SlideShare a Scribd company logo
1 of 31
Routing
George Coularis, Jean Dollimore
and Tim Kindberg
portions from George Blank

NJIT
Routing


Except for LANS like Ethernet that provide direct
connections between all hosts, networks require a
process called routing to identify a path for
communications to travel between nodes. In large
networks, adaptive routing is used, analyzing the
best path between nodes periodically to avoid
congestion and faults such as broken connections.
Routing on a network is the collective
responsibility of the routers located at connection
points between networks or subnets.
A Small Personal Router


The Linksys EtherFast®
Cable/DSL Router
connects the Internet to
a home or small office
Ethernet LAN of up to 4
computers or other
devices. It is combined
with an Ethernet
connection switch to
link the devices.

List Price: about $80 in 2006
A Large CISCO Router




The Cisco uBR10012
Universal Broadband
Router shown here
supports 64,000
subscribers.
It is a powerful
commercial router
that cost about
$20,000 in 2006.
Routing Algorithms


Determining the best path between network
nodes is done by routing algorithms. A routing
algorithm has two parts:
 Determine the path taken by each packet in
an efficient manner to avoid degrading
network performance
 Monitor traffic and changes to the network to
maintain information on the best paths
through the network
Localized Routing




Routing algorithms are distributed through the
network. Each router reads the address of each
packet and decides where to send that packet next.
Locally held information at each router includes the
status of its direct links including information on
congestion and link failures.
Link tables include various routings and their current
known cost in terms of the number of hops to get to
a particular destination. An algorithm seeking a path
to a new destination can request information from
other routers.
Timeouts


The Internet uses a timeout mechanism to
identify a message connection failure. It uses a
default timing such as 256 seconds. The same
number may be used as a hop counter. A router
decrements a counter by 1 each time a packet
passes through a router. If the counter reaches
zero the packet is discarded. If the originating
system does not receive a response within the
designated time, a 404 error is displayed.
Routing on a local sub net


Packets addressed to hosts on the same
network are transmitted to the destination
in a single hop. Otherwise the packets
must be sent to a router for transmission.
Routing Algorithm Example


The Coulouris text shows a sample network (figure
3.7) and routing table (figure 3.8) and discusses a
simple routing algorithm in section 3.3. Those
slides are shown following this one, but are difficult
to use in class because they require frequent
switching back and forth between slides to
understand the process. Students are expected to
understand that example well enough to explain
routing algorithms on a test.
Figure 3.7 Network Diagram
A
Hosts
or local
networks

1

3

B
2

Links

4

C
5

D

6

E
Routers

Coulouris et al
Figure 3.8 Link Table
Routings from A
To
Link
Cost
A
local
0
B
1
1
C
1
2
D
3
1
E
1
2

Coulouris et al

Routings from B
To
Link
Cost
A
1
1
B
local
0
C
2
1
D
1
2
E
4
1

Routings from D
To
Link
Cost
A
3
1
B
3
2
C
6
2
D
local
0
E
6
1

Routings from C
To
Link
Cost
A
2
2
B
2
1
C
local
0
D
5
2
E
5
1

Routings from E
To
Link
Cost
A
4
2
B
4
1
C
5
1
D
6
1
E
local
0
Figure 3.9 Routing Algorithm
part 1
Send: Each t seconds or when Tl changes, send Tl on
each non-faulty outgoing link.
Receive: Whenever a routing table Tr is received on
link n:
for all rows Rr in Tr {
if (Rr.link | n) {
Rr.cost = Rr.cost + 1;
Rr.link = n;
if (Rr.destination is not in Tl) add Rr to
Tl;
// add new destination to Tl (Continued…)
Figure 3.9 Routing Algorithm
part 2
else for all rows Rl in Tl {
if (Rr.destination = Rl.destination and
(Rr.cost < Rl.cost or Rl.link = n)) Rl
= Rr;
// Rr.cost < Rl.cost : remote node has
better route
// Rl.link = n : remote node is more
authoritative
}
}
}

Coulouris et al
Routing Table Animation
B
A
C

D
E
F
G

Routings From A
To Link Cost
A Local 0∞
B
1∞
B
B
2∞
C
D
E
2∞
E
1∞
E
F
E
3∞
G E
4∞
Fault Handling


When a router detects a broken link or similar
failure, it reacts by setting the cost to reach that
link to infinity. This cost will propagate to
neighboring nodes until a node is reached where
a link is active and therefore has a smaller cost.
This will propagate back through neighboring
router tables to create a new shortest path to the
nodes that were connected through the broken
link.
Network Congestion


When the load at any particular link reaches
capacity, nodes trying to send traffic through that
link will find their traffic blocked. This results in
available buffer space filling up until nodes must
refuse traffic and discard incoming packets. If
this condition is temporary, it is self correcting as
dropped packets are retransmitted. However, if
congestion is substantial or prolonged, the effect
on network performance is catastrophic.
Congestion Control




In general, the approach to controlling congestion is
to inform nodes along the route that congestion is
occurring and requesting those nodes to reduce
their rate of packet transmission.
On the Internet, a large portion of packets are
derived from human interaction, and people
become frustrated and cease making requests to
overly busy nodes, which reduces congestion. In
some cases, denial of service attacks have
deliberately congested prominent Internet sites.
Firewalls


With the Internet consisting of many nodes
operated by many people, security problems are
inevitable. Commercial enterprises would not wish
employees access to gambling and pornography
during working hours. Many trade secrets are in
company files, and industrial espionage must be
discourages. Viruses, denial of service attacks and
other threats must be contained. One approach to
these problems is to isolate a more trusted domain
from the rest of the Internet. This is done with
hardware and software “firewalls.”
Firewall Security Policies





Service Control: Permit some Internet services
to be accessed and deny others.
Behavior Control: Deny activities that violate
the organization’s policies or which open the
organization to attack or compromise.
User Control: Allow only properly identified
persons access to the network, ensure that any
identified users can only access resources that
are permitted to perform their jobs, and keep
audit records to identify improper activities.
Implementing a Firewall




Firewalls use different ways to identify
threats:
 IP Packet Filtering
 TCP Gateways
 Application Level Gateways
Gateways are often implemented on
separate computers referred to as
bastions.
IP Packet Filters


Packet filters look at address and service
fields in packet headers and block packets
that are addressed to blocked addresses or
are otherwise likely to be problems. They
may block particular ports known to be used
by problematic services. For example, a
firewall may prevent use of NFS servers by
external clients by blocking port 2049.
A Software Filter
TCP Gateway


A TCP Gateway process checks all
requests to connect or transmit data. It
ensures that TCP segments are formatted
correctly and that the connections can be
controlled. If desired, the connection
requests are then passed to an
application-level gateway for content
checking.
Application Level Gateway


An Application Level Gateway acts as a
proxy for an application process. For
example, if an application wants to perform
an action like making a connection, it can
request the Gateway to do that instead. By
denying direct access to the activity, the
Gateway can verify addresses and data
and perform security checks.
Bastions


When gateway processes are required, they are
often run on a separate computer called a bastion
(i.e. fortress). Where security needs are strict, the
bastion can be located in a subnet that controls all
access to the protected network, with a router on
the protected network and another on the network it
is being protected from. This can hide all the
addresses and even the existence of the hosts on
the protected network from the rest of the world,
and also provides a second router if the security on
the first fails.
Figure 3.21 Firewalls
a) Filtering router
Router/
filter

Protected intranet

Internet
web/ftp
server
b) Filtering router and bastion

R/filter

Bastion

Internet
web/ftp
server

c) Screened subnet for bastion

R/filter

Internet
web/ftp
server

Coulouris et al

Bastion

R/filter
Virtual Private Networks (VPN)




The protection of a firewall boundary can be
extended beyond the protected network by use
of a Virtual Private Network. This combines
encryption, tunneling, and secure authentication
to create a protected link between secure
systems across a public network.
A VPN connection increases system overhead
and reduces throughput, so it may not be
practical if high performance is required.
A VPN Client
(details hidden for security purposes)
Classroom Team Exercise
A

B

D

C

F

E

1) Make a routing table for A
2) Revise the link as if the link from C to E was broken
Template for Exercise
Routings from A
To
Link
A
B
C
D
E
F

Cost
Bibliography






George Coularis, Jean Dollimore and Tim
Kindberg, Distributed Systems, Concepts and
Design, Addison Wesley, Fourth Edition, 2005
Figures from the Coulouris text are from the
instructor’s guide and are copyrighted by
Pearson Education 2005
Router illustrations and product information from
CISCO and Linksys Web sites

More Related Content

What's hot

What's hot (20)

CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Transport layer services (cn)
Transport layer services (cn)Transport layer services (cn)
Transport layer services (cn)
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Transport layer
Transport layer Transport layer
Transport layer
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Networks software
Networks softwareNetworks software
Networks software
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network Fundamentals
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Ch 18 intro to network layer - section 5
Ch 18   intro to network layer - section 5Ch 18   intro to network layer - section 5
Ch 18 intro to network layer - section 5
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1
 
Computer network transmission channel & topology
Computer network transmission channel & topologyComputer network transmission channel & topology
Computer network transmission channel & topology
 

Viewers also liked

Gastcollege Hanzehogeschool Groningen 10 januari 2014
Gastcollege Hanzehogeschool Groningen 10 januari 2014Gastcollege Hanzehogeschool Groningen 10 januari 2014
Gastcollege Hanzehogeschool Groningen 10 januari 2014Harold van Heeringen
 
Rpp 10 1-instalasi_gui_dan_cli_-ok_blm_print
Rpp 10 1-instalasi_gui_dan_cli_-ok_blm_printRpp 10 1-instalasi_gui_dan_cli_-ok_blm_print
Rpp 10 1-instalasi_gui_dan_cli_-ok_blm_printYang Terluka
 
Gfk banks pers_report_2004
Gfk banks pers_report_2004Gfk banks pers_report_2004
Gfk banks pers_report_2004gfkukraine
 
Penyusunan raport dan kkm
Penyusunan raport dan kkmPenyusunan raport dan kkm
Penyusunan raport dan kkmYang Terluka
 
Silabus dasar-kejuruan
Silabus dasar-kejuruanSilabus dasar-kejuruan
Silabus dasar-kejuruanYang Terluka
 
Slide dkk01 modul_merakit_pc
Slide dkk01 modul_merakit_pcSlide dkk01 modul_merakit_pc
Slide dkk01 modul_merakit_pcYang Terluka
 
Макарова А.Н. Последний звонок (сценарий праздника)
Макарова А.Н. Последний звонок (сценарий праздника)Макарова А.Н. Последний звонок (сценарий праздника)
Макарова А.Н. Последний звонок (сценарий праздника)vdohnovlennye
 
Program kerja kurikulum_2013-2014
Program kerja kurikulum_2013-2014Program kerja kurikulum_2013-2014
Program kerja kurikulum_2013-2014Yang Terluka
 
Pengumuman cpns menjadi_pns
Pengumuman cpns menjadi_pnsPengumuman cpns menjadi_pns
Pengumuman cpns menjadi_pnsYang Terluka
 
Peraturan pos-un-smpsma-smk-dan-unpk-tahun-2013
Peraturan pos-un-smpsma-smk-dan-unpk-tahun-2013Peraturan pos-un-smpsma-smk-dan-unpk-tahun-2013
Peraturan pos-un-smpsma-smk-dan-unpk-tahun-2013Yang Terluka
 
The race
The raceThe race
The racenymufti
 
Rancang setting-ulang-keamanan-wan
Rancang setting-ulang-keamanan-wanRancang setting-ulang-keamanan-wan
Rancang setting-ulang-keamanan-wanYang Terluka
 

Viewers also liked (20)

Gastcollege Hanzehogeschool Groningen 10 januari 2014
Gastcollege Hanzehogeschool Groningen 10 januari 2014Gastcollege Hanzehogeschool Groningen 10 januari 2014
Gastcollege Hanzehogeschool Groningen 10 januari 2014
 
Rpp 10 1-instalasi_gui_dan_cli_-ok_blm_print
Rpp 10 1-instalasi_gui_dan_cli_-ok_blm_printRpp 10 1-instalasi_gui_dan_cli_-ok_blm_print
Rpp 10 1-instalasi_gui_dan_cli_-ok_blm_print
 
Resumen de Prensa 2013
Resumen de Prensa 2013Resumen de Prensa 2013
Resumen de Prensa 2013
 
Gfk banks pers_report_2004
Gfk banks pers_report_2004Gfk banks pers_report_2004
Gfk banks pers_report_2004
 
Penyusunan raport dan kkm
Penyusunan raport dan kkmPenyusunan raport dan kkm
Penyusunan raport dan kkm
 
Sil53
Sil53Sil53
Sil53
 
Silabus dasar-kejuruan
Silabus dasar-kejuruanSilabus dasar-kejuruan
Silabus dasar-kejuruan
 
Sil1
Sil1Sil1
Sil1
 
Slide dkk01 modul_merakit_pc
Slide dkk01 modul_merakit_pcSlide dkk01 modul_merakit_pc
Slide dkk01 modul_merakit_pc
 
Task 8
Task 8Task 8
Task 8
 
Treball investigació
Treball investigacióTreball investigació
Treball investigació
 
Макарова А.Н. Последний звонок (сценарий праздника)
Макарова А.Н. Последний звонок (сценарий праздника)Макарова А.Н. Последний звонок (сценарий праздника)
Макарова А.Н. Последний звонок (сценарий праздника)
 
Program kerja kurikulum_2013-2014
Program kerja kurikulum_2013-2014Program kerja kurikulum_2013-2014
Program kerja kurikulum_2013-2014
 
Sil9
Sil9Sil9
Sil9
 
Pengumuman cpns menjadi_pns
Pengumuman cpns menjadi_pnsPengumuman cpns menjadi_pns
Pengumuman cpns menjadi_pns
 
Wiztech automation des
Wiztech automation desWiztech automation des
Wiztech automation des
 
preliminary task
preliminary taskpreliminary task
preliminary task
 
Peraturan pos-un-smpsma-smk-dan-unpk-tahun-2013
Peraturan pos-un-smpsma-smk-dan-unpk-tahun-2013Peraturan pos-un-smpsma-smk-dan-unpk-tahun-2013
Peraturan pos-un-smpsma-smk-dan-unpk-tahun-2013
 
The race
The raceThe race
The race
 
Rancang setting-ulang-keamanan-wan
Rancang setting-ulang-keamanan-wanRancang setting-ulang-keamanan-wan
Rancang setting-ulang-keamanan-wan
 

Similar to Routing

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedtingH K
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer ) dimuthu22
 
05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.pptssuserf7cd2b
 
Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Kimberly Jones
 

Similar to Routing (20)

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
PT.pptx
PT.pptxPT.pptx
PT.pptx
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Sem 1 Ch 5
Sem 1 Ch 5Sem 1 Ch 5
Sem 1 Ch 5
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
Final isp
Final ispFinal isp
Final isp
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedting
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
Networks
Networks   Networks
Networks
 
05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt
 
Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...
 

More from Yang Terluka

Struktur teknik-komputer-dan-informatika
Struktur teknik-komputer-dan-informatikaStruktur teknik-komputer-dan-informatika
Struktur teknik-komputer-dan-informatikaYang Terluka
 
Struktur teknik telekomunikasi
Struktur teknik telekomunikasiStruktur teknik telekomunikasi
Struktur teknik telekomunikasiYang Terluka
 
Struktur kurikulum tkj
Struktur kurikulum tkjStruktur kurikulum tkj
Struktur kurikulum tkjYang Terluka
 
Struktur kurikulum tkj(1)
Struktur kurikulum tkj(1)Struktur kurikulum tkj(1)
Struktur kurikulum tkj(1)Yang Terluka
 
Spk p1-soal praktik kejuruan-13-14
Spk p1-soal praktik kejuruan-13-14Spk p1-soal praktik kejuruan-13-14
Spk p1-soal praktik kejuruan-13-14Yang Terluka
 
Soal ujian praktik kejuruan paket 1 3.doc
Soal ujian praktik kejuruan paket 1 3.docSoal ujian praktik kejuruan paket 1 3.doc
Soal ujian praktik kejuruan paket 1 3.docYang Terluka
 
Silabus c1 pemrograman dasar kelas x
Silabus c1 pemrograman dasar kelas xSilabus c1 pemrograman dasar kelas x
Silabus c1 pemrograman dasar kelas xYang Terluka
 
Sap sistem-operasi
Sap sistem-operasiSap sistem-operasi
Sap sistem-operasiYang Terluka
 
Program kerja kurikulum_2013-2014(1)
Program kerja kurikulum_2013-2014(1)Program kerja kurikulum_2013-2014(1)
Program kerja kurikulum_2013-2014(1)Yang Terluka
 
Panduan aplikasi penilaian_rapor_online_kur_2013
Panduan aplikasi penilaian_rapor_online_kur_2013Panduan aplikasi penilaian_rapor_online_kur_2013
Panduan aplikasi penilaian_rapor_online_kur_2013Yang Terluka
 
Modul pemrograman-1-revisi
Modul pemrograman-1-revisiModul pemrograman-1-revisi
Modul pemrograman-1-revisiYang Terluka
 
Modul visual basic
Modul visual basicModul visual basic
Modul visual basicYang Terluka
 
Model rapot-smada-sem1-2013
Model rapot-smada-sem1-2013Model rapot-smada-sem1-2013
Model rapot-smada-sem1-2013Yang Terluka
 
Model raport smk coba ti
Model raport smk coba tiModel raport smk coba ti
Model raport smk coba tiYang Terluka
 
Materi pembekalan kurikulum 2013
Materi pembekalan kurikulum 2013Materi pembekalan kurikulum 2013
Materi pembekalan kurikulum 2013Yang Terluka
 
Manual instalasi aplikasi_dapok_2012_untuk_smk
Manual instalasi aplikasi_dapok_2012_untuk_smkManual instalasi aplikasi_dapok_2012_untuk_smk
Manual instalasi aplikasi_dapok_2012_untuk_smkYang Terluka
 

More from Yang Terluka (19)

Struktur teknik-komputer-dan-informatika
Struktur teknik-komputer-dan-informatikaStruktur teknik-komputer-dan-informatika
Struktur teknik-komputer-dan-informatika
 
Struktur teknik telekomunikasi
Struktur teknik telekomunikasiStruktur teknik telekomunikasi
Struktur teknik telekomunikasi
 
Struktur kurikulum tkj
Struktur kurikulum tkjStruktur kurikulum tkj
Struktur kurikulum tkj
 
Struktur kurikulum tkj(1)
Struktur kurikulum tkj(1)Struktur kurikulum tkj(1)
Struktur kurikulum tkj(1)
 
Spk p1-soal praktik kejuruan-13-14
Spk p1-soal praktik kejuruan-13-14Spk p1-soal praktik kejuruan-13-14
Spk p1-soal praktik kejuruan-13-14
 
Soal ujian praktik kejuruan paket 1 3.doc
Soal ujian praktik kejuruan paket 1 3.docSoal ujian praktik kejuruan paket 1 3.doc
Soal ujian praktik kejuruan paket 1 3.doc
 
Silabus c1 pemrograman dasar kelas x
Silabus c1 pemrograman dasar kelas xSilabus c1 pemrograman dasar kelas x
Silabus c1 pemrograman dasar kelas x
 
Sap sistem-operasi
Sap sistem-operasiSap sistem-operasi
Sap sistem-operasi
 
Program kerja kurikulum_2013-2014(1)
Program kerja kurikulum_2013-2014(1)Program kerja kurikulum_2013-2014(1)
Program kerja kurikulum_2013-2014(1)
 
Panduan aplikasi penilaian_rapor_online_kur_2013
Panduan aplikasi penilaian_rapor_online_kur_2013Panduan aplikasi penilaian_rapor_online_kur_2013
Panduan aplikasi penilaian_rapor_online_kur_2013
 
Modul pemrograman-1-revisi
Modul pemrograman-1-revisiModul pemrograman-1-revisi
Modul pemrograman-1-revisi
 
Modul mysql5
Modul mysql5Modul mysql5
Modul mysql5
 
Modul latihan-c -
Modul latihan-c -Modul latihan-c -
Modul latihan-c -
 
Modul visual basic
Modul visual basicModul visual basic
Modul visual basic
 
Model rapot-smada-sem1-2013
Model rapot-smada-sem1-2013Model rapot-smada-sem1-2013
Model rapot-smada-sem1-2013
 
Model raport smk coba ti
Model raport smk coba tiModel raport smk coba ti
Model raport smk coba ti
 
Model rapor smk
Model rapor smkModel rapor smk
Model rapor smk
 
Materi pembekalan kurikulum 2013
Materi pembekalan kurikulum 2013Materi pembekalan kurikulum 2013
Materi pembekalan kurikulum 2013
 
Manual instalasi aplikasi_dapok_2012_untuk_smk
Manual instalasi aplikasi_dapok_2012_untuk_smkManual instalasi aplikasi_dapok_2012_untuk_smk
Manual instalasi aplikasi_dapok_2012_untuk_smk
 

Routing

  • 1. Routing George Coularis, Jean Dollimore and Tim Kindberg portions from George Blank NJIT
  • 2. Routing  Except for LANS like Ethernet that provide direct connections between all hosts, networks require a process called routing to identify a path for communications to travel between nodes. In large networks, adaptive routing is used, analyzing the best path between nodes periodically to avoid congestion and faults such as broken connections. Routing on a network is the collective responsibility of the routers located at connection points between networks or subnets.
  • 3. A Small Personal Router  The Linksys EtherFast® Cable/DSL Router connects the Internet to a home or small office Ethernet LAN of up to 4 computers or other devices. It is combined with an Ethernet connection switch to link the devices. List Price: about $80 in 2006
  • 4. A Large CISCO Router   The Cisco uBR10012 Universal Broadband Router shown here supports 64,000 subscribers. It is a powerful commercial router that cost about $20,000 in 2006.
  • 5. Routing Algorithms  Determining the best path between network nodes is done by routing algorithms. A routing algorithm has two parts:  Determine the path taken by each packet in an efficient manner to avoid degrading network performance  Monitor traffic and changes to the network to maintain information on the best paths through the network
  • 6. Localized Routing   Routing algorithms are distributed through the network. Each router reads the address of each packet and decides where to send that packet next. Locally held information at each router includes the status of its direct links including information on congestion and link failures. Link tables include various routings and their current known cost in terms of the number of hops to get to a particular destination. An algorithm seeking a path to a new destination can request information from other routers.
  • 7. Timeouts  The Internet uses a timeout mechanism to identify a message connection failure. It uses a default timing such as 256 seconds. The same number may be used as a hop counter. A router decrements a counter by 1 each time a packet passes through a router. If the counter reaches zero the packet is discarded. If the originating system does not receive a response within the designated time, a 404 error is displayed.
  • 8. Routing on a local sub net  Packets addressed to hosts on the same network are transmitted to the destination in a single hop. Otherwise the packets must be sent to a router for transmission.
  • 9. Routing Algorithm Example  The Coulouris text shows a sample network (figure 3.7) and routing table (figure 3.8) and discusses a simple routing algorithm in section 3.3. Those slides are shown following this one, but are difficult to use in class because they require frequent switching back and forth between slides to understand the process. Students are expected to understand that example well enough to explain routing algorithms on a test.
  • 10. Figure 3.7 Network Diagram A Hosts or local networks 1 3 B 2 Links 4 C 5 D 6 E Routers Coulouris et al
  • 11. Figure 3.8 Link Table Routings from A To Link Cost A local 0 B 1 1 C 1 2 D 3 1 E 1 2 Coulouris et al Routings from B To Link Cost A 1 1 B local 0 C 2 1 D 1 2 E 4 1 Routings from D To Link Cost A 3 1 B 3 2 C 6 2 D local 0 E 6 1 Routings from C To Link Cost A 2 2 B 2 1 C local 0 D 5 2 E 5 1 Routings from E To Link Cost A 4 2 B 4 1 C 5 1 D 6 1 E local 0
  • 12. Figure 3.9 Routing Algorithm part 1 Send: Each t seconds or when Tl changes, send Tl on each non-faulty outgoing link. Receive: Whenever a routing table Tr is received on link n: for all rows Rr in Tr { if (Rr.link | n) { Rr.cost = Rr.cost + 1; Rr.link = n; if (Rr.destination is not in Tl) add Rr to Tl; // add new destination to Tl (Continued…)
  • 13. Figure 3.9 Routing Algorithm part 2 else for all rows Rl in Tl { if (Rr.destination = Rl.destination and (Rr.cost < Rl.cost or Rl.link = n)) Rl = Rr; // Rr.cost < Rl.cost : remote node has better route // Rl.link = n : remote node is more authoritative } } } Coulouris et al
  • 14. Routing Table Animation B A C D E F G Routings From A To Link Cost A Local 0∞ B 1∞ B B 2∞ C D E 2∞ E 1∞ E F E 3∞ G E 4∞
  • 15. Fault Handling  When a router detects a broken link or similar failure, it reacts by setting the cost to reach that link to infinity. This cost will propagate to neighboring nodes until a node is reached where a link is active and therefore has a smaller cost. This will propagate back through neighboring router tables to create a new shortest path to the nodes that were connected through the broken link.
  • 16. Network Congestion  When the load at any particular link reaches capacity, nodes trying to send traffic through that link will find their traffic blocked. This results in available buffer space filling up until nodes must refuse traffic and discard incoming packets. If this condition is temporary, it is self correcting as dropped packets are retransmitted. However, if congestion is substantial or prolonged, the effect on network performance is catastrophic.
  • 17. Congestion Control   In general, the approach to controlling congestion is to inform nodes along the route that congestion is occurring and requesting those nodes to reduce their rate of packet transmission. On the Internet, a large portion of packets are derived from human interaction, and people become frustrated and cease making requests to overly busy nodes, which reduces congestion. In some cases, denial of service attacks have deliberately congested prominent Internet sites.
  • 18. Firewalls  With the Internet consisting of many nodes operated by many people, security problems are inevitable. Commercial enterprises would not wish employees access to gambling and pornography during working hours. Many trade secrets are in company files, and industrial espionage must be discourages. Viruses, denial of service attacks and other threats must be contained. One approach to these problems is to isolate a more trusted domain from the rest of the Internet. This is done with hardware and software “firewalls.”
  • 19. Firewall Security Policies    Service Control: Permit some Internet services to be accessed and deny others. Behavior Control: Deny activities that violate the organization’s policies or which open the organization to attack or compromise. User Control: Allow only properly identified persons access to the network, ensure that any identified users can only access resources that are permitted to perform their jobs, and keep audit records to identify improper activities.
  • 20. Implementing a Firewall   Firewalls use different ways to identify threats:  IP Packet Filtering  TCP Gateways  Application Level Gateways Gateways are often implemented on separate computers referred to as bastions.
  • 21. IP Packet Filters  Packet filters look at address and service fields in packet headers and block packets that are addressed to blocked addresses or are otherwise likely to be problems. They may block particular ports known to be used by problematic services. For example, a firewall may prevent use of NFS servers by external clients by blocking port 2049.
  • 23. TCP Gateway  A TCP Gateway process checks all requests to connect or transmit data. It ensures that TCP segments are formatted correctly and that the connections can be controlled. If desired, the connection requests are then passed to an application-level gateway for content checking.
  • 24. Application Level Gateway  An Application Level Gateway acts as a proxy for an application process. For example, if an application wants to perform an action like making a connection, it can request the Gateway to do that instead. By denying direct access to the activity, the Gateway can verify addresses and data and perform security checks.
  • 25. Bastions  When gateway processes are required, they are often run on a separate computer called a bastion (i.e. fortress). Where security needs are strict, the bastion can be located in a subnet that controls all access to the protected network, with a router on the protected network and another on the network it is being protected from. This can hide all the addresses and even the existence of the hosts on the protected network from the rest of the world, and also provides a second router if the security on the first fails.
  • 26. Figure 3.21 Firewalls a) Filtering router Router/ filter Protected intranet Internet web/ftp server b) Filtering router and bastion R/filter Bastion Internet web/ftp server c) Screened subnet for bastion R/filter Internet web/ftp server Coulouris et al Bastion R/filter
  • 27. Virtual Private Networks (VPN)   The protection of a firewall boundary can be extended beyond the protected network by use of a Virtual Private Network. This combines encryption, tunneling, and secure authentication to create a protected link between secure systems across a public network. A VPN connection increases system overhead and reduces throughput, so it may not be practical if high performance is required.
  • 28. A VPN Client (details hidden for security purposes)
  • 29. Classroom Team Exercise A B D C F E 1) Make a routing table for A 2) Revise the link as if the link from C to E was broken
  • 30. Template for Exercise Routings from A To Link A B C D E F Cost
  • 31. Bibliography    George Coularis, Jean Dollimore and Tim Kindberg, Distributed Systems, Concepts and Design, Addison Wesley, Fourth Edition, 2005 Figures from the Coulouris text are from the instructor’s guide and are copyrighted by Pearson Education 2005 Router illustrations and product information from CISCO and Linksys Web sites