5 B
B 3 B
C 0 C
D 10 B
At Router D
•Router D receives distance vectors from its neighbors A, B and C.
•Router D prepares a new routing table as-
•Cost of reaching destination A from router D = min { 1+0 , 7+2 , 11+∞ } = 1 via A.
•Cost of reaching destination B from router D = min { 1+2 , 7+0 , 11+3 } = 3 via A.
•Cost of reaching destination C from router D = min { 1+∞ , 7+3 , 11+0 } = 10 via B.
Thus, the new routing table at router D is-
Step-03:
Each router exchanges its distance vector obtained in Step-02 with its neighboring routers
After exchanging the distance vectors, each router prepares a new routing table
At Router A-
Router A receives distance vectors from its neighbors B
and D.
Router A prepares a new routing table as
Destination Distance Next Hop
A 1 A
B 3 A
C 10 B
D 0 D
Cost of reaching destination B from router A = min { 2+0 , 1+3 } = 2 via B
Cost of reaching destination C from router A = min { 2+3 , 1+10 } = 5 via B
Cost of reaching destination D from router A = min { 2+3 , 1+0 } = 1 via D
Thus, the new routing table at router A is-
Destination Distance Next Hop
A 0 A
B 2 B
C 5 B
D 1 D
At Router B-
Router B receives distance vectors from its neighbors A, C and D.
Router B prepares a new routing table as-
Cost of reaching destination A from router B = min { 2+0 , 3+5 , 3+1 } = 2 via A.
Cost of reaching destination C from router B = min { 2+5 , 3+0 , 3+10 } = 3 via
Cost of reaching destination D from router B = min { 2+1 , 3+10 , 3+0 } = 3 via A
Thus, the new routing table at router B is-
At Router C-
Router C receives distance vectors from its
neighbors B and D.
Router C prepares a new routing table as Destination Distance Next Hop
A 2 A
B 0 B
C 3 C
D 3 A
Cost of reaching destination A from router C = min { 3+2 , 10+1 } = 5 via B.
Cost of reaching destination B from router C = min { 3+0 , 10+3 } = 3 via B.
Cost of reaching destination D from router C = min { 3+3 , 10+0 } = 6 via B.
Thus, the new routing table at router C is-
At Router D-
Router D receives distance vectors from its neighbors A, B
and C
Router D prepares a new
routing table as-
Destination Distance Next Hop
A 5 B
B 3 B
C 0 C
D 6 B
Cost of reaching destination A from router D = min { 1+0 , 3+2 , 10+5 } = 1 via A.
Cost of reaching destination B from router D = min { 1+2 , 3+0 , 10+3 } = 3 via A.
Cost of reaching destination C from router D = min { 1+5 , 3+3 , 10+0 } = 6 via A
Thus, the new routing table at router D is
These will be the final routing tables at each router.
Destination Distance Next Hop
A 1 A
B 3 A
C 6 A
D 0 D
Link State Algorithm
Basic idea: Distribute to all routers
◦ Cost of each link in the network
Each router independently computes optimal paths
◦ From itself to every destination
◦ Routes are guaranteed to be loop free if
◦ Each router sees the same cost for each link
◦ Uses the same algorithm to compute the best path
Topology Dissemination
Each router creates a set of link state packets (LSPs)
◦ Describing its links to neighbors
◦ LSP contains
◦ Router id, neighbor’s id, and cost to its neighbor
Copies of LSPs are distributed to all routers
◦ Using controlled flooding
Each router maintains a topology database
◦ Database containing all LSPs
Dijkstra’s Algorithm
Given the network topology
◦ How to compute shortest path to each destination?
Some notation
◦ X: source node
◦ N: set of nodes to which shortest paths are known so far
◦ N is initially empty
◦ D(V): cost of known shortest path from source X from V
◦ C(U,V): cost of link U to V
◦ C(U,V) =  if not neighbors
Algorithm (at Node X)
Initialization
◦ N = {X}
◦ For all nodes V
◦ If V adjacent to X, D(V) = C(X,V) else D(V) = 
Loop
◦ Find U not in N such that D(U) is smallest
◦ Add U into set N
◦ Update D(V) for all V not in N
◦ D(V) = min{D(V), D(U) + C(U,V)}
◦ Until all nodes in N
Let’s take a look at an example
Sample network
A
E
D
C
B
F
2
2
1
3
1
1
2
5
3
5
Step
0
1
2
3
4
start N
A
Dijkstra’s Algorithm:
Initialization for Node A
A
E
D
C
B
F
2
2
1
3
1
1
2
5
3
5
D(x) is distance/cost to x
p(x) is path to x
D(B),p(B)
2,A
D(C),p(C)
5,A
D(D),p(D)
1,A
D(E),p(E)
infinity
D(F),p(F)
infinity
Dijkstra’s algorithm: example
Step
0
1
2
3
4
start N
A
AD
D(B),p(B)
2,A
2,A
D(C),p(C)
5,A
4,D
D(D),p(D)
1,A
D(E),p(E)
infinity
2,D
D(F),p(F)
infinity
infinity
A
E
D
C
B
F
2
2
1
3
1
1
2
5
3
5
Now we select the node with the
shortest distance to add to set N.
Then we update distances of other
nodes if they can be made shorter going
through D.
Dijkstra’s algorithm: example
Step
0
1
2
3
4
start N
A
AD
ADB
D(B),p(B)
2,A
2,A
D(C),p(C)
5,A
4,D
4,D
D(D),p(D)
1,A
D(E),p(E)
infinity
2,D
2,D
D(F),p(F)
infinity
infinity
Infinity-
A
E
D
C
B
F
2
2
1
3
1
1
2
5
3
5
B has the next shortest distance
from A, so we add it to set N.
(could have been E..)
Then we update distances of other
nodes if they can be made shorter
going through B…
Dijkstra’s algorithm: example
Step
0
1
2
3
4
start N
A
AD
ADB
ADBE
D(B),p(B)
2,A
2,A
D(C),p(C)
5,A
4,D
4,D
3,E
D(D),p(D)
1,A
D(E),p(E)
infinity
2,D
2,D
D(F),p(F)
infinity
infinity
infinity
4,E
A
E
D
C
B
F
2
2
1
3
1
1
2
5
3
5
Dijkstra’s algorithm: example
Step
0
1
2
3
4
start N
A
AD
ADB
ADBE
ADBEC
D(B),p(B)
2,A
2,A
2,A
D(C),p(C)
5,A
4,D
4,D
3,E
D(D),p(D)
1,A
D(E),p(E)
infinity
2,D
2,D
D(F),p(F)
infinity
infinity
infinity
4,E
4,E
A
E
D
C
B
F
2
2
1
3
1
1
2
5
3
5
Dijkstra’s algorithm: example
Step
0
1
2
3
4
5
start N
A
AD
ADB
ADBE
ADBEC
ADBECF
D(B),p(B)
2,A
2,A
2,A
D(C),p(C)
5,A
4,D
4,D
3,E
D(D),p(D)
1,A
D(E),p(E)
infinity
2,D
2,D
D(F),p(F)
infinity
infinity
infinity
4,E
4,E
A
E
D
C
B
F
2
2
1
3
1
1
2
5
3
5
This process terminates after all the
nodes are added to N.
Distance vector and link state routing protocols are not
suitable for interdomain routing because of scalability
There is a need for a third routing protocol which we call
path vector routing.
Path vector routing proved to be useful for interdomain
routing.
 Is similar to distance vector routing.
 Assuming that there is one node in each AS that acts as
on behalf of the entire AS.
Speaker Node
 Speaker node creates a routing table and advertises it
speaker nodes in the neighboring.
Path Vector Routing
 The difference between the distance vector routing and
path vector routing can be compared to the difference
between a national map. A national map can tell us the road
to each city and the distance to be travelled if we choose a
particular route an international map can tell us which cities
exist in each country and which countries should be passed
before reaching that city.
Path Vector Routing
AS2 AS4
At the beginning, each speaker node can know only the reachable of nodes inside its
autonomous system.
 Node Al is the speaker node for ASI, Bl for AS2, Cl for AS3, and DI for AS4
Node Al creates an initial table that shows Al to A5 are located in ASI and
can be reached through it. Node BI advertises that BI to B4 are located in
AS2 and can be reached through Bl. And so on.
 a speaker in an autonomous system shares its table with immediate neighbors.
 When a speaker node receives a two-column table from a neighbor, it updates its
own table by adding the nodes that are not in its routing table
Path Vector Routing
Stabilized Tables For Three AS
Path Vector Routing
 Loop prevention
o The instability of distance vector routing and creation of loops can be
avoided in path vector routing
o When a router receives a message, it checks to see if its autonomous
system is in the path list to the destination
o If it is, looping is involved, and the message is ignored
 Policy routing
o Can be easily implemented through path vector routing
o If one of the autonomous systems listed in the path is against its policy,
it can ignore that path and that destination. It does not
 Optimum path
o The optimum path is the path that fits the organization.
o we chose the path that had the smaller number of autonomous
systems.
o For example, a path from AS4 to ASI can be AS4-AS3-AS2-AS1, or it can
be AS4-AS3-ASl

Mais conteúdo relacionado

Semelhante a Routing Protocols.pptx

Powerpoint one
Powerpoint onePowerpoint one
Powerpoint onepqatester
 
Powerpoint one
Powerpoint onePowerpoint one
Powerpoint onepqatester
 
Computer networking presentation
Computer networking presentationComputer networking presentation
Computer networking presentationMd. Touhidur Rahman
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTINGanilinvns
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptxsazia7
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdfmrcopyxerox
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routingHamzahMohammed4
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
routing algorithm
routing algorithmrouting algorithm
routing algorithmAnusuaBasu
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing ProtocolsBIT DURG
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptxHirazNor
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmSiva Priya
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocolselvakumar_b1985
 

Semelhante a Routing Protocols.pptx (20)

Powerpoint one
Powerpoint onePowerpoint one
Powerpoint one
 
Powerpoint one
Powerpoint onePowerpoint one
Powerpoint one
 
Computer networking presentation
Computer networking presentationComputer networking presentation
Computer networking presentation
 
Notes
NotesNotes
Notes
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
computer communications
computer communicationscomputer communications
computer communications
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routing
 
Network layer
Network layerNetwork layer
Network layer
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
 
routing algorithm
routing algorithmrouting algorithm
routing algorithm
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 

Mais de HirazNor

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxHirazNor
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
 
Folk Media Lec 14.pptx
Folk Media Lec 14.pptxFolk Media Lec 14.pptx
Folk Media Lec 14.pptxHirazNor
 
AI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxAI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxHirazNor
 
AI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxAI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxHirazNor
 
C3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxC3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxHirazNor
 
Lecture 15.ppt
Lecture 15.pptLecture 15.ppt
Lecture 15.pptHirazNor
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptxHirazNor
 
W09-L01.pptx
W09-L01.pptxW09-L01.pptx
W09-L01.pptxHirazNor
 
hafsa 24.pptx
hafsa 24.pptxhafsa 24.pptx
hafsa 24.pptxHirazNor
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptxHirazNor
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxHirazNor
 

Mais de HirazNor (12)

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Folk Media Lec 14.pptx
Folk Media Lec 14.pptxFolk Media Lec 14.pptx
Folk Media Lec 14.pptx
 
AI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxAI-Lec2-Agents.pptx
AI-Lec2-Agents.pptx
 
AI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxAI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptx
 
C3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxC3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptx
 
Lecture 15.ppt
Lecture 15.pptLecture 15.ppt
Lecture 15.ppt
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
W09-L01.pptx
W09-L01.pptxW09-L01.pptx
W09-L01.pptx
 
hafsa 24.pptx
hafsa 24.pptxhafsa 24.pptx
hafsa 24.pptx
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptx
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptx
 

Último

Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 

Último (20)

Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 

Routing Protocols.pptx

  • 1. Ehtisham Murtaza 19011556-030 Saad Ahmad 19011556-001 Mirza Umair 19011556-002 Group No:6 Routing Protocols
  • 2. Routing Protocols  Routing protocols are the set of rules used by the the routers to communicate with the source and the destination.  Routing protocols don’t move the information from source to destination they only updates the routing tables.  Each protocol has its own algorithm to choose the best path.  Main Goals of Routing Protocols To fill the routing table with current best, loop-free routes To notice when routes in the table are no longer valid and remove them from the routing table To add new routes or replace lost routes The time for finding a working route is called convergence.
  • 3. Types of Routing Protocols Static Routing: When administrator manually assigns the path from source to destination network. Dynamic Routing: Dynamic routing is the process in which the routing tables are the automatically updated by the routers.
  • 4. Static Routing  Manually adding routes to the routing table.  Routes through data networks are assigned fix paths.  Usually entered by network administrator.  Routing table are maintained and updated manually.
  • 5. Static Routing ADVANTAGES  Minimal CPU processing  Easier for administrator to understand  Easy to configure DISADVANTAGES  Configuration and maintenance are time-consuming.  Configuration is error-prone, especially in large networks.  Administrator intervention is required to maintain changing route information.  Does not scale well with growing networks; maintenance becomes cumbersome.  Requires complete knowledge of the entire network for proper implementation.
  • 6. Dynamic Routing  Discover Remote Path  Maintain Up-date Routing information Choosing the best path to the destination  Ability to find the new path if current path is not available
  • 7. Dynamic Routing ADVANTAGES  Administrator has less work in maintaining the configuration when adding or deleting networks.  Protocols automatically react to the topology changes.  Configuration is less error-prone.  More scalable; growing the network usually does not present a problem. DISADVANTAGES  Router resources are used (CPU cycles, memory, and link bandwidth).  More administrator knowledge is required for configuration, verification, and troubleshooting.
  • 8. Autonomous System  As is the collection of the networks under the common administration and sharing a common routing strategy.  AS divides the global networks into the smaller and more meaningful networks.  Each As has its own set of rules and policies.  The AS number uniquely differ it from other AS in the word.
  • 9. Types of Dynamic Routing INTERIOR GATEWAY PROTOCOLS (IGP): EXTERIOR GATEWAY PROTOCOLS (EGP):  Used for routing between autonomous systems. It is also referred to a inter-AS routing.  Service providers and large companies may interconnect using an EGP. The Border Gateway Protocol (BGP) is the only currently viable EGP and is the official routing protocol used by the Internet.  Used for routing within an AS. It is also referred to as intra-AS routing. Companies, organizations, and even service providers use an IGP on their internal networks.  IGPs include RIP, EIGRP, OSPF, and IS-IS.
  • 10. Distance Vector Routing Algorithm Routing algorithms are meant for determining the routing of packets in a node. The Distance vector algorithm is iterative, asynchronous and distributed. ◦ Distributed: It is distributed in that each node receives information from one or more of its directly attached neighbors, performs calculation and then distributes the result back to its neighbors. ◦ Iterative: It is iterative in that its process continues until no more information is available to be exchanged between neighbors. ◦ Asynchronous: It does not require that all of its nodes operate in the lock step with each other.
  • 11. The Distance vector algorithm is a dynamic algorithm. It is mainly used in ARPANET, and RIP. Each router maintains a distance table known as Vector.
  • 12. Three Keys to understand the working of Distance Vector Routing Algorithm Knowledge about the whole network: Each router shares its knowledge through the entire network. The Router sends its collected knowledge about the network to its neighbors. Routing only to neighbors: The router sends its knowledge about the network to only those routers which have direct links. The router sends whatever it has about the network through the ports. The information is received by the router and uses the information to update its own routing table. Information sharing at regular intervals: Within 30 seconds, the router sends the information to the neighboring routers.
  • 13. Distance Vector Routing Example Consider- There is a network consisting of 4 routers. The weights are mentioned on the edges. Weights could be distances or costs or delays.
  • 14. Step-01: Each router prepares its routing table using its local knowledge. Routing table prepared by each router is shown below- At Router A- A Router B- Destination Distance Next Hop A 0 A B 2 B C ∞ – D 1 D Destination Distance Next Hop A 2 A B 0 B C 3 C D 7 D
  • 15. At Router C- At Router D- Destination Distance Next Hop A ∞ – B 3 B C 0 C D 11 D Destination Distance Next Hop A 1 A B 7 B C 11 C D 0 D
  • 16. Step-02: Each router exchanges its distance vector obtained in Step-01 with its neighbors. After exchanging the distance vectors, each router prepares a new routing table. This is shown below- At Router A- Router A receives distance vectors from its neighbors B and D. Router A prepares a new routing table as-
  • 17. Cost of reaching destination B from router A = min { 2+0 , 1+7 } = 2 via B. Cost of reaching destination C from router A = min { 2+3 , 1+11 } = 5 via B. Cost of reaching destination D from router A = min { 2+7 , 1+0 } = 1 via D. Thus, the new routing table at router A is- Destination Distance Next Hop A 0 A B 2 B C 5 B D 1 D
  • 18. At Router B- Router B receives distance vectors from its neighbors A, C and D. Router B prepares a new routing table as- •Cost of reaching destination A from router B = min { 2+0 , 3+∞ , 7+1 } = 2 via A. •Cost of reaching destination C from router B = min { 2+∞ , 3+0 , 7+11 } = 3 via C. •Cost of reaching destination D from router B = min { 2+1 , 3+11 , 7+0 } = 3 via A
  • 19. Thus, the new routing table at router B is- At Router C- •Router C receives distance vectors from its neighbors B and D. •Router C prepares a new routing table as Destination Distance Next Hop A 2 A B 0 B C 3 C D 3 A
  • 20. Cost of reaching destination A from router C = min { 3+2 , 11+1 } = 5 via B. Cost of reaching destination B from router C = min { 3+0 , 11+7 } = 3 via B. Cost of reaching destination D from router C = min { 3+7 , 11+0 } = 10 via B Thus, the new routing table at router C is- Destination Distance Next Hop A 5 B B 3 B C 0 C D 10 B
  • 21. At Router D •Router D receives distance vectors from its neighbors A, B and C. •Router D prepares a new routing table as- •Cost of reaching destination A from router D = min { 1+0 , 7+2 , 11+∞ } = 1 via A. •Cost of reaching destination B from router D = min { 1+2 , 7+0 , 11+3 } = 3 via A. •Cost of reaching destination C from router D = min { 1+∞ , 7+3 , 11+0 } = 10 via B.
  • 22. Thus, the new routing table at router D is- Step-03: Each router exchanges its distance vector obtained in Step-02 with its neighboring routers After exchanging the distance vectors, each router prepares a new routing table At Router A- Router A receives distance vectors from its neighbors B and D. Router A prepares a new routing table as Destination Distance Next Hop A 1 A B 3 A C 10 B D 0 D
  • 23. Cost of reaching destination B from router A = min { 2+0 , 1+3 } = 2 via B Cost of reaching destination C from router A = min { 2+3 , 1+10 } = 5 via B Cost of reaching destination D from router A = min { 2+3 , 1+0 } = 1 via D Thus, the new routing table at router A is- Destination Distance Next Hop A 0 A B 2 B C 5 B D 1 D
  • 24. At Router B- Router B receives distance vectors from its neighbors A, C and D. Router B prepares a new routing table as- Cost of reaching destination A from router B = min { 2+0 , 3+5 , 3+1 } = 2 via A. Cost of reaching destination C from router B = min { 2+5 , 3+0 , 3+10 } = 3 via Cost of reaching destination D from router B = min { 2+1 , 3+10 , 3+0 } = 3 via A
  • 25. Thus, the new routing table at router B is- At Router C- Router C receives distance vectors from its neighbors B and D. Router C prepares a new routing table as Destination Distance Next Hop A 2 A B 0 B C 3 C D 3 A
  • 26. Cost of reaching destination A from router C = min { 3+2 , 10+1 } = 5 via B. Cost of reaching destination B from router C = min { 3+0 , 10+3 } = 3 via B. Cost of reaching destination D from router C = min { 3+3 , 10+0 } = 6 via B. Thus, the new routing table at router C is- At Router D- Router D receives distance vectors from its neighbors A, B and C Router D prepares a new routing table as- Destination Distance Next Hop A 5 B B 3 B C 0 C D 6 B
  • 27. Cost of reaching destination A from router D = min { 1+0 , 3+2 , 10+5 } = 1 via A. Cost of reaching destination B from router D = min { 1+2 , 3+0 , 10+3 } = 3 via A. Cost of reaching destination C from router D = min { 1+5 , 3+3 , 10+0 } = 6 via A Thus, the new routing table at router D is These will be the final routing tables at each router. Destination Distance Next Hop A 1 A B 3 A C 6 A D 0 D
  • 28. Link State Algorithm Basic idea: Distribute to all routers ◦ Cost of each link in the network Each router independently computes optimal paths ◦ From itself to every destination ◦ Routes are guaranteed to be loop free if ◦ Each router sees the same cost for each link ◦ Uses the same algorithm to compute the best path
  • 29. Topology Dissemination Each router creates a set of link state packets (LSPs) ◦ Describing its links to neighbors ◦ LSP contains ◦ Router id, neighbor’s id, and cost to its neighbor Copies of LSPs are distributed to all routers ◦ Using controlled flooding Each router maintains a topology database ◦ Database containing all LSPs
  • 30. Dijkstra’s Algorithm Given the network topology ◦ How to compute shortest path to each destination? Some notation ◦ X: source node ◦ N: set of nodes to which shortest paths are known so far ◦ N is initially empty ◦ D(V): cost of known shortest path from source X from V ◦ C(U,V): cost of link U to V ◦ C(U,V) =  if not neighbors
  • 31. Algorithm (at Node X) Initialization ◦ N = {X} ◦ For all nodes V ◦ If V adjacent to X, D(V) = C(X,V) else D(V) =  Loop ◦ Find U not in N such that D(U) is smallest ◦ Add U into set N ◦ Update D(V) for all V not in N ◦ D(V) = min{D(V), D(U) + C(U,V)} ◦ Until all nodes in N
  • 32. Let’s take a look at an example Sample network A E D C B F 2 2 1 3 1 1 2 5 3 5
  • 33. Step 0 1 2 3 4 start N A Dijkstra’s Algorithm: Initialization for Node A A E D C B F 2 2 1 3 1 1 2 5 3 5 D(x) is distance/cost to x p(x) is path to x D(B),p(B) 2,A D(C),p(C) 5,A D(D),p(D) 1,A D(E),p(E) infinity D(F),p(F) infinity
  • 34. Dijkstra’s algorithm: example Step 0 1 2 3 4 start N A AD D(B),p(B) 2,A 2,A D(C),p(C) 5,A 4,D D(D),p(D) 1,A D(E),p(E) infinity 2,D D(F),p(F) infinity infinity A E D C B F 2 2 1 3 1 1 2 5 3 5 Now we select the node with the shortest distance to add to set N. Then we update distances of other nodes if they can be made shorter going through D.
  • 35. Dijkstra’s algorithm: example Step 0 1 2 3 4 start N A AD ADB D(B),p(B) 2,A 2,A D(C),p(C) 5,A 4,D 4,D D(D),p(D) 1,A D(E),p(E) infinity 2,D 2,D D(F),p(F) infinity infinity Infinity- A E D C B F 2 2 1 3 1 1 2 5 3 5 B has the next shortest distance from A, so we add it to set N. (could have been E..) Then we update distances of other nodes if they can be made shorter going through B…
  • 36. Dijkstra’s algorithm: example Step 0 1 2 3 4 start N A AD ADB ADBE D(B),p(B) 2,A 2,A D(C),p(C) 5,A 4,D 4,D 3,E D(D),p(D) 1,A D(E),p(E) infinity 2,D 2,D D(F),p(F) infinity infinity infinity 4,E A E D C B F 2 2 1 3 1 1 2 5 3 5
  • 37. Dijkstra’s algorithm: example Step 0 1 2 3 4 start N A AD ADB ADBE ADBEC D(B),p(B) 2,A 2,A 2,A D(C),p(C) 5,A 4,D 4,D 3,E D(D),p(D) 1,A D(E),p(E) infinity 2,D 2,D D(F),p(F) infinity infinity infinity 4,E 4,E A E D C B F 2 2 1 3 1 1 2 5 3 5
  • 38. Dijkstra’s algorithm: example Step 0 1 2 3 4 5 start N A AD ADB ADBE ADBEC ADBECF D(B),p(B) 2,A 2,A 2,A D(C),p(C) 5,A 4,D 4,D 3,E D(D),p(D) 1,A D(E),p(E) infinity 2,D 2,D D(F),p(F) infinity infinity infinity 4,E 4,E A E D C B F 2 2 1 3 1 1 2 5 3 5 This process terminates after all the nodes are added to N.
  • 39. Distance vector and link state routing protocols are not suitable for interdomain routing because of scalability There is a need for a third routing protocol which we call path vector routing. Path vector routing proved to be useful for interdomain routing.  Is similar to distance vector routing.  Assuming that there is one node in each AS that acts as on behalf of the entire AS. Speaker Node  Speaker node creates a routing table and advertises it speaker nodes in the neighboring. Path Vector Routing
  • 40.  The difference between the distance vector routing and path vector routing can be compared to the difference between a national map. A national map can tell us the road to each city and the distance to be travelled if we choose a particular route an international map can tell us which cities exist in each country and which countries should be passed before reaching that city. Path Vector Routing
  • 41. AS2 AS4 At the beginning, each speaker node can know only the reachable of nodes inside its autonomous system.  Node Al is the speaker node for ASI, Bl for AS2, Cl for AS3, and DI for AS4 Node Al creates an initial table that shows Al to A5 are located in ASI and can be reached through it. Node BI advertises that BI to B4 are located in AS2 and can be reached through Bl. And so on.  a speaker in an autonomous system shares its table with immediate neighbors.  When a speaker node receives a two-column table from a neighbor, it updates its own table by adding the nodes that are not in its routing table Path Vector Routing
  • 43. Path Vector Routing  Loop prevention o The instability of distance vector routing and creation of loops can be avoided in path vector routing o When a router receives a message, it checks to see if its autonomous system is in the path list to the destination o If it is, looping is involved, and the message is ignored  Policy routing o Can be easily implemented through path vector routing o If one of the autonomous systems listed in the path is against its policy, it can ignore that path and that destination. It does not  Optimum path o The optimum path is the path that fits the organization. o we chose the path that had the smaller number of autonomous systems. o For example, a path from AS4 to ASI can be AS4-AS3-AS2-AS1, or it can be AS4-AS3-ASl