14
ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Embed Size (px)

Citation preview

Page 1: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

ECE 544 Project3

Amith V.S

Pavan Kulkarni

Suneet Dixit

Page 2: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Assumptions and Address Scheme Assumptions

Routers do not fail in the life time of the Network. Router to Router Links do not fail in the life time of the

Network. IPs of all the Routers are preassigned. Routers assign IPs to all the hosts in the Network.

Naming scheme and eventual address scheme Edge routers are assigned IPs in the form X.X.n.0 where n

ranges from 1-254. End hosts are assigned IPs in the form X.X.n.h where n is the

subnet number as assigned above and h ranges from 1-254 (since no. of hosts connected to network N < 255).

Content files are identified by their content ID ranging from 1-254 (since no. of contents in the network K < 255).

Page 3: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Bootstrapping and Discovery

Modified Link State Algorithm - MLSF Extends the functionality of Link state algorithm

to support the functionality of Content Provider Network.

Initially each of the edge router sends the contents that are available in their subnet along with the distance vector to their adjacent routers.

After the convergence of the network each of the router will have a table as shown below:

Time Stamp

Destination Cost Next Hop Contents

Page 4: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Bootstrapping and Discovery Discovery

Routers discover other routers with Hello Packets as shown Below :

Edge routers discover their hosts and contents present in them with Hello Packets as shown below :

Router Source IP Content Indicator Array

32 Bits 256 Bits

Host IP address Content ID array

32 bits Variable Length

Page 5: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Baseline Algorithm

Content routing algorithm Once the Modified Distance Vector Algorithm – Routing

Table is established in each of the Router, the network is now ready to respond to the get(ContentID) request.

How to route a content-request packet? For each of the request issued by a host, the packets are

generated in following format:

The edge router receives this packet and converts it into

Router-Router request packet as shown below:

Host Source IP Flag Content ID

32 Bits 8 bits 8 bits

Host Source IP Destination Router IP

Flag Content ID

32 Bits 32 Bits 8 Bits 8 Bits

Page 6: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Baseline Algorithm How to route a content-request packet(cont..)?

This packets traverses the network through the shortest path and reaches the edge router which is connected to the host which has the content.

Each edge Router has a table mapping the Hosts IP address to the contents the host has.

Referring to this table the packet is forwarded to the appropriate host.

The host extracts the packet and gets the content ID requested and generates the response packet as shown

Host Destination IP

Flag Content ID Content

32 Bits 8 Bits 8 Bits Upto 1466 Bytes

Page 7: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Baseline Algorithm How the content is actually delivered?

While the request packet traverses through the network it updates the bread crumbs table as shown below present in each router :

The response packet refers the bread crumbs table to get the next hop.

How network is updated when a host has a new content? When a host has a new content, a new content packet is

generated as shown and forwarded to the edge router:

Destination IP address Next Hop IP address

32 Bits 32 Bits

Host Source IP

Flag Content ID Time Stamp

32 bits 8 bits 8 bits 32 Bits

Page 8: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Baseline Algorithm How network is updated when a host has a new

content(cont..)? The edge router gets this packet replaces the

host IP address with its own IP address and broadcasts the packet to all the connecting Routers.

This is continued as Spanning tree algorithm with Time Stamp as the update parameter. Thus all the router's MDVA table is updated.

How network is updated when a host deletes a content(cont..)? The same procedure is followed as above with

the flag set to delete content.

Page 9: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Data Transfer and Reliability

Message Forward Host – Router is Unicast Hello Packets and Update Packets between

Routers is Multicast

ARQ Scheme Hop-by-hop acknowledgement scheme is being

used at every router

Page 10: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Advantages

Algorithm: A modified version of the Distance Vector Table is being used which efficiently calculates the shortest path to the host which has the required contents

Scalability: The method employed can be extended by using the unused bits of the IP address making the system scalable

Latency: The method employs bread crumbs to send data back to the requesting host. In this way a low latency is maintained

Page 11: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Disadvantages

As Distance Vector Algorithm is a decentralized routing algorithm, it takes time to converge the table

Hop-by-hop acknowledgement scheme may introduce latency

Page 12: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Appendix: Network Architecture

Example scenarios for analysis purposes:

H1

H2

H3

C1C1 C2C2

C3C3

R1 R2 R3 R4

R5

Scenario 1: @host_H2: get (content_C3)

Page 13: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Appendix: Network Architecture

H1

H2

H3

C1C1

C2C2

C2C2

C3C3

C3C3

R1 R2 R3 R4

R5

Scenario 2: @host_H1: get (content_C2)

Page 14: ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Appendix: Network Architecture

H1

C3C3

Scenario 3: @host_H1: get (content_C1)

H2 H3 H4

C1C1 C1C1C2C2

C1C1