even more routing, and missing pieces

51
1 Even More Routing, and Missing Pieces EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC Berkeley

Upload: kalli

Post on 24-Feb-2016

39 views

Category:

Documents


0 download

DESCRIPTION

Even More Routing, and Missing Pieces. EE122 Fall 2012 Scott Shenker http:// inst.eecs.berkeley.edu /~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica , Vern Paxson and other colleagues at Princeton and UC Berkeley. Questions about Project 1. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Even More Routing,  and Missing Pieces

1

Even More Routing, and Missing Pieces

EE122 Fall 2012

Scott Shenkerhttp://inst.eecs.berkeley.edu/~ee122/

Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxsonand other colleagues at Princeton and UC Berkeley

Page 2: Even More Routing,  and Missing Pieces

Questions about Project 1

• Colin goes into cone of silence for next 30 hours

• So ask your questions now!

2

Page 3: Even More Routing,  and Missing Pieces

Today’s Lecture: A little of everything• Finishing up distance vector routing

– Last time we covered the good– This time we cover the bad and the ugly

• Covering some “missing pieces”– Maybe networking isn’t as simple as I said….

• Lots of details today…– So I will go slowly and ask you to do the computations– Will have you ask your neighbors if you can’t figure it out

o If they can’t figure it out, sit next to smarter people next time!3

Page 4: Even More Routing,  and Missing Pieces

Two Ways to Avoid Loops• Global state, local computation

– Link-state– Broadcast local information, construct network map

• Local state, global computation– Distance-Vector – Minimizing “cost” will produce loop-free routes– Iterative computation: no one knows the topology

4

Page 5: Even More Routing,  and Missing Pieces

5

Distance Vector Routing• Each router knows the links to its neighbors

– Does not flood this information to the whole network

• Each router has provisional “shortest path”– E.g.: Router A: “I can get to router B with cost 11”

• Routers exchange this Distance-Vector information with their neighboring routers– Vector because one entry per destination– Why only advertise “best” path? Why not two best?

o Loops and lies….

• Routers look over the set of options offered by their neighbors and select the best one

• Iterative process converges to set of shortest paths

Page 6: Even More Routing,  and Missing Pieces

6

Information Flow in Distance Vector

Host A

Host BHost E

Host D

Host C

N1 N2

N3

N4

N5

N7N6

Page 7: Even More Routing,  and Missing Pieces

Bellman-Ford Algorithm• INPUT:

– Link costs to each neighbor– Not full topology

• OUTPUT:– Next hop to each destination and the corresponding cost– Does not give the complete path to the destination

• My neighbors tell me how far they are from dest’n– Compute: (cost to nhbr) plus (nhbr’s cost to destination)– Pick minimum as my choice– Advertise that cost to my neighbors

7

Page 8: Even More Routing,  and Missing Pieces

8

Bellman-Ford Overview• Each router maintains a table

– Best known distance from X to Y, via Z as next hop = DZ(X,Y)

• Each local iteration caused by: – Local link cost change – Message from neighbor

• Notify neighbors only if least cost path to any destination changes– Neighbors then notify their neighbors if

necessary

wait for (change in local link cost or msg from neighbor)

recompute distance table

if least cost path to any dest has changed, notify neighbors

Each node:

Page 9: Even More Routing,  and Missing Pieces

Bellman-Ford Overview• Each router maintains a table

– Row for each possible destination– Column for each directly-attached

neighbor to node– Entry in row Y and column Z of node X

best known distance from X to Y, via Z as next hop = DZ(X,Y)

A C12

7

B D3

1

B CB 2 8C 3 7D 4 8

Node A

Neighbor (next-hop)

Destinations DC(A, D)

Page 10: Even More Routing,  and Missing Pieces

Bellman-Ford Overview• Each router maintains a table

– Row for each possible destination– Column for each directly-attached

neighbor to node– Entry in row Y and column Z of node X

best known distance from X to Y, via Z as next hop = DZ(X,Y)

A C12

7

B D3

1

B CB 2 8C 3 7D 4 8

Node A

Smallest distance in row Y = shortestDistance of A to Y, D(A, Y)

Page 11: Even More Routing,  and Missing Pieces

11

Distance Vector Algorithm (cont’d)

1 Initialization: 2 for all neighbors V do3 if V adjacent to A 4 D(A, V) = c(A,V);5 else 6 D(A, V) = ∞;7 send D(A, Y) to all neighbors loop: 8 wait (until A sees a link cost change to neighbor V /* case 1 */9 or until A receives update from neighbor V) /* case 2 */10 if (c(A,V) changes by ±d) /* case 1 */11 for all destinations Y that go through V do 12 DV(A,Y) = DV(A,Y) ± d 13 else if (update D(V, Y) received from V) /* case 2 */ /* shortest path from V to some Y has changed */ 14 DV(A,Y) = DV(A,V) + D(V, Y); /* may also change D(A,Y) */15 if (there is a new minimum for destination Y)16 send D(A, Y) to all neighbors 17 forever

• c(i,j): link cost from node i to j• DZ(A,V): cost from A to V via Z• D(A,V): cost of A’s best path to V

Page 12: Even More Routing,  and Missing Pieces

12

Distance Vector Algorithm (cont’d)

wait for (change in local link cost or msg from neighbor)

recompute distance table

if least cost path to any dest has changed, notify neighbors

Each node: initialize, then

Page 13: Even More Routing,  and Missing Pieces

13

Distance Vector Algorithm (cont’d)

1 Initialization: 2 for all neighbors V do3 if V adjacent to A 4 D(A, V) = c(A,V);5 else 6 D(A, V) = ∞;7 send D(A, Y) to all neighbors loop: 8 wait (until A sees a link cost change to neighbor V /* case 1 */9 or until A receives update from neighbor V) /* case 2 */10 if (c(A,V) changes by ±d) /* case 1 */11 for all destinations Y that go through V do 12 DV(A,Y) = DV(A,Y) ± d 13 else if (update D(V, Y) received from V) /* case 2 */ /* shortest path from V to some Y has changed */ 14 DV(A,Y) = DV(A,V) + D(V, Y); /* may also change D(A,Y) */15 if (there is a new minimum for destination Y)16 send D(A, Y) to all neighbors 17 forever

• c(i,j): link cost from node i to j• DZ(A,V): cost from A to V via Z• D(A,V): cost of A’s best path to V

Page 14: Even More Routing,  and Missing Pieces

Example: Initialization

A C12

7

B D3

1

B CB 2 ∞C ∞ 7D ∞ ∞

Node A

A C DA 2 ∞ ∞C ∞ 1 ∞D ∞ ∞ 3

Node B

Node C

A B DA 7 ∞ ∞B ∞ 1 ∞D ∞ ∞ 1

B CA ∞ ∞B 3 ∞C ∞ 1

Node D1 Initialization: 2 for all neighbors V do3 if V adjacent to A 4 D(A, V) = c(A,V);5 else 6 D(A, V) = ∞;7 send D(A, Y) to all neighbors

Page 15: Even More Routing,  and Missing Pieces

Example: C sends update to A

A C12

7

B D3

1

B CB 2 8C ∞ 7D ∞ 8

Node A

A C DA 2 ∞ ∞C ∞ 1 ∞D ∞ ∞ 3

Node B

Node C

A B DA 7 ∞ ∞B ∞ 1 ∞D ∞ ∞ 1

B CA ∞ ∞B 3 ∞C ∞ 1

Node D7 loop: …13 else if (update D(A, Y) from C) 14 DC(A,Y) = DC(A,C) + D(C, Y);15 if (new min. for destination Y)16 send D(A, Y) to all neighbors 17 forever

DC(A, B) = DC(A,C) + D(C, B) = 7 + 1 = 8

DC(A, D) = DC(A,C) + D(C, D) = 7 + 1 = 8

Page 16: Even More Routing,  and Missing Pieces

Example: Now B sends update to A

A C12

7

B D3

1

B CB 2 8C 3 7D 5 8

Node A

A C DA 2 ∞ ∞C ∞ 1 ∞D ∞ ∞ 3

Node B

Node C

A B DA 7 ∞ ∞B ∞ 1D ∞ ∞ 1

Node D7 loop: …13 else if (update D(A, Y) from B) 14 DB(A,Y) = DB(A,B) + D(B, Y);15 if (new min. for destination Y)16 send D(A, Y) to all neighbors 17 forever

DB(A, C) = DB(A,B) + D(B, C) = 2 + 1 = 3

DB(A, D) = DB(A,B) + D(B, D) = 2 + 3 = 5

B CA ∞ ∞B 3 ∞C ∞ 1

Make sure you know why this is 5, not 4!

Page 17: Even More Routing,  and Missing Pieces

Example: After 1st Full Exchange

A C12

7

B D3

1

B CB 2 8C 3 7D 5 8

Node A Node B

Node C

A B DA 7 3 ∞B 9 1 4D ∞ 4 1

Node D

B CA 5 8B 3 2C 4 1

End of 1st Iteration All nodes knows the best two-hop

paths

A C DA 2 8 ∞C 9 1 4D ∞ 2 3

Make sure you know why this is 3

Assume all send messages at same

time

Page 18: Even More Routing,  and Missing Pieces

Example: Now A sends update to B

A C12

7

B D3

1

B CB 2 8C 3 7D 5 8

Node A Node B

Node C

A B DA 7 3 ∞B 9 1 4D ∞ 4 1

Node D

B CA 5 8B 3 2C 4 1

A C DA 2 3 ∞C 5 1 4D 7 2 3

7 loop: …13 else if (update D(B, Y) from A) 14 DA(B,Y) = DA(B,A) + D(A, Y);15 if (new min. for destination Y)16 send D(B, Y) to all neighbors 17 forever

DA(B, C) = DA(B,A) + D(A, C) = 2 + 3 = 5

DA(B, D) = DA(B,A) + D(A, D) = 2 + 5 = 7

Where does this 5 come from?Where does this 7 come from?What harm does this cause?How could we fix this?

Page 19: Even More Routing,  and Missing Pieces

Example: End of 2nd Full Exchange

A C12

7

B D3

1

B CB 2 8C 3 7D 4 8

Node A

A C DA 2 3 11C 5 1 4D 7 2 3

Node B

Node C

A B DA 7 3 6B 9 1 4D 12 4 1

Node D

B CA 5 4B 3 2C 4 1

End of 2nd Iteration All nodes knows the best three-hop paths

Assume all send messages at same

time

Page 20: Even More Routing,  and Missing Pieces

Example: End of 3rd Full Exchange

A C12

7

B D3

1

B CB 2 8C 3 7D 4 8

Node A

A C DA 2 3 6C 5 1 4D 7 2 3

Node B

Node C

A B DA 7 3 5B 9 1 4D 11 4 1

Node D

B CA 5 4B 3 2C 4 1

End of 3rd Iteration: Algorithm

Converges!

What route does this 11 represent?

Assume all send messages at same

time

If you can’t figure it out after three

minutes, ask your neighbor

Page 21: Even More Routing,  and Missing Pieces

Intuition• Initial state: best one-hop paths• One simultaneous round: best two-hop paths• Two simultaneous rounds: best three-hop paths• …• Kth simultaneous round: best (k+1) hop paths

• Must eventually converge– as soon as it reaches longest best path

• …..but how does it respond to changes in cost?21

The key here is that the starting point is not the initialization, but some other set of entries. Convergence could be different!

Page 22: Even More Routing,  and Missing Pieces

22

Distance Vector: Link Cost Changes

A C14

50

B1

“goodnews travelsfast”

A CA 4 6C 9 1

Node B

A BA 50 5B 54 1

Node C

Link cost changes heretime

loop: 8 wait (until A sees a link cost change to neighbor V9 or until A receives update from neighbor V) /10 if (c(A,V) changes by ±d) /* case 1 */11 for all destinations Y that go through V do 12 DV(A,Y) = DV(A,Y) ± d 13 else if (update D(V, Y) received from V) /* case 2 */14 DV(A,Y) = DV(A,V) + D(V, Y); 15 if (there is a new minimum for destination Y)16 send D(A, Y) to all neighbors 17 forever

A CA 1 6C 9 1

A BA 50 5B 54 1

A CA 1 6C 9 1

A BA 50 2B 51 1

A CA 1 3C 3 1

A BA 50 2B 51 1

Page 23: Even More Routing,  and Missing Pieces

23

DV: Count to Infinity Problem

A C14

50

B60

“badnews travelsslowly”

Node B

Node C

Link cost changes here time

loop: 8 wait (until A sees a link cost change to neighbor V9 or until A receives update from neighbor V) /10 if (c(A,V) changes by ±d) /* case 1 */11 for all destinations Y that go through V do 12 DV(A,Y) = DV(A,Y) ± d 13 else if (update D(V, Y) received from V) /* case 2 */14 DV(A,Y) = DV(A,V) + D(V, Y); 15 if (there is a new minimum for destination Y)16 send D(A, Y) to all neighbors 17 forever

A CA 4 6C 9 1

A BA 50 5B 54 1

A CA 60 6C 9 1

A BA 50 5B 54 1

A CA 60 6C 9 1

A BA 50 7B 54 1

A CA 60 8C 9 1

A BA 50 7B 101 1

Make sure you know why this is 8

Page 24: Even More Routing,  and Missing Pieces

24

Distance Vector: Poisoned Reverse

A C14

50

B60• If B routes through C to get to A:

- B tells C its (B’s) distance to A is infinite (so C won’t route to A via B)

Node B

Node C

Link cost changes here; C updates D(C, A) = 60 as B has advertised D(B, A) = ∞

timeAlgorithm terminates

A CA 4 ∞C ∞ 1

A BA 50 5B 54 1

A CA 60 ∞C ∞ 1

A BA 50 5B 54 1

A CA 60 ∞C 9 1

A BA 50 61B ∞ 1

A CA 60 51C 110 1

A BA 50 ∞B ∞ 1

A CA 60 51C 110 1

A BA 50 ∞B ∞ 1

Page 25: Even More Routing,  and Missing Pieces

Will PR Solve C2I Problem Completely?

25

A C1

B

D

1

1 11 1

2 2

∞ ∞

100

100 1003

4

∞ 4

56

Page 26: Even More Routing,  and Missing Pieces

A few other inconvenient aspects• What if we use a non-additive metric?

– E.g., maximal capacity

• What if routers don’t use the same metric?– I want low delay, you want low loss rate?

• What happens if nodes lie?

26

Page 27: Even More Routing,  and Missing Pieces

Can You Use Any Metric?• We said that we can pick any metric. Really?• What about maximizing capacity?

27

Page 28: Even More Routing,  and Missing Pieces

What Happens Here?

28

All nodes want to maximize capacityA high capacity link gets reduced to low capacityProblem:“cost” does not change around loopHow could you fix this (without changing metric)?

Page 29: Even More Routing,  and Missing Pieces

No agreement on metrics?• If the nodes choose their paths according to

different criteria, then bad things might happen• Example

– Node A is minimizing latency– Node B is minimizing loss rate– Node C is minimizing price

• Any of those goals are fine, if globally adopted– Only a problem when nodes use different criteria

• Consider a routing algorithm where paths are described by delay, cost, loss

29

Page 30: Even More Routing,  and Missing Pieces

What Happens Here?

30

Low price link

Low loss link

Low delay linkLow loss link

Low delay linkLow price link

Cares about price, then loss

Cares about delay,then price

Cares about loss,then delay

Go figure this out in groups!Would path-vector fix this?

Page 31: Even More Routing,  and Missing Pieces

Must agree on loop-avoiding metric• When all nodes minimize same metric

• And that metric increases around loops

• Then process is guaranteed to converge

31

Page 32: Even More Routing,  and Missing Pieces

What happens when routers lie?• What if router claims a 1-hop path to everywhere?

• All traffic from nearby routers gets sent there

• How can you tell if they are lying?

• Can this happen in real life?– It has, several times….

32

Page 33: Even More Routing,  and Missing Pieces

Routing: Just the Beginning• Link state and distance-vector (and path vector)

are the deployed routing paradigms• But we know how to do much, much better…• Stay tuned for a later lecture where we:

– Reduce convergence time to zero– Deal with “policy oscillations”– Enable multipath routing

33

Page 34: Even More Routing,  and Missing Pieces

5 Minute Break

34

Page 35: Even More Routing,  and Missing Pieces

Missing Pieces

35

Page 36: Even More Routing,  and Missing Pieces

Where are we?• We have covered the “fundamentals”

– How to deliver packets (routing)– How to build reliable delivery on an unreliable network

• With this, we could build a decent network

• But couldn’t actually do anything with the network– Too many missing pieces

• We now want to identify those pieces– Will guide what we cover rest of semester 36

Page 37: Even More Routing,  and Missing Pieces

Scenario: Joan Wants Her Music• Joan is sitting in her dorm room, with a laptop

• Has overwhelming urge to listen to John Cage– In particular, his piece 4′33″

• What needs to happen to make this possible?

• Go one step at a time

37

Page 38: Even More Routing,  and Missing Pieces

What Are The Steps Involved?• Accessing the network from laptop

– Wireless or ethernet– Network management (someone needs to make it work)

• Mapping “real world name” to “network name”• Mapping network name to location• Download content from location• Addressing general security concerns

– Verifying that this is the right content– And that no one can tell what she’s downloading

38

Before I answer, jot down a few steps.This portion of the lecture won’t meanmuch if you don’t try to figure it out.

Did I miss anything?

Page 39: Even More Routing,  and Missing Pieces

Access Networks• If access network is “switched”, we understand it

– Just like any other packet-switched network

• If the access network is shared medium, then we need to figure out how to share the medium– Wireless– Classical ethernet

39

Page 40: Even More Routing,  and Missing Pieces

Media Access Control (MAC)• Carrier sense: (CSMA)

– Don’t send if someone else is sending

• Collision detection: (CD)– Stop if you detect someone else was also sending

• Collision avoidance: (CA)– How to arrange transmissions so that they don’t collide

40

This is the subject of my first CS paper.

Page 41: Even More Routing,  and Missing Pieces

Network Management• Control how network interconnects to Internet

– Interdomain routing

• Keep unwanted traffic off network– Firewalls and access control

• Share limited number of public addresses– NAT

• Keep links from overloading– Traffic engineering

Most undeveloped part of the Internet architecture

41

Page 42: Even More Routing,  and Missing Pieces

Current Network Management• No abstractions, no layers• Just complicated distributed algorithms

– Such as routing algorithms

• Or manual configuration– Such as Access Control Lists and Firewalls

42

Page 43: Even More Routing,  and Missing Pieces

Future Network Management• Clean abstractions• No complicated distributed algorithms• Treat networks like systems…

Two lectures later in semester!

Find out why stick shifts are the root of all evil in networking!

43

Page 44: Even More Routing,  and Missing Pieces

“Real World Name” to “Network Name”• Joan knows what music she wants

• Doesn’t know how to tell network what she wants

• Need to map “real world name” to network name

• Search engine!– Maps keywords to URL

44

How can we do this?

Page 45: Even More Routing,  and Missing Pieces

Map Network Name to Location• “Name resolution” converts name to location

• We would like location to be nearby copy– Speeds up download – Reduce load on backbone and access networks

45

Page 46: Even More Routing,  and Missing Pieces

How is this done today?• Name resolution: Domain Name System (DNS)

– Hand in a domain, get back an IP address

• Nearby copy of the data?– CDNs: content distribution networks (like Akamai)

• P2P systems can also point you to nearby content

46

Page 47: Even More Routing,  and Missing Pieces

Download Data from Location• Need a reliable transfer protocol: TCP

– Must share network with others: congestion control

• But must be able to use URL to retreive content– Need higher-level protocol like HTTP to coordinate

47

Page 48: Even More Routing,  and Missing Pieces

Ensuring Security• Privacy: prevent sniffers from knowing what she

downloaded (“it was for EE122, I promise!”)• Integrity: ensure data wasn’t tampered with during

its trip through network• Provenance: ensure that music actually came from

the music company (and not some imposter)

48

Page 49: Even More Routing,  and Missing Pieces

How do we do this today?• Cryptographic measures enable us to do all three• Public Key cryptography is crucial

– No need to share secrets beforehand

49

Page 50: Even More Routing,  and Missing Pieces

Scenario Requires• Media Access Control• Network management• Naming and name resolution• Content distribution networks• And perhaps P2P• Congestion control• HTTP• Cryptographic measures to secure content

50

Page 51: Even More Routing,  and Missing Pieces

Rest of Course• Details of IP and TCP

– Bringing reality to general concepts

• Filling in pieces of name resolution and HTTP• Congestion control• Advanced routing• Security• Ethernet and Wireless• Network Management• What if we were to redesign Internet from scratch

51