Download What is routing?

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Backpressure routing wikipedia , lookup

Wireless security wikipedia , lookup

AppleTalk wikipedia , lookup

Zigbee wikipedia , lookup

Peering wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Deep packet inspection wikipedia , lookup

Distributed firewall wikipedia , lookup

Network tap wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

IEEE 1355 wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Internet protocol suite wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Routing wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
T-110.455 Network Application
Frameworks and XML
Routing and mobility
9.2.2005
Sasu Tarkoma
Based on slides by Pekka Nikander
Contents





Background
IP routing and scalability
Mobility
Multi-layer mobility
Examples
Background




What is network architecture?
Layered architecture
The original requirements for IP
Later requirements for IP
Network architecture

A set of principles and basic
mechanisms that guide network
engineering


Physical links
Communication protocols




Format of messages
The way in messages are exchanged
Protocol stack
Where is the state?
Protocol Stack

Layers are part of a network architecture



Multiple layers are needed in order to
reduce complexity




Provide services for layers above
Hiding the complexity of the current layer
Separation of network functions
distribution of complexity
OSI, TCP/IP
Protocols are building blocks of a
network design

Can exist independently of layering
Naming, Addressing, and Routing
How to identify and
NAMING name a node? Even
if its address
changes.
unicast: to a specific node
broadcast: to all nodes
multicast: to a subset of nodes
anycast: to any one in some subset (IPv6)
ADDRESSING
Where is the node
located?
ROUTING
How to route
information to the
node’s address?
TCP/IP Network Stack
Application Layer
Transport Layer (TCP/UDP)
Networking Layer (IP)
Underlying network (link layer, physical)
TCP/IP Network Stack
All applications (FTP, Telnet,
HTTP, Overlays)
host-to-host transport
reliability, congestion control,
flow control
Application Layer
Transport host-to-host
Layer (TCP/UDP)
connectivity
routing, addressing HOST-TO-HOST
Link layer: local data transfer,
Networking Layer (IP)
encoding, framing, error correction
Physical: transmission of signals
Underlying network (link layer)
Protocol Layering
Sender
MSG
HT MSG
HN HT MSG
Application Layer
Transport Layer (TCP/UDP)
Networking Layer (IP)
Underlying network
Receiver
MSG
HT MSG
HN HT MSG
Application Layer
Transport Layer (TCP/UDP)
Networking Layer (IP)
Underlying network
Packet Switching



No connection setup at network layer
No state about end-to-end connections
at routers
Packets forwarded using destination host
address



Different paths may exist to a destination
Store and forward
Routing protocol goal


Find the best route through the network
Link cost: delay, monetary cost, congestion
level
Virtual Circuits





Alternative to datagram routing
Carries bit streams
Resources reserved for each session
(buffers, bandwidth)
Guaranteed QoS
State is stored by intermediate elements
(ATM,..)

Timing and reliability requirements
Original requirements for IP


Goal: universal end-to-end connectivity
Multiplexing


Survivability (robustness)


Dynamic adaptation to outages
Service generality


Packet switching
Support widest possible set of applications
Runs over diverse networking
technologies

Heterogeneity is unavoidable
Later requirements for IP

Scalability







Exponential growth of # nodes was
unplanned
Recurrent growth crises
Mainly a backbone issue (core routers)
Distributed management
Security
Mobility
Capacity allocation

fairness vs. unfairness
What has changed?

Permanent IP address


End-to-end communication


NAT, firewalls
Trusted end hosts


Middleboxes, proxies, NATs, ..
Globally and uniquely routable


Time-varying: DHCP, NAT, mobility
Hackers, spammers, …
Four layers

Layer splits, cross-layer interactions
Problems with four layers

Layer violations


Middleboxes, NATs
Relation to OSI 7 layers

What about presentation layer for Internet?


XML
What about session layer?


Separate session management from data
delivery
For example: SIP
Networks: Basics
Bridge
End systems (hosts)
Applications
Router
Models:
Client-server
Peer-to-peer
BGP
Public Switched Data Network
For example: OSPF
Router
Backbone LAN
R
R
R
R
Router
MAN
R
Router
Router
Networks: Wireless
MH
AP
NAT
GPRS/UMTS
Access network
BS
MH
NAT
Public Switched Data Network
Router
BS
Ad hoc
MH
Backbone LAN
R
R
R
R
Router
MAN
R
Router
Router
IP routing and scalability

What is routing?


Addresses, routing tables, path selection,..
Different types of routing


Evolution of IP routing


Source routing vs. hop-by-hop routing
Class-based systems to classless routing
Difficult issues

State, directories, security, QoS
What is routing?

Selecting the right path towards an
address

Addresses, names of locations or
locators
Routing table used for path selection
Path selection algorithm

How to represent topology information?



In address vs.in the routing table
IP addresses


Topological structure is reflected by
splitting IP addresses into a host and
network part
Benefits of hierarchical addressing


reduced number of routing table entries and
efficient allocation of addresses.
Subnetting

A subnet takes responsibility for delivering
datagrams to a certain range of IP addresses.

The network part is now extended to include
some bits from the host part.
Subnetting


A subnet mask is a 32-bit value that
identifies which bits in an address
represent network bits and which
represent host bits.
Examples of classless routing protocols


RIP version 2 (RIPv2), OSPF, Intermediate
System-to-Intermediate System (IS-IS), and
Enhanced Interior Gateway Routing Protocol
(EIGRP)
Note: Subnet-masks affect only internal
structure and behaviour of a network!
Route Summarization

Route summarization


Reduces the number of routes that a router
must maintain
A method of representing a series of network
numbers in a single summary address
Routing Tables

There are four basic items of information

A destination IP address.

A gateway IP address. This will be the same
as the destination IP address for directly
connected destinations.

Various flags

Usually displayed as U, G, H and sometimes D
and M. U means the route is up. G means the
route is via a gateway. H means the
destination address is a host address as
distinct from a network address.

The physical interface identification.

Additional info

Metrics, protocols
Host vs. router


Host

First look for the destination address as a
host address in the routing table

If it is not found then look for the destination
net address in the routing table

If that is not found then use one of the default
addresses (there may be several).
Router

Very large routing table


Especially in the backbone
Routing protocols

Interior Gateway Protocols (OSPF)

Exterior Gateway Protocols (BGP)...
Different types of routing

Source routing





Hop-by-hop routing




Path selection by sender
Path encoded in the packet
High cost for the sender node
Strict source routing vs. loose source routing
Router selects the next hop
High cost for the backbone routers
Per-host or per-network routes
(mobility? ..)
Evolution of IP routing

Class-based routing




Classless routing


A ,B and C classes
Routing tables carried entries for all nets
No topological aggregation (only network
address boundaries)
Using the variable length subnet mask to
aggregate addresses
Too many small networks requiring
multiple class C - addresses


C class has max 254 hosts
Huge routing tables
CIDR

CIDR (Classless Interdomain Routing)




Routing prefixes carry topology information
Contiguous blocks of C-class addresses
Smaller routing tables
How to handle multi-homing (and mobility?)

Solves two problems

Exhaustion of IP address space
 Size and growth rate of routing tables
Address format <IP/prefix bits>

CIDR and Route
Summarization

The difference between CIDR and route
summarization


Route summarization is generally done within
a classful boundary
CIDR combines several classful networks
CIDR and IPv6


CIDR not needed for IPv6
128bit IPv6 address has two parts:
network and host



includes the prefix-length
a decimal value indicating the number of
higher-order bits in the address that belong to
the network part
ISP aggregates all its customers'
prefixes into a single prefix and
announces that single prefix to the IPv6
Internet
Topology in address vs.
routing table
Reactive
AD HOC
(MANET)
routing
Proactive
ad hoc
(MANET)
routing
ATM
PNNI
Pure source routing
Original IP
CIDR routing
Host-based hop-by-hop
Difficult Issues


Convergence time of routing information
State in the network



Independence of directories
Security of routing information


Per-connection state is bad? (e.g. NAT)
Whom to trust? How to represent
authorization?
QoS routing
Mobility
Mobility


Routing from the mobility perspective
Mobility on various layers






Mobile IP approach
Transport and application - level mobility
Separating identifiers and locators
Mobility management and rendezvous
Security issues
Lessons to learn
Routing vs. mobility

Topology data aggregation is necessary


Cannot track all hosts in the world
IP addresses determined by topology


Mobile hosts must change their IP
addresses



Network gives the routing prefix
Causes sockets / connections to break
How to communicate address changes?
Goal of a mobility protocol

Transport and applications do not see
address changes
Networks: Mobility
MH
AP
NAT
GPRS/UMTS
Access network
BS
MH
NAT
Public Switched Data Network
Router
BS
Ad hoc
MH
Backbone LAN
R
R
R
R
Router
MAN
R
Router
Router
Rendezvous

How to find the moving end-point?

Tackling double jump



What if both hosts move at the same time?
Requires a rendezvous point
Mobility management is needed!



Initial rendezvous
Can be based on directories
Requires fast updates to directories

Does not work well for DNS
Security issues

Address stealing


Alice and Bob communicate
Mallory tells Alice


Bob is now at C
Address flooding


Mallory downloads from Alice, Bob, etc.
Mallory tells everybody

I have moved to C
Mobile IP

Two versions



Home Agent (HA)




IPv4 (optional)
integrated into IPv6 (with IPSec security)
Home address
Initial reachability
Triangular routing
Route optimization


Tunnels to bypass HA
HA as a rendezvous point
Mobility Example:Mobile IP
Triangular Routing
Correspondent
host
Ingress filtering (home
address as source)
all packets through HA
(reverse tunnelling) or
route optimization
Foreign agent left
out of MIPv6. No special
support needed with
IPv6 autoconfiguration
DELAY!
Foreign agent
Home agent
Home link
Foreign link
Mobile host
Care-of-Address (CoA)
Mobility Example:Mobile IPv6 Route
Optimization
CH sends
packets using routing header
Correspondent
host
In IPv6 MH sends
binding updates to
CH using home address
(authentication issues!)
Router
Home agent
MH sends a binding update to CN
when Foreign
it receives
a tunnelled packet
link
Home link
Mobile host
Multi-layer Operation

Mobility and multi-homing can be
realized on different layers

Network


Between network and transport



Mobile IP
Host Identity Protocol (HIP)
Transport (SCTP)
 SCTP, DCCP
 TCP extensions
Application


SIP, Wireless CORBA, overlays
Re-establish TCP-sessions after movement
Separating Identifiers and
Locators

New name space for IDs




Maybe based on DNS
Maybe a separate namespace
Maybe IP addresses are used for location
Communication end-points (sockets)
bound to identifiers
Host Identity Protocol





New cryptographic namespace
Connection endpoints mapped to 128 bit
host identity tags (hashes of public keys)
Mapping at HIP layer
4-phase Base Exchange with
cryptographic puzzle for DoS prevention
IPSec for network-level security
Identity/Locator split
Process
Transport
identifier
ID Layer
IP Layer
Link Layer
locator
Application-layer mobility


Many application-layer protocols are, in
principle, similar to Mobile IP
Moving entity may differ


Instead of host we have object, session,
entity, or interests
For example:

Object mobility


Session mobility


SIP
Interest mobility


Wireless CORBA
Content-based routing
Generic mobility

i3 overlay, service composition
Indirection Points

Mobility may be characterized by
indirection points

Mobile IP


Location / Identity split


Single fixed indirection point
Single indirection point
Content-based routing

Many indirection points
Mobile Distributed Applications
Overlay-layer
i3 and pub/sub with
mobility support
i3 and pub/sub with
mobility support
Middleware communication-layer
SIP, CORBA, SOAP
SIP, CORBA w/wo
mobility, SOAP
SIP, CORBA w/wo
mobility, SOAP
Transport-layer
TCP, UDP
HIP TCP,UDP
Network-layer
IP+MIP
I.
HIP
IP
II.
IP
III.
Lessons to learn

Hierarchical routing likely to stay



Applications face changing connectivity





Addresses carry topological information
Efficient and well established
QoS varies
periods of non-connectivity
Identifiers and locators likely to split
Mobility management is needed
Probably changes in directory services

Overlays have been proposed
Summary



Topology based routing is necessary
Mobility causes address changes
Address changes must be signalled endto-end


Mobility management needed



Alternative: use triangular routing as in Mobile
IP
Initial rendezvous: maybe a directory service
Double jump problem: rendezvous needed
Many engineering trade-offs