Computer Networks. Main Functions
|
|
- Erika Ramsey
- 8 years ago
- Views:
Transcription
1 Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2
2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching Subnet fig 5-1. Host sends packet to nearest router.. Packet forwarded to next router.. Until packet reaches destination. 4
3 Services What kind of services provided to transport layer? Connection-oriented versus connectionless service? 5 Connectionless Service Datagram network. Move all intelligence to the edges. Routers just route. Everything else should be done end-to-end. No ordering, no flow/congestion control, no reliable delivery. Best-effort service model. Packets are routed independently E.g., Internet. 6
4 Connection-Oriented Service Virtual circuit networks. `A la telephone network. Reliable, ordered service. Virtual connection established from source to destination. E.g., X-25, ATM. 7 Datagram Network Operation How does it work? Data from transport layer is broken into packets, or datagrams. Network layer at host adds network-layer header and forwards packets to directlyconnected router. 8
5 Datagram Network: Example Routing within a diagram subnet. 9 Virtual Circuit Network Operation Connection-establishment before sending data. All traffic for that connection follows same route. 10
6 Virtual Circuit Network: Example Routing within a virtual-circuit subnet. 11 Virtual-Circuit versus Datagram Subnets
7 Routing 13 Routing One of the main functions of network layer. Routing versus forwarding? Datagram versus VC networks? 14
8 Routing Algorithm Computes routing tables. Properties: Correctness. Robustness. Stability. Optimality. Try to optimize a certain metric. 15 Optimality Principle General statement about optimal routes (topology, routing algorithm independent). If router J is on optimal path between I and K, then the optimal path from J to K also falls along the same route. Proof by contradiction. Corollary: Set of optimal routes from all sources to destination form a tree rooted at destination. Sink tree. 16
9 Types of Routing Algorithms Non-adaptive versus adaptive. 17 Adaptive and Non-adaptive Routing Non-adaptive routing: Fixed routing, static routing. Do not take current state of the network (e.g., load, topology). Routes are computed in advance, off-line, and downloaded to routers when booted. Adaptive routing: Routes change dynamically as function of current state of network. Algorithms vary on how they get routing information, metrics used, and when they change routes. 18
10 Static Algorithms (Non-Adaptive) 1.Shortest-path routing. 2.Flooding. 19 Shortest-Path Routing Problem: Given a graph, where nodes represent routers and edges, links, find shortest path between a given pair of nodes. What is shortest in shortest path? Depends on the routing metric in use. Example: number of hops (static), geographic distance (static), delay, bandwidth (raw versus available), combination of a subset of these. Dijkstra s shortest-path algorithm (1959). 20
11 Dijkstra s Shortest-Path Algorithm Initially, links are assigned costs. As the algorithm executes, nodes are labeled with its distance to source along best known path. Initially, no routes known, so all nodes are labeled with infinity. Labels change as the algorithm proceeds. Labels can be temporary or permanent. Initially all labels are tentative. A label becomes permanent if it represents the shortest path from the source to the node. 21 Shortest Path Routing Find shortest-path from A to D: Start Label each adjacent node with distance to A. B is made permanent. 22
12 Flooding Every incoming packet forwarded on every outgoing link except the one it arrived on. Problem: duplicates. Constraining the flood: Hop count. Keep track of packets that have been flooded. Robust, shortest delay (picks shortest path as one of the paths). 23 Flooding: Example Stallings Figure 12.4 (hop-count=3) 24
13 Dynamic Routing Algorithms (Adaptive Routing) Distance vector routing. Link state routing. 25 Distance Vector Routing Aka, Bellman-Ford (1957), Ford-Fulkerson (1962). Original ARPANET routing; also used by Internet s RIP. Each router keeps routing table (or routing vector) with best known distance to each destination and corresponding outgoing interface. Routing tables are updated by exchanging routing information with neighbors. 26
14 Distance Vector (Cont d) Routing table at each router: One entry per participating router. Each entry contains outgoing interface and distance to corresponding destination. Metric: number of hops, delay, queue length. Each router knows distance to its neighbors. Old ARPANET algorithm: DV where cost metric is outgoing link queue length. 27 Distance Vector Routing (a) A subnet. (b) Input from A, I, H, K, and the new routing table for J. 28
15 Routing Updates Every T interval, routers exchange routing updates. Routing update from router X consists of a vector with all destinations and the corresponding distance from X to them. When router Y receives an update from X, it can estimate its distance to router Z through X as D yz = D yx + D xz. Router Y receives update from all its neighbors and builds a new RT Distance Vector: Example Node Distance Next T=T 2 Node Distance Next T=T 0 T=T 1 30
16 1.Routing loops. 2.Slow convergence. 3.Counting to infinity. Problems 31 Count-to-Infinity Good news propagate faster. A B C D E Initially, A down: A comes up: infinity 1 infinity infinity infinity infinity infinity infinity (after 1 exchange) 1 2 infinity infinity (after 2 exchanges) infinity (after 3 exchanges) (after 4 exchanges) 32
17 Count-to-Infinity (Cont d) But, bad news propagate slower! A B C D E Initially, all up: A goes down: (after 1 exchange) (after 2 exchanges) (after 3 exchanges) (after 4 exchanges) (after 5 exchanges) (after 6 exchanges). infinity 33 Count-to-Infinity (Cont d) Gradually routers work their way up to infinity. Number of exchanges depends on how large is infinity. To reduce number of exchanges, if metric is number of hops, infinity=maximum path+1. 34
18 Solution Routing loops: Path vector: record actual path used in the DV. Previous hop tracing: records preceding router. Count-to-infinity: Split horizon: router reports to neighbor cost infinity for destination if route to that destination is through that neighbor. 35 Split Horizon Tries to make bad news spread faster. A node reports infinity as distance to node X on link packets to X are sent. Example, in the first exchange, C tells D its distance to A but tells B its distance to A is infinity. So B discovers its link to A is down and C s distance to A is infinity; so it sets its distance to A to infinity. 36
19 Link State Routing DV routing used in the ARPANET until 1979, when it was replaced by link state routing. Used by the Internet s OSPF. Based on Dijkstra s all pairs shortest path algorithm. Plus link state updates. 37 Link State Routing (Cont d) Link state routing is based on: Discover your neighbors and measure the communication cost to them. Send updates about your neighbors to all other routers. Compute shortest path to every other router. 38
20 Finding Neighbors When router is booted, its first task is to find who its neighbors are. Special single-hop hello packets. Cost metric: Number of hops: in this case, always 1. Delay: echo packets and measure RTT/2. Load? 39 Generating Link State Updates Link state packets (LSP). Sender identity. Sequence number. TTL. List of (neighbor, cost). When to send updates? Proactive: periodic updates; how often? Reactive: whenever some significant event is detected, e.g., link goes down. Where to send them? Everywhere: flood. 40
21 Processing Updates When LSP is received: Check sequence number. If higher than current sequence number, keep it and flood it; otherwise, discard it. Periodically decrement TTL. When TTL=0, purge LSP. 41 Computing Routes Routers have global view of network. They receive updates from all other routers with their cost to their neighbors. Build network graph. Use Dijkstra s shortest-path algorithm to compute shortest paths to all other nodes. 42
22 Measuring Line Cost A subnet in which the East and West parts are connected by two lines. 43 Building Link State Packets (a) A subnet. (b) The link state packets for this subnet. 44
23 Distributing the Link State Packets B s LSP buffer: each row corresponds to a recently LSP that hasn t been processed yet. 45 Link State Routing: Problems Scalability: Storage: kn, where n is number of routers and k is number of neighbors. Computation time. LSP propagation via flooding. 46
24 DV: DV versus LS Node tells its neighbors what it knows about everybody. Based on other s knowledge, node chooses best route. Distributed computation. LS: Node tells everyone what it knows about its neighbors. Every node has global view. Compute their own routes. 47 Hierarchical Routing For scalability: As network grows, so does RT size, routing update generation, processing, and propagation overhead, and route computation time and resources. Divide network into routing regions. Routers within region know how to route packets to all destinations within region. But don t know how to route within other regions. Border routers: route within regions. 48
25 Hierarchical Routing: Example Flat routing: 1B 1A 1C 3A 3B 2C 4A 2A 2B 2D 5B 5A 5C 4B 4C 5E 5D 1A Dest. Next Hops 1A - - 1B 1B 1 1C 1C 1 2A 1B 2 2B 1B 3 2C 1B 3 2D 1B 4 3A 1C 3 3B 1C 2 4A 1C 3 4B 1C 4 4C 1C 4 5A 1C 4 5B 1C 5 5C 1B 5 5D 1C 6 5E 1C 5 49 Hierarchical Routing: Example Hierarchy: 1B 1A 1C 3A 3B 2A 2B 4A 2C 2D 5B 5A 5C 4B 4C 5E 5D 1A Dest. Next Hops 1A - - 1B 1B 1 1C 1C 1 2 1B 2 3 1C 2 4 1C 3 5 1C 4 50
26 Hierarchical Routing Optimal paths are not guaranteed. Example: 1A->5C should be via 2 and not 3. How many hierarchical levels? Example: 720 routers. 1 level: each router needs 720 RT entries. 2 levels: 24 regions of 30 routers: each router s RT has entries. 3 levels: 8 clusters of 9 regions with 10 routers: each router s RT Many-to-Many Routing Support many-to-many communication. Example applications: multi-point data distribution, multi-party teleconferencing. 52
27 Broadcasting Send to ALL destinations. Several possible routing mechanisms to broadcasting. Simplistic approach: send separate packet to each destination. Simple but expensive. Source needs to know about all destinations. Flooding: May generate too many duplicates (depending on node connectivity). 53 Multidestination Routing Packet contains list of destinations. Router checks destinations and determines on which interfaces it will forward packet. Router generates new copy of packet for each output line and includes in packet only the appropriate set of destinations. Eventually, packets will only carry 1 destination. 54
28 Spanning Tree Routing Use spanning tree (sink tree) rooted at broadcast initiator. No need for destination list. Each on spanning tree forwards packets on all lines on the spanning tree (except the one the packet arrived on). Efficient but needs to generate the spanning tree and routers must have that information. 55 Reverse Path Forwarding Routers don t have to know spanning tree. Router checks whether broadcast packet arrived on interface used to send packets to source of broadcast. If so, it s likely that it followed best route and thus not a duplicate; router forwards packet on all lines. If not, packet discarded as likely duplicate. 56
29 Broadcast Routing Reverse path forwarding. (a) A subnet. (b) a Sink tree. (c) The tree built by reverse path forwarding. 57 Multicasting Special form of broadcasting: Instead of sending messages to all nodes, send messages to a group of nodes. Multicast group management: Creating, deleting, joining, leaving group. Group management protocols communicate group membership to appropriate routers. 58
30 Multicast Routing Each router computes spanning tree covering all other participating routers. Tree is pruned by removing that do not contain any group members. 1, , , , Shared Tree Multicasting Source-rooted tree approaches don t scale well! 1 tree per source, per group! Routers must keep state for m*n trees, where m is number of sources in a group and n is number of groups. Core-based trees: single tree per group. Host unicast message to core, where message is multicast along shared tree. Routes may not be optimal for all sources. State/storage savings in routers. 60
31 Internetworking 61 Internetworking What is it? Connecting networks together forming a single internet. 62
32 Connecting Networks A collection of interconnected networks. 63 How Networks Differ
33 How Networks Can Be Connected (a) Two Ethernets connected by a switch. (b) Two Ethernets connected by routers. 65 How to Internet? Connection-oriented versus connectionless internetworking. Connection oriented internetworking: Based on VC concatenation. Connectionless internetworking follows the datagram model. 66
34 Concatenated Virtual Circuits Gateway. Builds VC crossing the different networks.. Use of gateways to perform necessary conversions. 67 Connectionless Internetworking. Follows datagram model.. Packets from Host X to Host Y may follow different routes.. Gateways make routing decisions and perform translations. 68
35 Translating versus Gluing Translation: converting between different protocols. Hard! Alternative: gluing. I.e., using the same network layer protocol everywhere. That s what IP does! 69 Tunneling Interconnecting source and destination on separate networks but of the same type. S D 70
36 Tunneling Analogy 71 More Tunneling 72
37 Internetworking 73 Internetwork Routing Inherently hierarchical. Routing within each network: interior gateway protocol (IGP). Routing between networks: exterior gateway protocol (EGP). Within each network, different routing algorithms can be used. Each network is autonomously managed and independent of others: autonomous system (AS). 74
38 Internetwork Routing: Example (a) An internetwork. (b) A graph of the internetwork. 75 Internetwork Routing (Cont d) Typically, packet starts in its LAN. Gateway receives it (broadcast on LAN to unknown destination). Gateway sends packet to gateway on the destination network using its routing table. If it can use the packet s native protocol, sends packet directly. Otherwise, tunnels it. 76
39 Fragmentation Happens when internetworking. Network-specific maximum packet size. Width of TDM slot. OS buffer limitations. Protocol (number of bits in packet length field). Maximum payloads range from 48 bytes (ATM cells) to 64Kbytes (IP packets). 77 Problem What happens when large packet wants to travel through network with smaller maximum packet size? Fragmentation. Gateways break packets into fragments; each sent as separate packet. Gateway on the other side have to reassemble fragments into original packet. 2 kinds of fragmentation: transparent and nontransparent. 78
40 Types of Fragmentation (a) Transparent fragmentation. Nontransparent fragmentation. (b) 79 Transparent Fragmentation Small-packet network transparent to other subsequent networks. Fragments of a packet addressed to the same exit gateway, where packet is reassembled. OK for concatenated VC internetworking. Subsequent networks are not aware fragmentation occurred. ATM networks (through special hardware) provide transparent fragmentation. 80
41 Problems with Transparent Fragmentation Exit gateway must know when it received all the pieces. Fragment counter or end of packet bit. Some performance penalty but requiring all fragments to go through same gateway. May have to repeatedly fragment and reassemble through series of small-packet networks. 81 Non-Transparent Fragmentation Only reassemble at destination host. Each fragment becomes a separate packet. Thus routed independently. Problems: Hosts must reassemble. Every fragment must carry header until it reaches destination host. 82
42 Keeping Track of Fragments Fragments must be numbered so that original data stream can be reconstructed. Tree-structured numbering scheme: Packet 0 generates fragments 0.0, 0.1, 0.2, If these fragments need to be fragmented later on, then 0.0.0, 0.0.1,, 0.1.0, 0.1.1, But, too much overhead in terms of number of fields needed. Also, if fragments are lost, retransmissions can take alternate routes and get fragmented differently. 83 Keeping Track of Fragments (Cont d) Another way is to define elementary fragment size that can pass through every network. When packet fragmented, all pieces equal to elementary fragment size, except last one (may be smaller). Packet may contain several fragments. 84
43 Fragmentation: Example Fragmentation when the elementary data size is 1 byte. (a) Original packet, containing 10 data bytes. (b) Fragments after passing through a network with maximum packet size of 8 payload bytes plus header. (c) Fragments after passing through a size 5 gateway. 85 Keeping Track of Fragments Header contains packet number, number of first fragment in the packet, and last-fragment bit. Last-fragment bit 1 byte A B C D E F G H I J Packet number Number of first fragment (a) Original packet with 10 data bytes A B C D E F G H I J (b) Fragments after passing through network with maximum packet size = 8 bytes. 86
44 The Internet 87 Design Principles for Internet Keep it simple. Exploit modularity. Expect heterogeneity. Think robustness. Avoid static options and parameters. Think about scalability. Consider performance and cost. 88
45 Internet as Collection of Subnetworks 89 IP (Internet Protocol) Glues Internet together. Common network-layer protocol spoken by all Internet participating networks. Best effort datagram service: No reliability guarantees. No ordering guarantees. 90
46 IP Transport layer breaks data streams into datagrams; fragments transmitted over Internet, possibly being fragmented. When all packet fragments arrive at destination, reassembled by network layer and delivered to transport layer at destination host. 91 IPv4: IP version 4. IP Versions Current, predominant version. 32-bit long addresses. IPv6: IP version 6 (aka, IPng). Evolution of IPv4. Longer addresses (16-byte long). 92
47 IP Datagram Format IP datagram consists of header and data (or payload). Header: 20-byte fixed (mandatory) part. Variable length optional part. 93 The IP v4 Header 94
48 IP Options IP address formats. IP Addresses 96
49 IP Addresses (Cont d) Class A: 128 networks with 16M hosts each. Class B: 16,384 networks with 64K hosts each. Class C: 2M networks with 256 hosts each. More than 500K networks connected to the Internet. Network numbers centrally administered by ICANN. 97 IP Addresses (Cont d) Special IP addresses. 98
50 Scalability of IP Addresses Problem: a single A, B, or C address refers to a single network. As organizations grow, what happens? 99 Example: A Campus Network 100
51 Solution Subnetting: divide the organization s address space into multiple subnets. How? Use part of the host number bits as the subnet number. Example: Consider a university with 35 departments. With a class B IP address, use 6-bit subnet number and 10-bit host number. This allows for up to 64 subnets each with 1024 hosts. 101 Subnets A class B network subnetted into 64 subnets. 102
52 Subnet Mask Indicates the split between network and subnet number + host number. Subnet Mask: or /22 (network + subnet part) 103 Subnetting: Observations Subnets are not visible to the outside world. Thus, subnetting (and how) is a decision made by local network admin. 104
53 Subnet: Example Subnet 1: Subnet 2: Subnet 3: Problem with IPv4 IPv4 is running out of addresses. Problem: class-based addressing scheme. Example: Class B addresses allow 64K hosts. More than half of Class B networks have fewer than 50 hosts! 106
54 Solution: CIDR CIDR: Classless Inter-Domain Routing. RFC Allocate remaining addresses in variablesized blocks without considering classes. Example: if an organization needs 2000 addresses, it gets 2048-address block. Forwarding had to be modified. Routing tables need an extra entry, a 32-bit mask, which is ANDed with the destination IP address. If there is a match, the packet is forwarded on that interface. 107 Network Address Translation Another quick fix to the address shortage in IP v4. Specified in RFC Each organization gets a single (or small number of) IP addresses. This is used for Internet traffic only. For internal traffic, each host gets its own internal IP address. Three IP ranges have been declared as private / / /16 No private IP address can show up on the Internet, i.e., outside the organization s network. 108
55 NAT Network Address Translation 109 Internet Control Protocols Companion protocols to IP. Control protocols used mainly for signaling and exchange of control information. Examples: ICMP, ARP, RARP, BOOTP, and DHCP. 110
56 ICMP Internet Control Message Protocol. A way to debug the Internet and find out what is happening at routers. Defines a dozen different messages that are generated typically by routers upon some unexpected event. 111 ICMP Message Types
57 Address Resolution Protocol ARP. RFC 826. Protocol for machines to map IP addresses to Ethernet addresses. This is needed when packet needs to be delivered to a local host on a LAN (Ethernet). 113 ARP: Example. Host 1 wants to send packet to host 2.. Assume that host 1 knows host 2 s IP address.. Host 1 builds packet with host 2 s IP address.. IP knows it s a local destination but now needs host 2 s Ethernet address. 114
58 ARP Operation Host 1 broadcasts an ARP request on the Ethernet asking who owns host 2 s IP address. Host 2 replies with its Ethernet address. Some optimizations: ARP caches. Piggybacking host s own Ethernet address on ARP requests. Proxy ARP: services ARP requests for hosts on separate LANs. 115 Beyond ARP ARP solves the problem of mapping IP address to Ethernet address. How do we solve the inverse problem? I.e., how to map an Ethernet address to an IP address? Older protocols: RARP (RFC 903) and BOOTP (RFC 951). RARP broadcasts not forwarded by routers. BOOTP uses UDP but requires manual configuration of IP-Ethernet mappings. 116
59 DHCP Dynamic Host Configuration Protocol. RFCs 2131 and Assigns IP addresses to hosts dynamically. DHCP server may not be on the same LAN as requesting host. DHCP relay agent. 117 DHCP Operation Newly booted host broadcasts a DHCP DISCOVER message. DHCP relay agent intercepts DHCP DISCOVERs on its LAN and unicasts them to DHCP server. 118
60 DHCP Operation 119 DHCP: Address Reuse How long should an IP address be allocated? Issue: hosts come and go. IP addresses may be assigned on a Lease basis. Hosts must renew their leases. 120
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
More informationChapter 6. The Network Layer
Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented
More informationCollege 5, Routing, Internet. Host A. Host B. The Network Layer: functions
CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:
More informationChapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):
Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is Store-and-Forward packet switching? What is a connectionless
More informationInternet Control Message Protocol (ICMP)
SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationInternetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationRoute Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationIntroduction to LAN/WAN. Network Layer (part II)
Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationIP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationWide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
More informationInternet Protocol version 4 Part I
Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents
More informationRouter and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
More informationRouting with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:
How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in
More informationInternet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
More informationOutline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms
Outline Internet Routing Venkat Padmanabhan Microsoft Research 9 pril 2001 Routing algorithms distance-vector (DV) link-state (LS) Internet Routing border gateway protocol (BGP) BGP convergence paper Venkat
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationRouting in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
More informationComputer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
More informationThe Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
More informationCHAPTER 10 IP MULTICAST
CHAPTER 10 IP MULTICAST This chapter is about IP multicast, the network layer mechanisms in the Internet to support applications where data is sent from a sender to multiple receivers. The first section
More informationDynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics
CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60
More informationEfficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationFuture Internet Technologies
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
More informationInternet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
More information(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
More informationICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationLecture 12: Link-state Routing"
Lecture 2: Link-state Routing" CSE 23: Computer Networks Alex C. Snoeren HW 3 due next Tuesday! Lecture 2 Overview" Routing overview Intra vs. Inter-domain routing Link-state routing protocols CSE 23 Lecture
More informationDistance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
More informationITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1
IP Routing Primer Paul C. Huang, Ph.D. ITRI / / N300 /N300; Paul Huang 1999/6/2 1 Basic Addressing / Subnetting Class A 0 Network Host Host Host 127 networks / 16,777,216 hosts Class A natural mask 255.0.0.0
More informationCS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationThe Network Layer Functions: Congestion Control
The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More information6.263 Data Communication Networks
6.6 Data Communication Networks Lecture : Internet Routing (some slides are taken from I. Stoica and N. Mckewon & T. Griffin) Dina Katabi dk@mit.edu www.nms.csail.mit.edu/~dina Books Text Book Data Communication
More informationScaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1
Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg
More informationChapter 10 Link-State Routing Protocols
Chapter 10 Link-State Routing Protocols CCNA2-1 Chapter 10 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
More informationNetwork Layer: Address Mapping, Error Reporting, and Multicasting
CHAPTER 21 Network Layer: Address Mapping, Error Reporting, In Chapter 20 we discussed the Internet Protocol (IP) as the main protocol at the network layer. IP was designed as a best-effort delivery protocol,
More informationCS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that
More informationNetwork Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationChapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
More informationNetwork layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
More informationInterconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
More informationFaculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
More informationAdvanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP
Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Renato Lo Cigno Routing Algorithms: One or Many? Is there a single routing protocol in the Internet? How can different protocols and algorithms
More information640-816: Interconnecting Cisco Networking Devices Part 2 v1.1
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions
More information04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
More informationLecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage
Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing
More informationIntroduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
More informationAddress Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)
Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: Arto.Karila@hut.fi
More informationLayer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More informationCSE331: Introduction to Networks and Security. Lecture 8 Fall 2006
CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol
More informationOSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).
OSPF Version 2 (RFC 2328) Interior gateway protocol (IGP). Routers maintain link-state database. Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs). Router
More information10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationCS 3251- Computer Networks 1: Routing Algorithms
CS 35- Computer Networks : Routing Algorithms Professor Patrick Tranor 0//3 Lecture 3 Reminders The due date for Homework was moved to Thursda. Reason: Allow ou to attend toda s lecture. Project is still
More informationDynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
More informationAssignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
More informationIP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface
IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More information- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
More informationDG Forwarding Algorithm
DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router
More informationHOST AUTO CONFIGURATION (BOOTP, DHCP)
Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration
More informationSavera Tanwir. Internet Protocol
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
More informationChapter 13 Internet Protocol (IP)
Chapter 13 Internet Protocol (IP) Introduction... 13-5 IP Packets... 13-5 Addressing... 13-7 Subnets... 13-8 Assigning an IP Address... 13-9 Multihoming... 13-11 Local Interfaces... 13-11 Address Resolution
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationIP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
More informationGary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
More informationInternet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More informationInternet Protocols Fall 2004. Outline
Internet Protocols Fall 2004 Lecture 7 Andreas Terzis 9/29/04 Outline Internet Protocol CIDR Forwarding CS 449/Fall 04 2 1 Classless Interdomain Routing (CIDR) Addressing The IP address space is broken
More informationAdministrative Distance
RIP is a distance vector routing protocol. It shares routing information through the local broadcast in every 30 seconds. In this tutorial we will explain RIP routing fundamentals with examples such as
More informationIntroduction to IP Multicast Routing
Introduction to IP Multicast Routing by Chuck Semeria and Tom Maufer Abstract The first part of this paper describes the benefits of multicasting, the Multicast Backbone (MBONE), Class D addressing, and
More informationMPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
More informationPPS Internet-Praktikum. Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK)
PPS Internet-Praktikum Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) September 2011 Zielsetzung Von unserer Webpage: Das Ziel dieser PPS-Veranstaltung ist es,
More information