Routing Algorithm Visualization

stepping through routing algorithms n.w
1 / 26
Embed
Share

Explore Dijkstra's Algorithm step by step in a communication network topology. Follow the process of routing table computation for different routers and understand the neighbor selection.

  • algorithm visualization
  • communication networks
  • routing
  • Dijkstras Algorithm
  • network topology

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Stepping through Routing Algorithms Ashutosh Dhekne ECE/CS 438 - Communication Networks Fall 2018 University of Illinois at Urbana-Champaign

  2. Dijkstras Algorithm Needs the global topology as input. Every router computes its own routing table from this global view We will follow Dijkstra s algorithm for router a in this topology: b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  3. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  4. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - Which neighbor will we pick next? b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  5. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - 1 ab 2,a 3,a , - , - , - b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  6. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - 1 ab 2,a 3,a , - , - , - 2 abc 3,a ?,? , - 3,c b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  7. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - 1 ab 2,a 3,a , - , - , - 2 abc 3,a 12,c , - 3,c b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  8. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - 1 ab 2,a 3,a , - , - , - 2 abc 3,a 12,c , - 3,c 3 abcd 7,d , - 3,c b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  9. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - 1 ab 2,a 3,a , - , - , - 2 abc 3,a 12,c , - 3,c 3 abcd 7,d , - 3,c 4 abcdg 7,d 4,g b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  10. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - 1 ab 2,a 3,a , - , - , - 2 abc 3,a 12,c , - 3,c 3 abcd 7,d , - 3,c 4 abcdg 7,d 4,g 5 abcdgf 5,f b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  11. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - 1 ab 2,a 3,a , - , - , - 2 abc 3,a 12,c , - 3,c 3 abcd 7,d , - 3,c 4 abcdg 7,d 4,g 5 abcdgf 5,f 6 abcdgfe b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  12. Step N D(b),p(b) D(c),p(c) D(d),p(d) D(e),p(e) D(f),p(f) D(g),p(g) 0 a 1,a 2,a 3,a , - , - , - 1 ab 2,a 3,a , - , - , - 2 abc 3,a 12,c , - 3,c 3 abcd 7,d , - 3,c 4 abcdg 7,d 4,g 5 abcdgf 5,f 6 abcdgfe b 1 1 2 a c e g 1 1 3 f d

  13. Bellman-Ford Distance Vector Algorithm Relies only on knowledge obtained from neighbors and own links Every router computes its own routing tables but propagates the routing table to others We will follow part of Bellman-Ford algorithm at routers a and c in this topology: b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  14. a b c d e f g a s DV a 0,a 1,a 2,a 3,a b c d e f g b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  15. After a receives all DVs from its neighbors (part 1) a b c d e f g a s DV a 0,a 1,a 2,a 3,a b 1 0 13 c 2 13 0 10 1 d 3 0 4 e f g b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  16. After a corrects its own DV based on its neighbors (part 2) a b c d e 7,d f g 3,c a s DV a 0,a 1,a 2,a 3,a b 1 0 13 c 2 13 0 10 1 d 3 0 4 e f g b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  17. After c receives all DVs from its neighbors (part 1) a b c d e f g a 0 1 2 3 b 1 0 13 c s DV c 2,a 13,b 0,c 10,c 1,c d e 10 4 0 1 5 f g 1 5 1 0 b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  18. After c updates its DVs for its neighbors (part 2) a b c d e f g a 0 1 2 3 b 1 0 3,a 13 6,g c s DV c 2,c 0 1,c d e 10 4 0 1 5 f g 1 5 1 0 b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  19. After c updates its DVs for everyone else (part 3) a b c d e f g a 0 1 2 3 b 1 0 13 5,a 2,g c s DV c 2,c 3,a 0,c 6,g 1,c d e 10 4 0 1 5 f g 1 5 1 0 b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  20. What does c send to a? Consider poisoned reverse

  21. After a receives DV from c a b c d e f g a s DV a 0,a 1,a 2,a 3,a 7,d 3,c b 1 0 13 6 2 c 2 0 1 d 3 0 4 e Poisoned Reverse f g b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  22. After a receives DV from c a b c d e f 4,c g a s DV a 0,a 1,a 2,a 3,a 7,d 3,c b 1 0 13 6 2 Affects a s DV c 2 0 1 d 3 0 4 e f g b 13 1 1 2 5 10 a c e g 1 1 3 4 f d

  23. UIUCs connection to the rest of the world Concepts to recall: Autonomous Systems all routers under one administrative control Routers are connected to each other by physical links. Each AS can have large number of routers, NAT boxes, and hosts AS numbers are given out by IANA

  24. UIUC ASs Many others Many others UIUC AS38 UIUC AS40387 UIUC AS698 AS11537 Internet2.edu AS293 Es.net AS38 AS40387 Many others Many others AS23473 pavlovmedia.com AS698 AS6939 He.net

  25. Example global AS Hurricane Electric Source: http://he.net/HurricaneElectricNetworkMap.pdf

  26. Example global AS Hurricane Electric Intra-AS routing focuses on performance, Inter-AS routing focuses on policy But even intra-AS can be a world-wide network of routers! Source: http://he.net/HurricaneElectricNetworkMap.pdf

Related


More Related Content