CS475 – Networks Assignments Lecture 14 Chapter 4 – Advanced Internetworking

advertisement
CS475 – Networks
Lecture 14
Chapter 4 – Advanced Internetworking
Assignments
• Reading for Lecture 15: Sections 5.1- 5.2
• Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted, due following Tuesday
4.2 Multicast
IP supports multicast to support one-to-many (radio, news,
IP multicast was originally a many-to-many (any source MC or
updates) and many-to-many (teleconf, gaming) communication. ASM) model. A one-to-many MC model (source-specific MC or
IP multicast (MC) uses MC groups, where each group has its
SSM) was developed in which a receiver specifies a MC group
own IP MC address.
and a specific host.
A sending host sends a single copy of a packet to the MC
A host joins and leaves an MC group by using (IPv4) Internet
address. The network routers _____________ the packet
Group Management Protocol (______________) or (IPv6) MC
whenever it needs to be forwarded over more than one link.
Listener Discovery (MLD) to communicate to the local router.
4.2.1 Multicast Addresses
4.2.2 Multicast Routing
IPv4 uses addresses 224.0.0.0 through 239.255.255.255 (Class
While a unicast propagates along a path, a multicast propagates
D) for multicast. This address range uses a 4-bit prefix (1110)
along a __________________.
leaving _______________ to specify an MC group.
Multicast routing is the process by which the multicast
Ethernet supports multicast (in addition to unicast and broadcast) distribution tree is determined.
but uses only 23 bits for an MC address. 32 (25) IP MC
addresses map into each Ethernet MC address. After receiving
an MC packet a host must examine the entire IP address to either
accept or reject the MC packet.
4.2.2 Multicast Routing: DVMRP
The Distance Vector Multicast Routing Protocol (DVMRP) is an
extension of distance vector routing to support multicast.
DVMRP is a _______________________________ protocol. In
a flood protocol each router would copy and forward a multicast
packet along all links except the one on which the packet arrived
if and only if the packet arrived over the link that is on the
shortest path to the source.
10/13/2011
1 of 5
Duplicate packets can still be sent to LANs connected to more
We want to prune networks that contain no members of the MC
than one router. DVMRP solves this by requiring one router on group. This can be accomplished by having each member of the
a LAN to be designated as the ________________. Only the
group periodically announce that it is a group member. Parent
parent forwards packets to the LAN.
routers can prune networks that contain no members.
4.2.2 Multicast Routing: PIM-SM
DVMRP does not scale well and Protocol Independent MC
(PIM) was developed in response.
There are dense and _________________ modes (PIM-DM and
PIM-SM). PIM-SM is the dominant MC routing protocol and is
the only one discussed here.
Here R4 sends a join message to the RP. R2 will ____________
In PIM-SM, routers join the MC tree by sending a Join message
to a special router known as the rendezvous point (RP).
MC traffic only along the path from RP to R4. R5's Join will
not propagate farther than R2. R2 will add the path to R5 to the
MC tree.
For MC group G, each router looks at the Join and creates a
forwarding table entry for the shared tree, called a (*, G) entry.
To send a message to the group a host sends a packet addressed
to the MC group to a local _________________________ router
(DR) which encapsulates the message in a Register message
which is tunneled to the RP. The RP removes the packet and
sends it out to the shared tree.
R1 is the DR for the host. The message is _____________ from
R1 to RP at which point it is multicast along the distribution tree.
A host sending a lot of data to the MC group can trigger
construction of a source-specific tree rooted at the DR.
A high data rate from a single source can trigger construction of
a more optimal source specific tree that ______________ the
shared tree. The DR in this case effectively replaces the RP.
A source specific tree that uses the shared tree is shown in (c). A
This tree can be significantly shorter than the original shared
shorter source ________________ tree that replaces the shared
tree.
tree is shown in (d).
10/13/2011
2 of 5
4.2.2 Multicast Routing: MSDP
PIM-SM is typically used only within a domain. The Multicast
Source Discovery Protocol (MSDP) was developed to extend
MC across domains that use PIM-SIM.
Each domain has an RP with peer RPs in other domains. An RP
sends Source Active messages periodically to its peers on behalf
of the sources. A peer can join the MC group by sending a Join
message to DR for the source.
Construction of a source specific MC tree across domains using
______________________
4.2.2 Multicast Routing: PIM-SSM
4.2.2 Multicast Routing: BIDIR-PIM
PIM was originally designed as a many-to-many protocol. PIM Bidirectional PIM (BIDIR-PIM) is an enhancement to PIM that
source-specific multicast (PIM-SSM) was developed to support
is better suited for many-to-many multicasting within a domain
the demand for a ______________________ protocol.
when the senders and receivers may be the same (multiparty
PIM-SSM required changes only to IGMP rather than PIM. In
video-conference).
PIM-SSM a source specific tree is constructed first, bypassing
the construction of a shared tree.
4.3 Multiprotocol Label Switching (MPLS)
MPLS tries to combine some of the properties of virtual circuits
with those of a ___________________ network.
MPLS-enabled routers forward packets by examining short,
fixed-length labels.
MPLS is primarily used for (1) destination-based forwarding, (2)
explicit routing, and (3) virtual private networks and tunnels.
4.3.1 MPLS: Destination Based Forwarding
Router R2 has assigned and advertised labels for certain network
prefixes. Arriving packets have labels attached by R1 (the label
edge router or ___________________).
10/13/2011
3 of 5
The IP longest match lookup algorithm has been replaced by
exact match lookup.
MPLS allows internal ATM switches to be used as IP routers.
(This can be a cost effective way to carry IP traffic on an existing
ATM network.) The switches are now called Label Switched
Conversion of an overlay network that uses ATM switches to a
peer network (no hardware changes are involved).
Routers (________________).
Each MPLS label is associated with a forwarding equivalence
class (FEC). In this example, the FECs are network prefixes.
4.3.2 MPLS: Explicit Routing
R1 now has one next hop instead of five, resulting in simpler
______________________ tables.
4.3.3 MPLS: Virtual Private Networks and Tunnels
MPLS enabled routers also allow a network to use explicit
MPLS enabled routers allow tunnels through a network that can
routing (similar to source routing). R1 can use the Resource
Reservation Protocol (______________) to specify the R4-R5
path to R7. R2 can specify the R6 path. R1 and R2 attach
carry ______________________ data (ATM cells, Ethernet or
Frame Relay frames).
IP tunnels can be used similarly, but MPLS tunnels use a much
different labels to their packets.
shorter packet header.
The FEC is now based on the source router instead of the
destination
Tunneling of ATM cells through an MPLS tunnel. A _________
label (DL) identifies the virtual circuit. The tunnel label (TL) is
a standard MPLS label.
An ISP can use a network of MPLS enabled routers to create
__________________ networks for customers. A common
infrastructure is used, but each customer appears to have their
own private network.
10/13/2011
4 of 5
4.4 Routing among Mobile Hosts
Other applications would break if we assigned a new IP address
________ has been a key enabling technology that has made
to a host when it moves to a new network. For example, Voice
wireless hotspots feasible. It provides an IP address and the
over IP telephone calls, when a device moves between hotspots
identities of a default router and DNS server for new devices on or switches from wireless to 3G
a network. This is adequate for a large class of applications.
An example is shown at the right. The correspondent's packets
need to be re-routed to the receiver's new network. The
_________ group developed a procedure that allows a host to
keep its original IP address as it moves between networks.
Applications then continue to work seamlessly.
4.4.2 Routing to Mobile Hosts
Mobile IP requires special routers known as the _____________
and foreign agent respectively. The home agent intercepts
packets intended for the mobile host and tunnels the packets to
the foreign agent. The foreign agent delivers the packets to the
host.
4.4.2 Routing to Mobile Hosts - Optimization
Optimizing routes between correspondent node and mobile
4.4.2 Routing to Mobile Hosts - Mobility in Ipv6
Mobility is designed into IPv6. Any IPv6-capable host can
nodes is referred to as the triangle routing problem, since Mobile acquire an address whenever it is attached to a foreign network
IP path takes two side of a triangle rather than the direct path.
and can act as a foreign agent.
The solution is to tell the correspondent node the
Packets to the care-of address can contain an extension header
____________________ of the mobile node. Then the
with the home address. This allows the mobile node to present
correspondent node can create its own tunnel directly to the
the illusion that its IP address is fixed to the higher protocol
mobile node. In the best case, if they are on the same network,
layers.
the packets are addressed directly.
In-class Exercises: Start Homework 5
10/13/2011
5 of 5
Download