Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition By William Stallings Routing in Packet-Switching Network • Recall the function of a packet-switching network • To accomplish this, a path or route through the network must be determined. In general terms, routing seeks to design routes through the network for individual pairs of communicating end nodes such that the network is used efficiently. • • — To accept packets from a source station and deliver them to a destination station. — Routing is one of the most complex and crucial design aspects of switched data networks. Required characteristics of routing function: — Correctness — Simplicity — Robustness: the ability to deliver packets via some route in the face of localized failures and overloads — Stability — Fairness — Optimality — Efficiency: routing involves processing overhead & transmission overhead 2 Performance Criteria • The selection of a route is generally based on some performance criterion. • The simplest criterion: —Minimum-hop (the least number of nodes) • A generalization of minimum-hop criterion: —Least-cost routing: a cost is associated with each link • E.g., in minimum-hop, each link has a cost of 1 • The route that accumulates the least cost is sought. 3 Example Network Configuration Least-cost path from node 1 to 6 4 Decision Time and Place • Two characteristics of routing decision: — Time and place that the decision is made • Decision time — Datagram: a routing decision is made individually for each packet — Virtual circuit: a routing decision is made at the time the virtual circuit is established • Decision place: which node or nodes are responsible for the routing decision? — Distributed routing • Each node has the responsibility of selecting an output link for routing packets as they arrive — Centralized routing • Decision is made by some designated node — Source routing • Decision is made by the source station 5 Network Information Source and Update Timing • Routing decisions usually are based on knowledge of network (not always): topology, traffic load, link cost • Distributed routing — Nodes use local knowledge — May collect info from adjacent (directly connected) nodes — May collect info from all nodes on any potential route of interest • Centralized routing — Collect info from all nodes • Timing for node information update — Fixed strategy – the info is never updated — Adaptive strategy – the info is regularly updated 6 Routing Strategies • Many routing strategies have evolved in packetswitching networks. Four of them will be introduced here: —Fixed routing —Flooding —Random routing —Adaptive routing 7 Fixed Routing • A single, permanent route is configured for each source-destination (s-d) pair of nodes in the network. —Determine routes using any least-cost algorithm —The link costs could be based on expected traffic or capacity. • Routes are fixed, or at least only change when there is a change in network topology. • A central routing directory (table) is created, which shows for each s-d pair of nodes, the identity of the next node on the route. 8 Fixed Routing Tables Using the figure on Slide 4. It is not necessary to store the complete central routing directory for each pair of nodes. 9 Flooding • Flooding requires no network info. • A packet is sent by a source node to every neighbor. • At each node, an incoming packet is forwarded to all outgoing links except the incoming link. • Eventually a number of copies will arrive at destination. • Each packet is uniquely numbered so duplicates can be discarded. • Nodes can remember the identity of those packets it has already retransmitted. • Another technique: include a hop count field with each packet. Each time a node passes on a packet, it decrements the hop count by one. When the count reaches zero, the packet is discarded. — The hop count is sometimes called “time-to-live” (TTL) — Recall that TTL is also used in IP header which has nothing to do with flooding! 10 Flooding Example The TTL value decreases by one after each hop. 11 Properties of Flooding • All possible routes are tried —A packet will always get through if at least one path between source and destination exists. • At least one copy of the packet will have taken the minimum-hop-count route —Can be used to set up the virtual circuit • All nodes that are directly or indirectly connected to the source node are visited. —Useful to broadcast information (e.g. routing information) • Disadvantage: high traffic load 12 Random Routing • Random routing has the simplicity and robustness of flooding, with far less traffic load. • A node selects only one outgoing path to forward the incoming packet —The outgoing link can be selected at random, excluding the link on which the packet arrived. • A refinement is to select outgoing path based on probability calculation • Like flooding, no network info needed • Disadvantage: route is typically not least-cost nor minimum-hop 13 Adaptive Routing • Routing decisions change as conditions on the network change — Failure: node or link fails — Congestion: a portion of the network is heavily congested • Requires info about the state of the network • Drawbacks, compared to fixed routing — Routing decision is more complex; the processing burden on nodes increases — A tradeoff between quality of network info and the cost of updating such info • Advantages — Improved performance — Can aid in congestion control, because an adaptive routing strategy tends to balance loads. 14 Least Cost Algorithms • Virtually all packet-switching networks base their routing decisions on some form of lest-cost criterion. — Can minimize hop with each link cost 1 — Can have link value inversely proportional to capacity • Least-cost routing problem — Given a network of nodes connected by bi-directional links, where each link has a cost associated with it in each direction, define the cost of a path between two nodes as the sum of costs of links traversed. For each pair of nodes, find a path with the least cost. • Two common algorithms — Dijkstra’s algorithm — Bellman-Ford algorithm 15 Dijkstra’s Algorithm Definitions • Find the shortest paths from a single source node to all other nodes, by developing paths in order of increasing path length • N = set of nodes in the network • s = source node • T = set of nodes so far incorporated by the algorithm (its leastcost path to s is finalized) • w(i, j) =link cost from node i to node j — w(i, i) = 0 — w(i, j) = if the two nodes are not directly connected — w(i, j) 0 if the two nodes are directly connected • L(n) = cost of the least-cost path from node s to node n that is currently known to the algorithm — At termination, L(n) is cost of the least-cost path from s to n — Initially, all L(n) are 16 Dijkstra’s Algorithm Method • Step 1 [Initialization] — T = {s}: the set of nodes so far incorporated consists of only the source node — L(n) = w(s, n) for n ≠ s: the initial path costs to neighboring nodes are simply the link costs • Step 2 [Get Next Node] — Find the neighboring node not in T with the least-cost path from s (smallest L(n) ) — Incorporate that node into T — Also incorporate the edge that is incident on that node and a node in T that contributes to the path • Step 3 [Update Least-Cost Paths] — L(n) = min[L(n), L(x) + w(x, n)] for all n T — If the latter term is smaller, the path from s to n is now updated as the path from s to x extended with the edge from x to n 17 Dijkstra’s Algorithm Notes • Terminate when all nodes have been added to T • At termination, value L(n) associated with each node n is the cost of least-cost path from s to n. • In addition, algorithm defines the least-cost path from s to each other node • One iteration of steps 2 and 3 adds one new node to T, and defines the least-cost path from s to that node 18 Example of Dijkstra’s Algorithm 19 Example of Dijkstra’s Algorithm S=1 20 Bellman-Ford Algorithm Definitions • Find the least-cost paths from a given source node subject to constraint that the paths contain at most one link, then find the shortest paths with a constraint of paths of at most two links, and so on. • Finally, this algorithm returns the least-cost paths between any pairs of nodes. • s = source node • w(i, j) = link cost from node i to node j — w(i, i) = 0 — w(i, j) = if the two nodes are not directly connected — w(i, j) 0 if the two nodes are directly connected • h = maximum number of links in a path at the current stage of the algorithm • Lh(n) = cost of the least-cost path from s to n under the constraint of no more than h links 21 Bellman-Ford Algorithm Method • Step 1 [Initialization] —L0(n) = , for all n s —Lh(s) = 0, for all h • Step 2 [Update] —For each successive h 0 • For each n ≠ s, compute Lh+1(n)=min{ Lh(n), minj[Lh(j)+w(j,n)] } • It means “the least-cost path from s to n of length h+1 is the least-cost path of length h, or it is actually a length h+1 path, and before it reaches n, it passes through j” 22 Example of Bellman-Ford Algorithm 23 Example of Bellman-Ford Algorithm S=1 24 Comparison • What information needs to be gathered? • Bellman-ford —Each node can maintain a set of costs and associated paths for every other node and exchange this information with its direct neighbors from time to time —Each node can update its costs and paths using only the information from its neighbors and knowledge of its link costs. • Dijkstra’s algorithm —Each node must have complete topological information about the network 25