Wednesday, April 3, 2019

Networking And Routing Protocols

Ne bothrking And Routing ProtocolsAt present, internet plays a vital role in macrocosmy of our daily life. It made a dramatic revolution on communication which we enjoy today. The revolution offered web appliances, e-commerce, video conferences, online gaming and so on. entirely these became possible and operating on the backbone c in alled interlocks.On the setoff hand, before discussing astir(predicate) routing and routing protocols well go through and networking. Initially U.S. brass funded researches on sharing instruction within computers for scientific and military1 purposes. Though in that respect were many contributed to the foundation of internet J. C. R. Licklider was the first among them. As a draw of information Processing Technology Office (IPTO) he demonstrated the notion of clock cartridge holder sharing and promoted the researches and concepts on networking. Time sharing made a major evolution in the IT world. It became the basis for networking as well. Licks successors as leadership of IPTO, Ivan Sutherland and Bob Taylor influenced by Intergalactic lucre lead the researches of Advanced seek Projects Agency (ARPA)s IPTO. The three people Paul Baran, Leonard Kleinrock and Donald Davies pretend fundamentals for ARPANET with their witness concepts much(prenominal) as packet switching and so on. by and by never-ending researches on carrying out of networks, the first ARPANET inter imputeed and became success in 1969. creation limited for military and research purposes by universities ARPANET has gone through some(prenominal) modifications and adopted many mechanisms. By 1990 networks gradually became for public and from their some(prenominal) separate technologies emerged base on networks.When the networks utilise by general public, it began to grow grand and more than complex. So at that place was a convey for a man in the middle kind of gizmo to handle the travel guidebooks for networks. So that experts coined the device called laner. Router is a networking device employ to forward the data to an user interface to route the data towards its terminus. Again the network administrator had to do a feverous job of adding static routes and modify each and every route in a network. For deterrent example, if a joining goes drop all the routers should be modifyd manually to cope with it. So to handle these messy situations experts came up with the routing protocols. Though there were plenty of contributors and technology shifts in various occasions in the industry, the above paragraphs c overs the milestones in the history.Routing ConceptRouting is the cognitive operation of directing a packet towards the destination with the help of router. The router receives a packet from one interface, regularize which interface to be forwarded based on routing algorithmic ruleic program and destination predict and then lead the packet to the interface. To route a packet the router should satis fy at least following,Router should know Destination shout subnet maskDiscover live routers where it stick out identify the routes for aloof routersIdentify all possible routes for all remote networksThe best itinerary for routing the packetThe assist of maintaining and verifying the routing circuit board and routing informationIn general, routing mickle be categorized as static and impulsive routing. Static routing is the carry through of adding the routes manually in the router accede. The Static routes keep the administrative aloofness of 1 by default.IP route 172.16.30.0 255.255.255.0 172.16.20.2Dest n/w subnet mask following(a) decampeStatic routing has no overhead on router actionor or bandwidth of the connexion and secure compargond to energising routing. However, static routing doesnt have fault tolerant and its a tedious job to add routes manually. In a wide sphere network, adding all the routes is definitely a hardest job. hence again when a network topology transmutes or a link goes down again the network administrator have to run all over the place to modify. However in some scenarios, static routing remains handy. For instance, in nitty-gritty networks where all the work routed towards a gateway static routing is undeniable with default routes. So static routing consume less resources, lucky to configure, more secure and can handle multiple networks. Default routing is a grade of static routing where simply the exiting interface is specified.IP route 0.0.0.0 0.0.0.0 resultant1Dest n/w Subnet Exit interfaceAdministrative duration for default routing is 0. Default routing is purposed to lead packets to remote networks when the router doesnt have information about it on routing table.The next crucial, widely utilise category is dynamic routing which is concerned in this project. participating routing is the process of keeping the routing table up to date with instant updates from routing protocols. These protocol s dynamically sh be the information and able to update the routing table when topology changes occur. make headway, these protocols determine the best pathway based on metric calculations. So that dynamic routing protocols remain crucial in large scale corporate networks to update their routing tables. Dynamic routing protocols provide fault tolerance by broadcasting updates when golf links goes down or server shutdown. To update the router tables the routing protocols restrict the rules for communicating with the neighbour routers. The rules specify the method and algorithm to exchange information between inha cow chips. all in all in all though dynamic protocols consume more CPU power and bandwidth when compargond, they argon robust and more reliable in networks, e curiously large scale. Routing protocols can be categorized in various slipway based on their characteristics.Initially, protocols can be divided into routing and routed protocols. Routed protocols are answerab le for actual data transfer. The protocols to a lower place this category are TCP/IP, IPX/SPX, and orchard apple tree talk. Routing protocols exchange the routing information between routers. They include RIP, RIP v.2, IGRP, EIGRP, OSPF BGP and so on.Further dynamic protocols can be classified as,Interior gateway protocols (IGP) and outside(prenominal) gateway protocol(EGP)Class-full and Class-lessDistance vector ,Link-state and hybridizing protocolsIGP and EGP are characterized based on autonomous dodging. self-governing system (AS) is the collection of networks within one administrative domain. IGP protocols are used to exchange router information between corresponding AS come and EGP is between divers(prenominal) AS numbers. riptide, rend v.2, IGRP, EGRP, OSPF, IS-IS come under IGP and BGP is under EGP.Class-full routing protocols do not advertise the subnet mask but class-full address in advertisement. Class-less protocols advertise subnet mask. RIP and IGRP are class -full and RIP v.2 EIGRP, OSPF and IS-IS are classless.The former(a) important characterization is Distance vector, Link state and hybrid.Distance vector protocols advertise periodicallyAdvertise full routing tableAdvertise only for directly affiliated routersHigh crossroad timeLimited no of record hopSuffer from routing loopDo not establish populate relationshipProtocols RIP, IGRPLink state protocolsAdvertise only when network triggeredAdvertise only the updateFlood the advertisementConvergence is lowNo limits in hop count and suitable for large networkNo routing loopsEstablish neighbor relation in formal wayProtocols OSPF IS-IS crisscross protocolsIts a combination of twain Distance vector and Link-state. EIGRP conduct such(prenominal) routing characteristics.Dynamic routing ProtocolsRouting Information Protocol (RIPv1)Routing information protocol version 1 known as RIP is the initial routing protocol to be use in ARPANET in 1967. As classified before RIP is a class-full, distance vector and interior gateway protocol (IGP). RIP was developed based on Bellman-Ford algorithm and use hop count as the metric value. It uses the lowest hop count to calculate the best path. Rip limits the number of hosts it supports in a network to stay fresh routing loops and maintain stability. It supports a maximum of 15 hops in a network. 16th hop is defined as in infinite administrative distance and they execute unreachable and un-sh realmble. It uses broadcast address 255.255.255.255 to send updates between routers. Administrative distance for RIP is 120.Rip use several timers in the advertizing and updating process. Routing update timer, route timeout timer, and route flush timer are the timers used by RIP. Routing update timer is used to determine the time interval between each update from rip implemented router. Usually a full update is sent every 30 seconds from router. This became a b opposite when all the routers simultaneously try to send updates every 30 s econds and overpowering the bandwidth since they are synchronized. So that when the timer is reset random time is added in appendage to the 30 seconds to pr essence such congestion. Route timeout timer is the time name until a record remains valid before it gets an update with same record. If the router doesnt get the update again within the time frame router marks the record for deletion and hold it until the flush time expire. After the flush time expires the record leave behind be purged permanently from the table.Rip protocol preserve stability by limiting the number of hops to prohibit routing loops propagation. RIP implements split horizon, route poisoning and timing mechanisms to prevent erroneous information propagation. However, limitation on number of hops becomes a setback in large scale networks. Limiting only to class-full advertising is another drawback in RIP. Further, routing updates are not capable for authentication process which is a security concern with vers ion1. Despite rip being emerged ages ago it still exists in routers. Because it is easy to configure, stable, suits well for stub networks and widely used.Routing Information Protocol (RIPV2)Rip version 2 was standardized and released in 1993 due(p) to lack of some important features in version 1 as mentioned above. Version 2 is an enhancement for variable length subnet masking (VLSM). Ripv2 intentional to support classless routing with subnet masks which was a critical update from earlier version. Version2 updates hunt more information with simple authentication enabled on it. It uses multicast address 224.0.0.9 to send updates. Multicasting avoids the hosts which are not part of routing from receiving update. This version likewise maintains the maximum number of hops to 15.Open Shortest Path First (OSPF) Routing ProtocolOpen shortest olden first (OSPF) plays a key role in IP networks for several reasons. It was drafted to be used with the internet protocol suite with high fu nctionality as a non proprietary protocol. OSPF is an interior gateway routing protocol which routes packets between the same autonomous systems. It has an administrative distance of 110. It is designed to fully support VLSM (Variable length Subnet Masking) or CIDR (Classless Inter-Domain Routing).Also it supports for manual summarized advertisement. Its a link state protocol. So it scales well2, converges rapidly and offer loop free routing. On a topology change or link down it converges quick enough to provide a new loop free route.It uses cost to calculate the metric value. The shortest path is calculated based on Dijkstra algorithm to find the best path. OSPF use multicast addresses for updates. The addresses are, 224.0.0.5 is for sending updates and 224.0.0.6 is to receive updates. OSPF maintains three types of tables namely, routing table, neighbor table and database table. It uses howdy protocol to establish neighbor relation and maintain a neighbor table. Hello protocols attributes are,Router IDPriority (default 1)Hello interval (10 sec)Dead interval (40 sec)Authentication bitStub area flagProcess IDThe relationship is established based on the router ID. To establish a neighbor relationship timers (hello dead), network mask, area ID and authentication password should be same.It uses area to communicate among routers. OSPF can be configured as hotshot area or multi-area network. Areas are introduced to cumber the flooding of update into a single area. An OSPF domain is split into areas and labelled with 32 bit identifiers to limit the updates and calculation of best path with Dijkstra algorithm into one area. Areas should be carefully designed and configured to group the hosts and routers to a logical area. Each area maintains its own link state database which is distributed via a connecting router to other networks. Such design reduces the traffic flow between areas and keeps the topology anonymous to other areas. In single area OSPF the entire i nterface in that network belongs to same network. The draw below explains a compliance in single area OSPF.In multi-area, all other areas mustiness connect to the back bone area (area 0) directly or virtually. The diagram below is a sample of multi-area cast.A multiple area OSPF must contain at least one backbone / zero area and may have several non-backbones. Zero area remains as the core area for all the other areas. All the other areas connect to backbone area to get updated. OSPF allows configuring stub networks as well. In OSPF stub networks external updates are not flooded in to the stub area. This go out result in reducing the size of database size and thereby recollection consumption. When stub network area is configured default routing will be used to connect to the external areas. OSPF defines the following router states,Area border router (ABR)Autonomous system boundary router (ASBR)Internal router (IR)Backbone router (BR)The routers could play one or more roles as mentioned above in an OSPF network. The router identifier should be defined in a dotted decimal format to associate each OSPF instance with an ID. If it is not explicitly specified, the highest logical IP will be appoint as the router ID.Area border router (ABR) is the common router which placed on the frame in of the backbone area to connect other areas via its interfaces. The ABR keeps a copy of the link state databases of both the backbone and of the areas which it is connected to in its memory.Autonomous system boundary router (ASBR) is the router which connects an autonomous system and a non-OSPF network. ASBR remains as a gateway to connect an AS to other routing protocol networks such as EIGRP, RIP, BGP, static and so on. It also used to exchange routes which it learned from other AS number through its own AS number.The router which has all its interfaces and neighbor relationship within an area is called as Internal Router (IR). All the routers which are part of the backb one area are backbone router (BR). It may be a backbone familiar router or an area border router. ABR is also a BR since it is connected to backbone via a physical or logical link.From OSPF configurations the routers elect designated router (DR) and title designated router (BDR). A designated router (DR) is elected on a multi- entre network segment to exchange routing information with other routers. The job of the DR is multicasting the router update which it received to the other routers. So other routers listen only to the DR alternatively of listening to broadcast. DR elected to act as one-to-many instead of many-to-many routing update. So updates are sent only to the DR router and it updates all the routers within the segment. This election mechanism reduces the network traffic a handle. The router with the highest priority among the routers will be elected as the Designated Router. If more than one router has same priority Router ID will be used as the tie breaker. In multi access networks Backup designated router (BDR) must be elected next. BDR is a standby router for DR if DR becomes unavailable. The router which becomes the second in the election process will be the BDR. If both become unavailable the election process will be held again. The BDR receives updates from adjacent routers but doesnt multicast them. OSPF adjacency is established to share the routing updates directly to each other. Establishing adjacency depends on the OSPF configuration in routers.From OSPF configuration point of view networks can be categorized as,Broadcast multi-access In broadcast multi-access networks routers have direct access to all the routers via direct links. roughly of the examples for Broadcast multi-access are Ethernet, and Token ring. Through Ethernet multiple devices are allowed to access the same network. So when an OSPF packet is sent on the network itll be broadcasted and all the routers will receive it. With OSPF DR and BDR should be elected for broadc ast multi-access network.Non-broadcast Multi find (NBMA) NBMA network allows data transmission over a virtual link or across a switching device between the hosts in the network. Typical examples for NBMA are X.25, ATM and Frame relay. In NBMA, all the devices are connected through a shared medium. It doesnt support broadcast or multicast. Instead, OSPF sends the hello packet to each router in the network one at a time. As a result OSPF should be configured specially and the neighbor relationship should be specified properly. Power Line communication (PLC) is also categorized as Non-broadcast Multiple Access network.Point-to-point In Point-to-point connections, both routers endpoints are connected point to point to provide a single path for communication. High-Level Data Link Control (HDLC) and Point-to-Point Protocol (PPP) could be the examples for P2P. In point to point network, it may be a serial cable connecting the endpoints directly or a virtual link which connects two rout ers apart in greater distance. But both scenarios eliminate the need for election of DR and BDR in OSPF implementation. The neighbors will be identified automatically with P2P.Point-to-multipoint Point-to-multipoint topology refers to connecting a single interface of a router to multiple destination routers. All the devices in Point-to-multipoint will be in a same network. conventionally the routers could identify their neighbors automatically in broadcast network.Enhanced Interior adit Routing Protocol (EIGRP)Enhanced Interior Gateway Routing Protocol (EIGRP) is a proprietary, hybrid protocol owned by Cisco. It was developed by CISCO as a successor of IGRP. Though its not a version of IGRP its altogether different. It behaves as both link state and distance vector protocol. Its a classless protocol as well. Administrative distance for EIGRP is 90. It exercises a different algorithm from previous protocols which is known as Diffusing update algorithm (DUAL). DUAL algorithm ensure s to find the best path with faster convergence and loop free routing. EIGRP supports unequal cost balancing as well. It uses multicast address 224.0.0.0 to send updates. EIGRP also use autonomous system number. It maintains three types of tables,Neighbor table maintains data about the neighboring routers which are directly connected and accessible. Hello packets with timers are employed to keep the record with precision.Topology table The topology table contains all the destinations advertised by its neighbor routers. It maintains the table as an aggregation of all advertised routes with adjoining metrics. In addition from the aggregation a successor and possible successor will be identified and stored. The successor path is the best path to reach a destination based on the least sum of advertised distance from a neighbor and the distance to reach that neighbor. This route will be installed in the router. The elective feasible successor has the metric higher than successor, whi ch characterise to be the next successor. This route doesnt get installed but kept in the topology table as an alternative. The router will automatically add the feasible route as successor when the successor becomes unavailable. The state of a route for destination can be marked as active or passive in the table. When the router find successor unavailable with no backup routes it query the neighbor routers. This state is called as active and when it gets a reception it changes to passive state. This whole process ensures a loop free path for destinations.Routing table This table store the actual routes for all destinations. This table is var. from the previous topology table calculation. A successor route and an optional feasible route will be stored in this table.Network imitateBasically Network modelling is a main concept of network deployment into network planning, designing and implementation. Modelling is used to describe concept of the project. Network summary and netwo rk designing should be defined before create network modelling. Define the requirements, objectives and problem areas should be created in network analysis part. So at this stage describe about the router and routing concept towards how they are using routing protocol to route the packets and how to configure with those routing protocols. After this stage implementation part considers all fulfil requirements. Finally design part where we define appropriate network deployment. Network modelling is giving a lot of helps to think more ideas to create best possible network model. Because of that I selected OPNET simulator in this project to create network models.OPNET Modeller 15.0 (Optimized Network technology Tools)Currently OPNET is one of the best tools among many network modelling tools in the network technologies. It provides us to designing network model using all kind of network equipments. Networking designers are gained better understanding of designing before development pro cess. It helps to reduce time manner and expense of prototyping hardware equipments. We can able to analyse, measure the performance and behaviour of proposed Model system from event simulations.OPNET tool contains many features. There are main three editors in the OPNET Project EditorIt contains graphical interface of network topology nodes such as subnet, hub, switch, router, etc and much kind of links to communicate among those devices. All are designed with graphical user interface such as easy to end users. Node EditorIt is describe clear picture of internal architecture of the nodes by investigate the data flow between serviceable nodes. Node model can send, receive and create network traffic with other node model through the packets. Process EditorIt describes about the processes and events create by implementation of specific process operation on the network such as behaviour and functionality of the node model. During the simulation time each node model may create a proces s of any event, so that it gives the state of process and its functionality. Completely we cant compare simulated network with real world time traffic. But it will give some of information such as how much unavoidable bandwidth, where the jamming can occur and how to handle to avoid these problems.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.