multimedia communication & networks
DESCRIPTION
ADVANCED ROUTINGTRANSCRIPT
13PIT101
Multimedia Communication & Networks
UNIT – II
Dr.A.Kathirvel
Professor & Head/IT - VCEW
Unit - II
Intra AS routing – Inter AS routing – Router
Architecture – Switch Fabric – Active Queue
Management – Head of Line blocking –
Transition from IPv4 to IPv6 – Multicasting –
Abstraction of Multicast groups – Group
Management – IGMP – Group Shared
Multicast Tree – Source based Multicast Tree –
Multicast routing in Internet – DVMRP and
MOSPF – PIM – Sparse mode and Dense
mode
INTRA AS ROUTING
#4
The Internet Network layer
routing
table
Host, router network layer functions:
Routing protocols
•path selection
•RIP, OSPF, BGP
IP protocol
•addressing conventions
•datagram format
•packet handling conventions
ICMP protocol
•error reporting
•router “signaling”
Transport layer: TCP, UDP
Link layer
physical layer
Network
layer
#5
Hierarchical Routing
scale: with 50 million
destinations:
• can’t store all dest’s in routing tables!
• routing table exchange would
swamp links!
administrative autonomy
• internet = network of networks
• each network admin may want to
control routing in its own network
Our routing study thus far - idealization
all routers identical
network “flat”
… not true in practice
#6
Hierarchical Routing
• aggregate routers into regions, “autonomous systems” (AS)
• routers in same AS run same routing protocol
– “intra-AS” routing protocol
– routers in different AS can run different intra-AS routing protocol
• special routers in AS
• run intra-AS routing
protocol with all other
routers in AS
• also responsible for routing
to destinations outside AS
– run inter-AS routing
protocol with other
gateway routers
gateway routers
#7
Intra-AS and Inter-AS routing
Gateways: •perform inter-AS
routing amongst
themselves
•perform intra-AS
routers with other
routers in their AS
inter-AS, intra-AS routing
in
gateway A.c
network layer
link layer
physical layer
a
b
b
a
a C
A
B
d
A.a
A.c
C.b B.a
c
b
c
#8
Intra-AS and Inter-AS routing
Host
h2 a
b
b
a
a C
A
B
d c
A.a
A.c
C.b B.a
c
b
Host
h1
Intra-AS routing
within AS A
Inter-AS
routing
between
A and B
Intra-AS routing
within AS B
We’ll examine specific inter-AS and intra-AS Internet
routing protocols shortly
#9
Routing: Example
AS A
(OSPF)
AS B
(OSPF intra routing)
AS D
AS C
i
b
a1
a2
d
E
F
AS I
i2
No Export
to F
#10
Routing: Example
AS A
(OSPF)
AS B
(OSPF intra routing)
AS D
AS C
i
b
How to specify?
a1
a2
d
E
F
AS I
d1
d2
#11
IP Addressing Scheme
• We need an address to uniquely identify each destination
• Routing scalability needs flexibility in aggregation of destination addresses – we should be able to aggregate a set of
destinations as a single routing unit
• Preview: the unit of routing in the Internet is a network---the destinations in the routing protocols are networks
#12
IP Addressing: introduction
• IP address: 32-bit identifier for host, router interface
• interface: connection between host, router and physical link
– router’s typically have multiple interfaces
– host may have multiple interfaces
– IP addresses associated with interface, not host, or router
223.1.1.1
223.1.1.2
223.1.1.3
223.1.1.4 223.1.2.9
223.1.2.2
223.1.2.1
223.1.3.2 223.1.3.1
223.1.3.27
223.1.1.1 = 11011111 00000001 00000001 00000001
223 1 1 1
#13
IP Addressing • IP address:
– network part
• high order bits
– host part
• low order bits
• What’s a network ? (from
IP address perspective)
– device interfaces with
same network part of IP
address
– can physically reach each
other without intervening
router
223.1.1.1
223.1.1.2
223.1.1.3
223.1.1.4 223.1.2.9
223.1.2.2
223.1.2.1
223.1.3.2 223.1.3.1
223.1.3.27
network consisting of 3 IP networks
(for IP addresses starting with 223,
first 24 bits are network address)
LAN
#14
IP Addressing
How to find the networks?
• Detach each interface
from router, host
• create “islands of isolated networks
223.1.1.1
223.1.1.3
223.1.1.4
223.1.2.2 223.1.2.1
223.1.2.6
223.1.3.2 223.1.3.1
223.1.3.27
223.1.1.2
223.1.7.0
223.1.7.1
223.1.8.0 223.1.8.1
223.1.9.1
223.1.9.2
Interconnected
system consisting
of six networks
#15
IP Addresses
0 network host
10 network host
110 network host
1110 multicast address
A
B
C
D
class
1.0.0.0 to
127.255.255.255
128.0.0.0 to
191.255.255.255
192.0.0.0 to
223.255.255.255
224.0.0.0 to
239.255.255.255
32 bits
given notion of “network”, let’s re-examine IP addresses:
“class-full” addressing:
#16
IP addressing: CIDR
• classful addressing: – inefficient use of address space, address space exhaustion
– e.g., class B net allocated enough addresses for 65K hosts, even if only 2K hosts in that network
• CIDR: Classless InterDomain Routing – network portion of address of arbitrary length
– address format: a.b.c.d/x, where x is # bits in network portion of address
11001000 00010111 00010000 00000000
network
part
host
part
200.23.16.0/23
#17
CIDR Address Aggregation
AS A
(OSPF)
AS D
i
a1
a2
d
i->a1: I can reach
130.132/16; my path:
I
AS I
d1
130.132.1/24
130.132.2/24
130.132.3/24
intradomain routing
uses /24
#18
CIDR Address Aggregation
x00/24: B
x01/24: C
x10/24: E
x11/24: F
A
B
C
E
F
G
#19
IP addresses: how to get one?
Hosts (host portion):
• hard-coded by system admin in a file
• DHCP: Dynamic Host Configuration Protocol: dynamically get address: “plug-and-play”
– host broadcasts “DHCP discover” msg
– DHCP server responds with “DHCP offer” msg
– host requests IP address: “DHCP request” msg
– DHCP server sends address: “DHCP ack” msg – The common practice in LAN and home access (why?)
#20
IP addresses: how to get one?
Network (network portion):
• get allocated portion of ISP’s address space: ISP's block 11001000 00010111 00010000 00000000 200.23.16.0/20
Organization 0 11001000 00010111 00010000 00000000 200.23.16.0/23
Organization 1 11001000 00010111 00010010 00000000 200.23.18.0/23
Organization 2 11001000 00010111 00010100 00000000 200.23.20.0/23
... ….. …. ….
Organization 7 11001000 00010111 00011110 00000000 200.23.30.0/23
#21
Hierarchical addressing: route aggregation
“Send me anything
with addresses
beginning
200.23.16.0/20”
200.23.16.0/23
200.23.18.0/23
200.23.30.0/23
Fly-By-Night-ISP
Organization 0
Organization 7 Internet
Organization 1
ISPs-R-Us “Send me anything
with addresses
beginning
199.31.0.0/16”
200.23.20.0/23
Organization 2
.
.
.
.
.
.
Hierarchical addressing allows efficient advertisement of routing
information:
#22
Hierarchical addressing: more specific routes
ISPs-R-Us has a more specific route to Organization 1
“Send me anything
with addresses
beginning
200.23.16.0/20”
200.23.16.0/23
200.23.18.0/23
200.23.30.0/23
Fly-By-Night-ISP
Organization 0
Organization 7 Internet
Organization 1
ISPs-R-Us “Send me anything
with addresses
beginning 199.31.0.0/16
or 200.23.18.0/23”
200.23.20.0/23
Organization 2
.
.
.
.
.
.
#23
Network Address Translation: Motivation
192.168.1.2
192.168.1.3
192.168.1.4
192.168.1.1
138.76.29.7
local network
(e.g., home network)
192.168.1.0/24
rest of
Internet
Datagrams with source or
destination in this network
have 192.168.1/24 address for
source, destination (as usual)
All datagrams leaving local
network have same single source NAT IP
address: 138.76.29.7,
different source port numbers
A local network uses just one public IP address as far as outside world is
concerned
Each device on the local network is assigned a private IP address
#24
NAT: Network Address Translation
Implementation: NAT router must:
– outgoing datagrams: replace (source IP address, port #) of every outgoing datagram to (NAT IP address, new port #)
. . . remote clients/servers will respond using (NAT IP address, new port #) as destination addr.
– remember (in NAT translation table) every (source IP address, port #) to (NAT IP address, new port #) translation pair
– incoming datagrams: replace (NAT IP address, new port #) in dest fields of every incoming datagram with corresponding (source IP address, port #) stored in NAT table
#25
NAT: Network Address Translation
192.168.1.2
S: 192.168.1.2, 3345
D: 128.119.40.186, 80
1
192.168.1.1
138.76.29.7
1: host 192.168.1.2
sends datagram to
128.119.40.186, 80
NAT translation table
WAN side addr LAN side addr
138.76.29.7, 5001 192.168.1.2, 3345
…… ……
S: 128.119.40.186, 80
D: 192.168.1.2, 3345
4
S: 138.76.29.7, 5001
D: 128.119.40.186, 80 2
2: NAT router
changes datagram
source addr from
192.168.1.2, 3345 to
138.76.29.7, 5001,
updates table
S: 128.119.40.186, 80
D: 138.76.29.7, 5001
3
3: Reply arrives
dest. address:
138.76.29.7, 5001
4: NAT router
changes datagram
dest addr from
138.76.29.7, 5001 to 192.168.1.2, 3345
192.168.1.3
192.168.1.4
#26
Network Address Translation: Advantages
• No need to be allocated range of addresses from ISP: - just one public IP address is used for all devices
– 16-bit port-number field allows 60,000 simultaneous connections with a single LAN-side address !
– can change ISP without changing addresses of devices in local network
– can change addresses of devices in local network without notifying outside world
• Devices inside local net not explicitly addressable, visible by outside world (a security plus)
#27
NAT: Network Address Translation
• If both hosts are behind different NAT, they will have difficulty establishing connection
• NAT is controversial:
– routers should process up to only layer 3
– violates end-to-end argument
• NAT possibility must be taken into account by app designers, e.g., P2P applications
– address shortage should instead be solved by having more addresses --- IPv6
#28
IP addressing: the last word...
Q: How does an ISP get block of addresses?
A: ICANN: Internet Corporation for Assigned
Names and Numbers
– allocates addresses
– manages DNS
– assigns domain names, resolves disputes
#29
Getting a datagram from source to dest.
223.1.1.1
223.1.1.2
223.1.1.3
223.1.1.4 223.1.2.9
223.1.2.2
223.1.2.1
223.1.3.2 223.1.3.1
223.1.3.27
A
B
E
IP datagram:
misc
fields
source
IP addr dest
IP addr data
datagram remains unchanged,
as it travels source to
destination
addr fields of interest here
mainly dest. IP addr
Dest. Net. next router Nhops
223.1.1 1 223.1.2 223.1.1.4 2
223.1.3 223.1.1.4 2
routing table in A
#30
Getting a datagram from source to dest.
223.1.1.1
223.1.1.2
223.1.1.3
223.1.1.4 223.1.2.9
223.1.2.2
223.1.2.1
223.1.3.2 223.1.3.1
223.1.3.27
A
B
E
Starting at A, given IP datagram
addressed to B:
look up net. address of B
find B is on same net. as A
link layer will send datagram directly
to B inside link-layer frame
B and A are directly connected
Dest. Net. next router Nhops
223.1.1 1 223.1.2 223.1.1.4 2
223.1.3 223.1.1.4 2
misc
fields 223.1.1.1 223.1.1.3 data
#31
Getting a datagram from source to dest.
223.1.1.1
223.1.1.2
223.1.1.3
223.1.1.4 223.1.2.9
223.1.2.2
223.1.2.1
223.1.3.2 223.1.3.1
223.1.3.27
A
B
E
Dest. Net. next router Nhops
223.1.1 1 223.1.2 223.1.1.4 2
223.1.3 223.1.1.4 2 Starting at A, dest. E:
look up network address of E
E on different network
A, E not directly attached
routing table: next hop router to E
is 223.1.1.4
link layer sends datagram to router
223.1.1.4 inside link-layer frame
datagram arrives at 223.1.1.4
continued…..
misc
fields 223.1.1.1 223.1.2.2 data
#32
Getting a datagram from source to dest.
223.1.1.1
223.1.1.2
223.1.1.3
223.1.1.4 223.1.2.9
223.1.2.2
223.1.2.1
223.1.3.2 223.1.3.1
223.1.3.27
A
B
E
Arriving at 223.1.4, destined for
223.1.2.2
look up network address of E
E on same network as router’s interface 223.1.2.9
router, E directly attached
link layer sends datagram to
223.1.2.2 inside link-layer frame
via interface 223.1.2.9
datagram arrives at 223.1.2.2!!!
(hooray!)
misc
fields 223.1.1.1 223.1.2.2 data network router Nhops interface
223.1.1 - 1 223.1.1.4 223.1.2 - 1 223.1.2.9
223.1.3 - 1 223.1.3.27
Dest. next
#33
IP datagram format
ver T
32 bits
data
(variable length,
typically a TCP
or UDP segment)
16-bit identifier
Internet
checksum
time to
live
32 bit source IP address
IP protocol version
number
header length
(bytes)
max number
remaining hops
(decremented at
each router)
for
fragmentation/
reassembly
total datagram
length (bytes)
upper layer protocol
to deliver payload to
head.
len
type of
service “type” of data
flgs fragment
offset upper
layer
32 bit destination IP address
Options (if any) E.g. timestamp,
record route
taken, specify
list of routers
to visit.
4-34
IP Fragmentation & Reassembly
• network links have MTU
(max.transfer size) - largest
possible link-level frame.
– different link types, different
MTUs
• large IP datagram divided
(“fragmented”) within net – one datagram becomes several
datagrams
– “reassembled” only at final destination
– IP header bits used to identify,
order related fragments
fragmentation:
in: one large datagram
out: 3 smaller datagrams
reassembly
Network Layer 4-35
IP Fragmentation and Reassembly
ID
=x offset
=0
fragflag
=0
length
=4000
ID
=x offset
=0
fragflag
=1
length
=1500
ID
=x offset
=185
fragflag
=1
length
=1500
ID
=x offset
=370
fragflag
=0
length
=1060
One large datagram becomes
several smaller datagrams
Example
4000 byte datagram
MTU = 1500 bytes
1480 bytes in
data field
offset =
1480/8
Lecture 6: Network Layer #36
Routing in the Internet
• The Global Internet consists of Autonomous Systems (AS)
interconnected with each other:
– Stub AS: small corporation
– Multihomed AS: large corporation (no transit)
– Transit AS: provider
• Two-level routing:
– Intra-AS: administrator is responsible for choice
– Inter-AS: unique standard
Lecture 6: Network Layer #37
Internet AS Hierarchy
Inter-AS border (exterior gateway) routers
Intra-AS interior (gateway) routers
Lecture 6: Network Layer #38
Intra-AS Routing
• Also known as Interior Gateway Protocols (IGP)
• Most common IGPs:
– RIP: Routing Information Protocol
– OSPF: Open Shortest Path First
– IGRP: Interior Gateway Routing Protocol (Cisco
propr.)
Lecture 6: Network Layer #39
RIP ( Routing Information Protocol)
• Distance vector algorithm
• Included in BSD-UNIX Distribution in 1982
• Distance metric: # of hops (max = 15 hops)
– why?
• Distance vectors: exchanged every 30 sec via Response
Message (also called advertisement)
• Each advertisement: route to up to 25 destination nets
Lecture 6: Network Layer #40
RIP (Routing Information Protocol)
Destination Network Next Router Num. of hops to dest.
w A 2
y B 2
z B 7
x -- 1 …. …. ....
w x y
z
A
C
D B
Routing table in D
Lecture 6: Network Layer #41
RIP: Link Failure and Recovery
If no advertisement heard after 180 sec --> neighbor/link declared
dead
– routes via neighbor invalidated
– new advertisements sent to neighbors
– neighbors in turn send out new advertisements (if
tables changed)
– link failure info quickly propagates to entire net
– poison reverse used to prevent ping-pong loops
(infinite distance = 16 hops)
Lecture 6: Network Layer #42
OSPF (Open Shortest Path First)
• “open”: publicly available
• Uses Link State algorithm
– LS packet dissemination
– Topology map at each node
– Route computation using Dijkstra’s algorithm
• OSPF advertisement carries one entry per neighbor router
• Advertisements disseminated to entire AS (via flooding)
Lecture 6: Network Layer #43
OSPF “advanced” features (not in RIP)
• Security: all OSPF messages authenticated (to prevent
malicious intrusion); TCP connections used
• Multiple same-cost paths allowed
– only one path in RIP
• For each link, multiple cost metrics for different ToS (eg,
satellite link cost set “low” for best effort; high for real time) • Integrated uni- and multicast support:
– Multicast OSPF (MOSPF) uses same topology data base as OSPF
• Hierarchical OSPF in large domains.
Lecture 6: Network Layer #44
Hierarchical OSPF
Lecture 6: Network Layer #45
Hierarchical OSPF
• Two-level hierarchy: local area, backbone.
– Link-state advertisements only in area
– each nodes has detailed area topology; only know
direction (shortest path) to nets in other areas.
• Area border routers: “summarize” distances to nets in own area, advertise to other Area Border routers.
• Backbone routers: run OSPF routing limited to backbone.
• Boundary routers: connect to other ASs.
Lecture 6: Network Layer #46
IGRP (Interior Gateway Routing Protocol)
• CISCO proprietary; successor of RIP (mid 80s)
• Distance Vector, like RIP
• several cost metrics (delay, bandwidth, reliability, load etc)
• uses TCP to exchange routing updates
• Loop-free routing via Distributed Updating Alg. (DUAL)
based on diffused computation
Lecture 6: Network Layer #47
Inter-AS routing
Lecture 6: Network Layer #48
Internet inter-AS routing: BGP
• BGP (Border Gateway Protocol): the de facto standard
• Path Vector protocol:
– similar to Distance Vector protocol
– each Border Gateway broadcast to neighbors
(peers) entire path (I.e, sequence of ASs) to
destination
– E.g., Gateway X may send its path to dest. Z:
Path (X,Z) = X,Y1,Y2,Y3,…,Z
Lecture 6: Network Layer #49
Internet inter-AS routing: BGP
Suppose: gateway X send its path to peer gateway W • W may or may not select path offered by X
– cost, policy (don’t route via competitors AS), loop prevention reasons.
• If W selects path advertised by X, then: Path (W,Z) = W, Path (X,Z)
• Note: X can control incoming traffic by controlling its route advertisements to peers: – e.g., don’t want to route traffic to Z -> don’t advertise any routes
to Z
Lecture 6: Network Layer #50
Internet inter-AS routing: BGP
• BGP messages exchanged using TCP.
• BGP messages:
– OPEN: opens TCP connection to peer and
authenticates sender
– UPDATE: advertises new path (or withdraws old)
– KEEPALIVE keeps connection alive in absence of
UPDATES; also ACKs OPEN request
– NOTIFICATION: reports errors in previous msg;
also used to close connection
Lecture 6: Network Layer #51
Why different Intra- and Inter-AS routing ?
Policy:
• Inter-AS: admin wants control over how its traffic routed, who
routes through its net.
• Intra-AS: single admin, so no policy decisions needed
Scale:
• hierarchical routing saves table size, reduced update traffic
Performance:
• Intra-AS: can focus on performance
• Inter-AS: policy may dominate over performance
Extra
Lecture 6: Network Layer #52
Network Layer 4-53
ICMP: Internet Control Message Protocol
• used by hosts & routers to
communicate network-level
information
– error reporting: unreachable host,
network, port, protocol
– echo request/reply (used by ping)
• network-layer “above” IP: – ICMP msgs carried in IP
datagrams
• ICMP message: type, code plus first 8
bytes of IP datagram causing error
Type Code description
0 0 echo reply (ping)
3 0 dest. network unreachable
3 1 dest host unreachable
3 2 dest protocol unreachable
3 3 dest port unreachable
3 6 dest network unknown
3 7 dest host unknown
4 0 source quench (congestion
control - not used)
8 0 echo request (ping)
9 0 route advertisement
10 0 router discovery
11 0 TTL expired
12 0 bad IP header
Network Layer 4-54
Traceroute and ICMP
• Source sends series of UDP
segments to dest
– First has TTL =1
– Second has TTL=2, etc.
– Unlikely port number
• When nth datagram arrives to nth
router:
– Router discards datagram
– And sends to source an ICMP
message (type 11, code 0)
– Message includes name of
router& IP address
• When ICMP message arrives, source calculates RTT
• Traceroute does this 3 times
Stopping criterion
• UDP segment eventually arrives at destination host
• Destination returns ICMP “dest port unreachable” packet (type 3, code 3)
• When source gets this ICMP, stops.
Example: tracert www.yahoo.com
Tracing route to www-real.wa1.b.yahoo.com [69.147.76.15]
over a maximum of 30 hops:
1 <1 ms <1 ms <1 ms 132.67.250.1
2 <1 ms 1 ms <1 ms dmz-cc-gw.math.tau.ac.il [132.67.252.2]
3 <1 ms <1 ms <1 ms tel-aviv.tau.ac.il [132.66.4.1]
4 1 ms <1 ms <1 ms gp1-tau-ge.ilan.net.il [128.139.191.70]
5 1 ms * 1 ms gp0-gp1-te.ilan.net.il [128.139.188.2]
6 87 ms 86 ms 87 ms iucc.rt1.fra.de.geant2.net [62.40.125.121]
7 87 ms 87 ms 87 ms TenGigabitEthernet7-3.ar1.FRA4.gblx.net [207.138.144.45]
8 177 ms 177 ms 177 ms 204.245.39.226
9 180 ms 177 ms 265 ms ae1-p151.msr2.re1.yahoo.com [216.115.108.23]
10 177 ms 177 ms 177 ms te-9-4.bas-a2.re1.yahoo.com [66.196.112.203]
11 177 ms 177 ms 177 ms f1.www.vip.re1.yahoo.com [69.147.76.15]
Trace complete.
Network Layer 4-56
IPv6
• Initial motivation: 32-bit address space soon to
be completely allocated.
• Additional motivation:
– header format helps speed processing/forwarding
– header changes to facilitate QoS
IPv6 datagram format:
– fixed-length 40 byte header
– no fragmentation allowed
Network Layer 4-57
IPv6 Header (Cont)
Priority: identify priority among datagrams in flow
Flow Label: identify datagrams in same “flow.” (concept of“flow” not well defined). Next header: identify upper layer protocol for data
Network Layer 4-58
Other Changes from IPv4
• Checksum: removed entirely to reduce
processing time at each hop
• Options: allowed, but outside of header,
indicated by “Next Header” field
• ICMPv6: new version of ICMP
– additional message types, e.g. “Packet Too Big”
– multicast group management functions
Network Layer 4-59
Transition From IPv4 To IPv6
• Not all routers can be upgraded simultaneous
– no “flag days”
– How will the network operate with mixed IPv4 and
IPv6 routers?
• Tunneling: IPv6 carried as payload in IPv4
datagram among IPv4 routers
Network Layer 4-60
Tunneling A B E F
IPv6 IPv6 IPv6 IPv6
tunnel Logical view:
Physical view: A B E F
IPv6 IPv6 IPv6 IPv6
C D
IPv4 IPv4
Flow: X
Src: A
Dest: F
data
Flow: X
Src: A
Dest: F
data
Flow: X
Src: A
Dest: F
data
Src:B
Dest: E
Flow: X
Src: A
Dest: F
data
Src:B
Dest: E
A-to-B:
IPv6
E-to-F:
IPv6 B-to-C:
IPv6 inside
IPv4
B-to-C:
IPv6 inside
IPv4
IPv6 status report • Operating systems –
– wide support – early 2000
– Windows (2000, XP, Vista), BSD, Linux, Apple
• Networking infrastructure – Cisco
• Deployment – Slow
• Penetration – Host - minor (less than 1%)
– Used in 2008 in China Olympic games
• Motivation: CIDR & NAT
Lecture 7: Network Layer II #61
Active Queue Management
Queuing Disciplines
• Each router must implement some queuing
discipline
• Queuing allocates both bandwidth and buffer
space:
– Bandwidth: which packet to serve (transmit) next
– Buffer space: which packet to drop next (when
required)
• Queuing also affects latency
Typical Internet Queuing
• FIFO + drop-tail – Simplest choice
– Used widely in the Internet
• FIFO (first-in-first-out) – Implies single class of traffic
• Drop-tail – Arriving packets get dropped when queue is full regardless
of flow or importance
• Important distinction: – FIFO: scheduling discipline
– Drop-tail: drop policy
FIFO + Drop-tail Problems
• Leaves responsibility of congestion control to
edges (e.g., TCP)
• Does not separate between different flows
• No policing: send more packets get more
service
• Synchronization: end hosts react to same
events
Active Queue Management
• Design active router queue management to aid
congestion control
• Why?
– Routers can distinguish between propagation and
persistent queuing delays
– Routers can decide on transient congestion, based
on workload
Active Queue Designs
• Modify both router and hosts
– DECbit – congestion bit in packet header
• Modify router, hosts use TCP
– Fair queuing
• Per-connection buffer allocation
– RED (Random Early Detection)
• Drop packet or set bit in packet header as soon as
congestion is starting
Internet Problems
• Full queues
– Routers are forced to have have large queues to maintain high utilizations
– TCP detects congestion from loss
• Forces network to have long standing queues in steady-state
• Lock-out problem
– Drop-tail routers treat bursty traffic poorly
– Traffic gets synchronized easily allows a few flows to monopolize the queue space
Design Objectives
• Keep throughput high and delay low
• Accommodate bursts
• Queue size should reflect ability to accept
bursts rather than steady-state queuing
• Improve TCP performance with minimal
hardware changes
Lock-out Problem
• Random drop
– Packet arriving when queue is full causes some
random packet to be dropped
• Drop front
– On full queue, drop packet at head of queue
• Random drop and drop front solve the lock-out
problem but not the full-queues problem
Full Queues Problem
• Drop packets before queue becomes full (early
drop)
• Intuition: notify senders of incipient
congestion
– Example: early random drop (ERD):
• If qlen > drop level, drop each new packet with fixed
probability p
• Does not control misbehaving users
Random Early Detection (RED)
• Detect incipient congestion, allow bursts
• Keep power (throughput/delay) high
– Keep average queue size low
– Assume hosts respond to lost packets
• Avoid window synchronization
– Randomly mark packets
• Avoid bias against bursty traffic
• Some protection against ill-behaved users
RED Algorithm
• Maintain running average of queue length
• If avgq < minth do nothing
– Low queuing, send packets through
• If avgq > maxth, drop packet
– Protection from misbehaving sources
• Else mark packet in a manner proportional to
queue length
– Notify sources of incipient congestion
RED Operation
Min thresh Max thresh
Average Queue Length
minth maxth
maxP
1.0
Avg queue length
P(drop)
RED Algorithm
• Maintain running average of queue length
– Byte mode vs. packet mode – why?
• For each packet arrival
– Calculate average queue size (avg)
– If minth ≤ avgq < maxth
• Calculate probability Pa
• With probability Pa
– Mark the arriving packet
• Else if maxth ≤ avg
– Mark the arriving packet
Queue Estimation
• Standard EWMA: avgq - (1-wq) avgq + wqqlen
– Special fix for idle periods – why?
• Upper bound on wq depends on minth
– Want to ignore transient congestion
– Can calculate the queue average if a burst arrives
• Set wq such that certain burst size does not exceed minth
• Lower bound on wq to detect congestion relatively quickly
• Typical wq = 0.002
Extending RED for Flow Isolation
• Problem: what to do with non-cooperative flows?
• Fair queuing achieves isolation using per-flow state – expensive at backbone routers – How can we isolate unresponsive flows without
per-flow state?
• RED penalty box – Monitor history for packet drops, identify flows
that use disproportionate bandwidth
– Isolate and punish those flows
FRED
• Fair Random Early Drop (Sigcomm, 1997)
• Maintain per flow state only for active flows
(ones having packets in the buffer)
• minq and maxq min and max number of
buffers a flow is allowed occupy
• avgcq = average buffers per flow
• Strike count of number of times flow has
exceeded maxq
FRED – Fragile Flows
• Flows that send little data and want to avoid
loss
• minq is meant to protect these
• What should minq be?
– When large number of flows 2-4 packets
• Needed for TCP behavior
– When small number of flows increase to avgcq
FRED
• Non-adaptive flows
– Flows with high strike count are not allowed more
than avgcq buffers
– Allows adaptive flows to occasionally burst to
maxq but repeated attempts incur penalty
Stochastic Fair Blue
• Same objective as RED Penalty Box
– Identify and penalize misbehaving flows
• Create L hashes with N bins each
– Each bin keeps track of separate marking rate (pm)
– Rate is updated using standard technique and a bin size
– Flow uses minimum pm of all L bins it belongs to
– Non-misbehaving flows hopefully belong to at least one
bin without a bad flow
• Large numbers of bad flows may cause false positives
Stochastic Fair Blue
• False positives can continuously penalize same
flow
• Solution: moving hash function over time
– Bad flow no longer shares bin with same flows
– Is history reset does bad flow get to make
trouble until detected again?
• No, can perform hash warmup in background
# 83
Head of Line
blocking
# 84
Buffers
• Input ports
• Output ports
• Inside fabric
• Shared Memory
• Combination of all
Buffer locations
Fabric
# 85
Input Queuing
fabric
Inp
uts
Outp
uts
# 86
• Input speed of queue – no more than input line
• Need arbiter (running N times faster than input)
• FIFO queue
• Head of Line (HoL) blocking .
• Utilization:
• Random destination
• 1- 1/e = 59% utilization
• due to HoL blocking
Input Buffer : properties
# 87
Head of Line Blocking
# 88
# 89
# 90
Head of Line Blocking
Stadium
Beer/Soda/Chips
Kwiky Mart
# 91
Stadium
Output Queuing
Beer/Soda/Chips
Kwiky Mart
# 92
Head of Line Blocking
B C A C B
A
B
C
# 93
Head of Line Blocking
B C A C B C A B
A
B
C
# 94
Head of Line Blocking
C B C B C A B C B A
A
B
C
# 95
A
B
C
VOQ—Virtual Output Queues
B C A C B
ARB
# 96
VOQ—Virtual Output Queues
B
C
A A
A
B
C
ARB
C B C A B
# 97
VOQ—Virtual Output Queues
B
C
A
B A C C B
A A A
A
B
C
ARB
# 98
Performance Issue with Cross-Bars
Source: M. J. Karol, M.G. Hluchyj, S. P. Morgan, “Input Versus Output Queueing [sic] on a Space-Division Packet Switch”, IEEE Transactions on Communications, Vol COM-35, No 12,
December 1987, page 1353
58.6%
# 99
The fabric looks ahead into the input buffer for packets that may be transferred if they were not blocked by the head of line.
Improvement depends on the depth of the look ahead.
This corresponds to virtual output queues where each input port has buffer for each output port.
Overcoming HoL blocking:
look-ahead
# 100
Input Queuing Virtual output queues
# 101
Each output port is expanded to L output
ports
The fabric can transfer up to L packets to
the same output instead of one cell.
Overcoming HoL blocking:
output expansion
Karol and Morgan,
IEEE transaction on communication, 1987: 1347-1356
# 102
fabric
L
Input Queuing
Output Expansion
# 103
Output Queuing The “ideal”
1
1
1
1
1
1
1
1
1
1 1
1
2
2
2
2
2
2
# 104
Output Buffer : properties
• No HoL problem
• Output queue needs to run faster than input lines
• Need to provide for N packets arriving to same queue
• solution: limit the number of input lines that can be destined to the output.
# 105
Shared Memory
a common pool of buffers divided into
linked lists indexed by output port number
FA
BR
IC
FA
BR
IC
MEMORY
# 106
Shared Memory: properties
• Packets stored in memory as they arrive
• Resource sharing
• Easy to implement priorities
• Memory is accessed at speed equal to sum of the
input or output speeds
• How to divide the space between the sessions
Multicast: one sender to many receivers
• Multicast: one sender to many receivers
– analogy: one teacher to many students
• Question: how to achieve multicast
Internet Multicast Service Model
multicast group concept:
– hosts send IP datagram pkts to multicast group
– hosts that have “joined” that multicast group will receive pkts sent to that group
Multicast groups
• host group semantics:
– anyone can “join” (receive) multicast group
– anyone can send to multicast gorup
– no network layer identification to hosts of members
• session/application-level mechanisms needed for membership identification, privacy
• needed: infrastructure to deliver mcast-addressed packets to all hosts that have joined that multicast group
Internet Multicast Addressing
• indirection: mcast address does not name a
destination, but host group to receive packet
• class D Internet addresses reserved for multicast:
packet addr: 226.17.30.197
Joining a mcast group: a two-step process
• local: host informs local mcast router of desire to join group: IGMP
• wide area: local router interacts with other routers to receive mcast packet flow
– many protocols (e.g., DVMRP, MOSPF, PIM)
IGMP: Internet Group Management Protocol
• host: sends IGMP report when application
joins mcast group
– IP_ADD_MEMBERSHIP socket option
– host need not explicitly “unjoin” group when leaving
• router: sends IGMP query at regular intervals
– host belonging to a mcast group must reply to
query
IGMP
IGMP version 1
• router: Host Membership Query msg broadcast on LAN to all hosts
• host: Host Membership Report msg to indicate group membership
– randomized delay before responding
– implicit leave via no reply to Query
• RFC 1112
IGMP v2: additions include
• group-specific Query
• Leave Group msg
– last host replying to Query can
send explicit Leave Group msg
– router performs group-specific
query to see if any hosts left in
group
– RFC 2236
IGMP v3: under development as
Internet draft
Multicast Issues
• Naming
• Membership Management
• Routing
IP Multicast Naming
• Class D address represents multicast group
– E.g. 226.17.30.197
• Datagram with destination address set to group delivered to all hosts in the group
– Indirection
– 226.17.30.197 => 65.30.1.2, 66.8.3.53, 128.32.75.60, …
– Sender may or may not be in the group
• No address hierarchy or subnets
– How is routing done?
Membership Management
• Some other questions:
– Who is part of the group?
– How does one join?
– How does one leave?
– Who decides if it’s OK?
• Membership management answers these
IGMP
• Internet Group Management Protocol
• Runs only between host and router
– Multicast routing takes care of communication
between routers
IGMP
hosts
routers
host-to-router protocol
(IGMP)
multicast routing protocols
(various)
IGMP query
• IGMP membership_query
– Router sends query
– Find out all groups a host belongs to
– Can query a specific group instead
– Sent to the “all systems group” (224.0.0.1) with
TTL=1
IGMP report
• IGMP membership_report
– Response from host to a query
– Can send report unsolicited
• Join group this way!
• IGMP leave_group
– Optional
– Router will clean up membership info on next
membership_query
IGMP properties
• Minimalist semantics
– Host controlled membership
• No decision about:
– Who controls membership
– Invitations
– How to find groups and join them
• Move these decisions to application layer
Soft state
• Host is authoritative on group membership
• Router maintains “soft state”
• A crashed router soon recovers
– Sends a new membership_query
– Misdelivers packets for a little while
• OK by IP service model!
CS 640 123
Protocol types
• Dense mode protocols
– assumes dense group membership
– Source distribution tree and NACK type
– DVMRP (Distance Vector Multicast Routing Protocol)
– PIM-DM (Protocol Independent Multicast, Dense Mode)
– Example: Company-wide announcement
• Sparse mode protocol
– assumes sparse group membership
– Shared distribution tree and ACK type
– PIM-SM (Protocol Independent Multicast, Sparse Mode)
– Examples: a Shuttle Launch
Multicast Routing
• A number of routers have hosts that belong to
a multicast group
• How to connect them (and others) in a tree?
– Shared tree: single tree for all
– Source-based tree: many trees
Core-Based Tree
• Tree rooted at a core
• To join a group, send unicast message towards
core
– Add all links traversed until hit existing tree
Diagram
Core
Choice of Core
• If core close to source, efficiency is good
• If core far from source, efficiency falls
– Delay up to twice optimal
• Optimal core placement is NP-hard
– Use heuristics
Source-based Trees
• Different tree for each possible source
– Why?
• Reverse path forwarding to figure out tree
• Pruning to leave out routers
Pruning
• Prune when no attached members or
downstream routers
• Propagate prune messages upstream
R1
R2
R3
R4
R5
R6 R7
router with attached
group member
router with no attached
group member
prune message
S: source
links with multicast
forwarding
P
P
P
DVMRP
• Distance Vector Multicast Routing Protocol
• DV + RPF + Pruning
• DV vector carries distance to multicast sources
• Pruning carries a timeout
– Afterwards, traffic delivery is resumed
• Explicit graft message to reverse pruning
– Done upon join
MOSPF
• Multicast Extensions to OSPF
• Link-state advertisements include multicast group
membership
– Only report directly connected hosts
• Compute shortest-path spanning tree rooted at
source
– On demand, when receiving packet from source for the
first time
– Forward multicast traffic along tree
MOSPF performance
• Global state allows source-based trees to be
used
– Faster delivery of messages
• Overhead
– Joins and leaves flooded to all routers
– Any change may cause whole tree to be
recomputed
PIM
• Protocol Independent Multicast
– Uses routing tables, but agnostic of how they are built
• Two settings:
– Dense: most routers members of a group
• Use RPF flooding with pruning
– Sparse: most routers not members of a group
• Use shared tree or source-based tree based on data characteristics
• Uses soft-state
Sparse vs. Dense
Dense Mode
• Dense participants
• B/W plentiful
• Membership assumed
until pruned
• Data driven
Sparse Mode
• Sparse participants
• B/W overhead
significant
• Membership explicitly
requested
• Receiver driven
Shared v. Source-based Trees
• Shared trees used initially
– Tree rooted at rendezvouz-point (RP)
• Can switch to source-based trees when data
rate is high
– RP sends a Join message to source
– Each router independently decides to switch to
source-based tree, sends Join to source
Shared Tree Example
RP
S
G
G G
PIM Receiver Join
RP
S
G
G G
G
Join *,G
Report G
What if
join is here?
PIM Shared Tree After Join
RP
S
G
G G
G
G
PIM Source Based Tree
RP
S
G
G G
G
G
Join s,g
PIM Source Based Tree
RP
S
G
G G
G
G
PIM routing tables
• Routing entries of the form (s,g)
– s - source
– g - group
• Wildcard entries (*,g) for shared-group trees
• Packets are routed using best match
Queries