Chapter 6. The Network Layer
|
|
|
- Aron Palmer
- 9 years ago
- Views:
Transcription
1 Chapter 6 The Network Layer 1
2 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented Service Comparison of Virtual-Circuit and Datagram Subnets 2
3 Store-and-Forward Packet Switching fig 5-1 The environment of the network layer protocols. 3
4 4
5 5
6 Implementation of Connectionless Service Routing within a diagram subnet. 6
7 Implementation of Connection-Oriented Service Routing within a virtual-circuit subnet. 7
8 8
9 Comparison of Virtual-Circuit and Datagram Subnets 5-4 9
10 Routing algorithms can be grouped into two classes: nonadaptive and adaptive 10
11 Routing Algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Link State Routing Hierarchical Routing Broadcast Routing Multicast Routing Routing for Mobile Hosts 11
12 Routing Algorithms (2) Conflict between fairness and optimality. 12
13 13
14 The Optimality Principle (a) A subnet. (b) A sink tree for router B. 14
15 15
16 Shortest Path Routing The first 5 steps used in computing the shortest path from A to D. The arrows indicate the working node. 16
17 Flooding Flooding Algorithm: Every incoming packet is sent out on every outgoing line except the one its arrived on Methods for damming the flood (a) hop count (b) keeping track of which packets have been flooded (list of sequence numbers) Modified flooding algorithm: Selective flooding Application of the flooding algorithm (a) military (b) distribution of database (c) wireless networks (d) bench mark for other algorithm (shortest path) 17
18 Distance Vector Routing 1. Each router maintains a routing table, whose entry contains two parts: the preferred outgoing line to use for that destination and an estimate of the time or distance to that destination 2. The router is assumed to know the distance to each of its neighbors 3. Each router sends the routing table (destination, distance) to each neighbor ihb 4B 4. Based on the collected routing tables from the neighbors, ihb the router computes the shortest distance for each destination and update the routing table 18
19 Distance Vector Routing (a) A subnet. (b) Input from A, I, H, K, and the new routing table for J. 19
20 Distance Vector Routing g( (2) Good news propagates fast Routers may take infinite number of exchanges to know bad news (a router was down) The count-to-infinity problem. 20
21 Link State Routing Each router must do the following: 1. Discover its neighbors, learn their network addresses. 2. Measure the delay or cost to each of its neighbors. 3. Construct a packet telling all it has just learned. 4. Send this packet to all other routers. 5. Compute the shortest path to every other router. 21
22 Learning about the Neighbors The LAN is modeled as a node (artificial) (a) Nine routers and a LAN. (b) A graph model of (a). 22
23 Measuring Line Cost A special ECHO packet is sent to the other side to measure the delay (with / without taking the load into account) A subnet in which the East and West parts are connected by two lines. 23
24 24
25 25
26 26
27 27
28
29 Distributing the Link State Packets Flooding is used to distribute the link state packet Over a router has accumulates a full set of link state packet, it can construct the entire subnet graph and compute the shortest path. The packet buffer for router B in the previous slide (Fig. 6-13). 29
30 Hierarchical Routing Hierarchical routing. 30
31 31
32
33 Multicast Routing (a) Anetwork network. (b) A spanning tree for the leftmost router. (c) A multicast tree for group 1. (d) A multicast tree for group 2. 33
34 Broadcast Routing Reverse path forwarding. (a) A subnet. (b) a Sink tree. (c) The tree built by reverse path forwarding. 34
35
36 36
37 37
38 Routing for Mobile Hosts (2) Packet routing for mobile users. 38
39 Routing in Ad Hoc Networks Possibilities i when the routers are mobile: 1. Military vehicles on battlefield. No infrastructure. 2. A fleet of ships at sea. All moving all the time 3. Emergency works at earthquake. The infrastructure destroyed. 4. A gathering of people with notebook computers. In an area lacking
40 Route Discovery a) (a) Range of A's broadcast. b) (b) After B and D have received A's broadcast. c) (c) After C, F, and G have received A's broadcast. d) (d) After E, H, and I have received A's broadcast. Shaded nodes are new recipients. Arrows show possible reverse routes. 40
41 Route Discovery y( (2) Format of a ROUTE REQUEST packet. 41
42 Route Discovery y( (3) Format of a ROUTE REPLY packet. 42
43 Route Maintenance (a) D's Ds routing table before G goes down. (b) The graph after G has gone down. 43
44 Node Lookup in Peer-to-Peer Networks ()A (a) set of 32 node identifiers arranged in a circle. The shaded d ones correspond to actual machines. The arcs show the fingers from nodes 1, 4, and 12. The labels on the arcs are the table indices. (b) Examples of the finger tables. 44
45 Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies Congestion Control in Virtual-Circuit Subnets Congestion Control lin Datagram Subnets Load Shedding Jitter Control 45
46 Congestion When too much traffic is offered, congestion sets in and performance degrades sharply. 46
47 General Principles of Congestion Control 1. Monitor the system. detect when and where congestion occurs. 2. Pass information to where action can be taken. 3. Adjust system operation to correct the problem. 47
48 Congestion Prevention Policies (timeout interval) 5-26 (input /output queue) (timeout interval) (selective repeat) (response time) Policies that affect congestion. 48
49 Congestion Control in Virtual-Circuit Subnets a. Admission control (no more new VC will be setup) b. New VCs are allowed only to bypass the congestion areas c. Resources (bandwidth, buffer,..) reservation (a) A congested subnet. (b) A redrawn subnet, eliminates congestion and a virtual circuit from A to B. 49
50 Congestion control in datagram subnets a. Each router estimates the availability of each output line. unew = auold + ( 1 a) a: updating period f: utilization of the line f b. Whenever u moves above the threshold, h some action will be taken c. The warning bit method d. Choke packets (to source) e. hop-by-hop choke packets 50
51 Hop-by-Hop Choke Packets (a) A choke packet that affects only the source. (b) A choke packet that affects each hop it passes through. h 51
52 Load shedding (discarding packets) a. wine policy (minimize i i retransmission) i b. milk policy (for multimedia, new is better) c. priority (discarding low priority packets) d. Random Early Detection (for wired subnet, the router discards the packets randomly, and the source should response lost packets by slowing down the transmission rate) 52
53 Jitter Control Jitter control is important for audio and video applications a. Routers adjust the transmission order of output packets b. For video on demand packets can be buffered at the receiver in advance (a) High jitter. (b) Low jitter. 53
54 Quality of Service Requirements Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS 54
55 Requirements 5-30 How stringent the quality-of-service requirements are. 55
56 ATM networks classify flows into four categories: 1. Constant bit rate (telephony) 2. Real-time variable bit rate ( compressed video) 3. Non-real-time variable bit rate (movie over Internet) 4. Available bit rate (file transfer) 56
57 Techniques for Achieving Good QOS 1. Over provisioning (over supply) 2. Buffering 3. Traffic shapping (agreement on certain traffic pattern) 4. The leaky bucket algorithm 5. The token bucket algorithm 6. Resource reservation 7. Admission control 8. Proportional routing 9. Packet scheduling 57
58 Buffering Smoothing the output stream by buffering packets. 58
59 59
60 60
61 61
62 The Leaky Bucket Algorithm (a) Input to a leaky bucket. (b) Output from a leaky bucket. Output from a token bucket with capacities of (c) 250 KB, (d) () 500 KB, (e) () 750 KB, (f) Output from a 500KB token bucket feeding a 10-MB/sec leaky bucket. 62
63 63
64 Resource reservation Three different kinds of resources can be reserved Bandwidth Buffer space CPU cycles 64
65 Because of random arrivals, and random service time distribution, queues can build up and delays can occur. Consider that packets arrives with Poisson distribution with mean packet/sec, the service time is exponential with μ packet/sec. The CPU can be modeled as an M/M/1 queue. The delay is given as ρ T = λ ρ = λ ( 1 ρ ) μ = 1 1 μ 1 ρ For example = λ = packets μ = packets / ρ = 0.95 T = 20μ sec onds / sec sec λ 65
66 Admission Control When the incoming traffic from some flow is well shaped, the capacity can be reserved in advance on the routers along the path. When a flow with flow specification (produced by the sender) is offered, the router along the router examines the flow specification and modifies the parameters as need be. Finally the acceptable flow specification (acceptable parameters) can be established. 66
67 An example of flow specification 5-34 maximum sustained rate average over a long time interval maximum capacity of the bucket maximum tolerated t transmission rate related related to protocols and processing time A router will map the parameters to a set of specific resource reservations 67
68 Proportional Routing To provide a high quality of service, the traffic can be split over multiple routes. A simple method is to divide the traffic equally or in proportion to the capacities of the outgoing links. 68
69 Packet Scheduling 1. Fair queueing algorithm The router has separate queues for each output line, one for each flow. When a line becomes idle, the router scans the queues round robins, taking the first packet on the nest queue. 2. Weighted fair queueing algorithm * for priority service (e.g. giving some servers more bandwidth) (a) A router with five packets queued for line O. (b) Finishing times for the five packets. 69
70 Integrated Services It was aimed at both unicast (streaming video) and multicast (digital television broadcasting) applications In many multicast applications groups can change membership dynamically. Under these conditions, the approach of having the senders reserve bandwidth in advance dose not work well. If the number of receivers are large, the dynamical grouping dose not work at all. 70
71 Integrated Services (flow-based algorithms) RSVP-The ReSerVation Protocol (a) Anetwork network, (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2. 71
72 RSVP-The ReSerVation Protocol (2) Already reserved When Host5 requests, new reservation is needed d (a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1. 72
73 Differentiated services (class-based) Differentiated Service (DS) can be offered by a set of routers forming an administrative domain (e.g. an ISP or a Telco). The administration defined a set of service classes with corresponding forwarding rules. Some classes (e.g. premium service) with higher requirements may has better service than others. DS scheme does not require advance setup, resource reservation or time consuming end-to-end negotiation for each flow. This makes DS relatively easy to implement. For example, the operator reserves resources for all IP-phone users (the IP-phone class), on contrary, a flow-based scheme, each phone call gets its own resources and 73 guarantees.
74 Differentiated Services (class-based service) Expedited Forwarding Two queues for each output line, one for expedited packets and one for regular packets Expedited packets experience a traffic-free network. 74
75 Assured Forwarding The assured forwarding scheme which manages the service classes, specifies three packet discard d probabilities bili i and four priority classes, each class having its own resources. Taken together, three two factors define 12 service classes. Implementation procedure 1. Classify the packets into one of the four classes (on the sending host or the ingress router) 2. Mark the packets (type A service in IP, which is specified in the type of service field) 3. Pass the packets through a shaper/dropper filter (e.g. leaky buckets or token buckets) 75
76 Assured Forwarding A possible implementation of the data flow for assured forwarding. 76
77 Label Switching and MPLS This scheme adds a label in front each packet and does the routing based on the label rather than on the destination address. Making the label an index into an internal table makes finding the correct output line becomes just a matter of table lookup. (X, 25, ATM, frame relay and virtual circuits i did the similar il thing) 77
78 Label Switching and MPLS A new MPLS header is added in front of the IP header. On a router-to-router line using PPP as the framing protocol MPLS is layer 2.5 s: stacking multiple labels in hierarchical networks TTL: Time To Live Transmitting a TCP segment using IP, MPLS, and PPP. 78
79 1. MPLS headers are not part of the network layer packet or the data link layer frame 2. It is possible to build MPLS switches that can forward both IP packets and ATM cells 3. In the MPLS router, the label is used as an index into a table to determine the outgoing line to use and the new label to be used (label swapping) 4. The router may group multiple flows that end at a particular router (LAN) and use a single label l (Forwarding Equivalence Class, FEC) 5. No setup is needed for MPLS routing 79
80 6. Two ways to create the forwarding table. Dt Data-driven: di The hit router asks the router downstream to generate a label for the flow (for ATM subnet) Control-driven: di The router checks to see for which hihrouters it is the final destination. It then creates one or more FECs for them, allocates a label for each one, and passes the labels in their forwarding table and send new ones to their neighbors. 7. A packet may carry an entire stack of labels. The S bit is set to 1 for the bottom label and 0 for all the other labels. 80
81 Internetworking How Networks Differ How Networks Can Be Connected Concatenated Virtual Circuits Connectionless Internetworking Tunneling Internetwork Routing Fragmentation 81
82 82
83 Connecting Networks A collection of interconnected networks. 83
84 How Networks Differ 5-43 Some of the many ways networks can differ. 84
85 85
86 How Networks Can Be Connected (a) Two Ethernets connected by a switch. (b) Two Ethernets connected by routers. 86
87 87
88 88
89 89
90 90
91 an Autonomous System (AS) Each network in an internetwork is independent and is often referred to as 91
92 92
93 Fragmentation (a) Transparent fragmentation. (b) Nontransparent fragmentation. 93
94 Fragmentation (2) Fragmentation when the elementary data size is 1 byte. (a) Original packet, containing 10 data bytes. (b) Fragments after passing through a network with maximum packet size of 8 payload bytes plus header. (c) Fragments after passing through a size 5 gateway. 94
95 The Network Layer in the Internet The IP Protocol IP Addresses Internet Control Protocols OSPF The Interior Gateway Routing Protocol BGP The Exterior Gateway Routing Protocol Internet Multicasting Mobile IP IPv6 95
96 96
97 Design Principles for Internet 1. Make sure it works. 2. Keep it simple. 3. Make clear choices. 4. Exploit modularity. 5. Expect heterogeneity. 6. Avoid static options and parameters. (negotiation is preferred) 7. Look for a good design; it need not be perfect. 8. Be strict when sending and tolerant when receiving. 9. Think about scalability. 10. Consider performance and cost. 97
98 Collection of Subnetworks The Internet is an interconnected collection of many networks. 98
99 Fragment offset: Tell where in the current datagram this fragment belongs (A 13 maximum of 2 =8192 fragments per datagram) 99 Time to line: Packet lifetime 255 seconds
100 The IP Protocol (2) 5-54 Some of the IP options. 100
101 and Numbers) ICANN (Internet t Corporation for Assigned Names 101
102 102
103 Subnets Getting a new network address would be hard to do since network addresses are scarce. The problem is the rule that a single class A, B or C address refers to on network, not to a collection of LANs. To solve this problem is to allow a network to be split into several parts for internal use but still act like a single network to the outside world. In the Internet literature, the parts of the network (e.g. Ethernets) are called subnets. (Do not confuse with subnet used elsewhere) 103
104 Subnets A campus network consisting of LANs for various departments. 104
105 Subnets (2) To implement subnetting, the main router needs a subnet mask that indicates the split between network +subnet number and host. Subnet masks are also written in dotted decimal notation or (/number of bits). For example, the original 16-bit host number is split into 6-bit subnet number and 10-bit host number, allowing for up to 64 Ethernets, each with maximum of 1022 hosts (0 and -1 are not available) A class B network subnetted into 64 subnets. 105
106 106
107 CDR Classless InterDomain Routing The Internet is rapidly running out of IP addresses. One solution is CIDR which allocates the remaining IP addresses in variable-singed blocks. If a site needs 2000 addresses, it is given a block of 2048 addresses. For example, a set of IP addresses assignments is given as follows. A set of IP address assignments. 107
108 Dropping the classes makes forwarding more complicated. The network-based forwarding scheme is no longer applicable. A table look-up with address matching forwarding algorithm is devised. When the set of IP address is assigned to the three universities: Cambridge, Edinburgh and doxford. The router uses the mask to get the value which only matches Oxford address as The Oxford entry is used and the packet is sent along the line going to Oxford. A remote router, say Omaha, Nebraska, may use a single aggregate entry with a binary address and submask. 108
109 NAT Network Address Translation IP addresses are scarce. NAT is a quick fix. Each company is a assigned a few IP addresses for Internet traffic. Within the company, every computer gets a unique IP address for intramural traffic No packets containing these addresses may appear on the Internet. There are three reserved ranges. Most IP packets carry TCP or UPD payload, which have source port and destination port. NAT box will establish translation table based on the TCP or UPD source port and destination port. Placement and operation of a NAT box. 109
110 NAT can quickly solve the IP address shortage problem (even for ADSL, cable modem application) Here are some of the objections 1. NAT violates the architectural model of IP, i.e. every IP address identifies a single machine worldwide 2. NAT establish the translation table, which changes the Internet from connectionless to a kind of connection-oriented network 3. NAT violates the layer structure 4. NAT can only handle IP packets with TCP or UDP payload, not others 5. NAT will not work when IP addresses are inserted in the body of the text (e.g. FTP, H.323) 6. Each IP address can only map up to =61440 machines 7. Delay the implantation of IPV6 110
111 Internet Control Protocols (ICP) ICP includes ICMP, ARP, RARP, BOOTP, and DHCP Internet Control Message Protocol (I CMP) ICMP is used to test the internet and to report unexpected events Each ICMP message type is encapsulated in an IP packet. The principal ICMP message types. 111
112 112
113 When Host1 (E1) sends a packet to a user on Host2 ( ) by . The Domain Name System (DNS) will find the address corresponding to IP address
114 send all traffic for host 4 to the router, and this solution is called proxy ARP. 114
115 RARP, BOOTP, and DHCP Given an Ethernet address, what is the corresponding IP address? Reverse Address Resolution Protocol (RARP) allows a newlybooted workstation to broadcast its Ethernet address. The RARP server sees the request, looks up the file and sends back the corresponding IP address. RARP server is needed on each network, because the router will not forward the broadcost (all 1 s) packet. BOOTP uses UDP messages, however BOOTP requires manual configuration of tables mapping IP address to Ethernet address. 115
116 Dynamic Host Configuration Protocol (DHCP) DHCP allows both manual IP assignment and automatic assignment. agent Operation of DHCP. 116
117 OSPF-The Interior Gateway Routing Protocol Design principlesp 1. published algorithm 2. support variety of distance metrics, including physical distance, delay, etc. 3. dynamic, adapting to changes 4. support routing based on type of service 5. Do load balancing (load splitting) 6. support for hierarchical systems 7. security 117
118 6 118
119 119
120 120
121 121
122 122
123 123
124 124
125 125
126 126
127 127
128 128
129 129
130 130
131 131
132 132
133 Flow label will be used to allow a source and destination to setup a pseudo connection Next header tells which of the six extension headers Fig. The IPv6 fixed header (required) 133
134 IPv6 address 134
135 135
136 Extension Headers (2) To support of datagram exceeding 64KB The hop-by-hop extension header for large datagrams (jumbograms). 136
137 Extension Headers (3) The routing header lists one or more routers that must be visited The next header tells which of the six extension headers follow this one. If this header is the last IP header, then the Next header tells which transport protocol handler to pass the packet to The routing type field gives the format of the rest of the header. The segments left field keeps track of how many addresses have not yet been visited. When it hits 0, the packet is on its own (no more guidance). The extension header for routing. 137
Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):
Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is Store-and-Forward packet switching? What is a connectionless
Computer Networks. Main Functions
Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
Introduction to LAN/WAN. Network Layer (part II)
Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
The Network Layer Functions: Congestion Control
The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
Internet Protocol version 4 Part I
Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents
Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
College 5, Routing, Internet. Host A. Host B. The Network Layer: functions
CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:
How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
Internet Protocols. Addressing & Services. Updated: 9-29-2012
Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Multimedia Requirements. Multimedia and Networks. Quality of Service
Multimedia Requirements Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Transfer/Control Protocols Quality of Service
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
The Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
20. Switched Local Area Networks
20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
The IP Transmission Process. V1.4: Geoff Bennett
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : [email protected]
Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : [email protected] SUPPORT DE COURS Matière : Réseaux 2 Niveau : 3 ème Année Licence en Informatique Option : Réseaux et
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
Distributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski [email protected] 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir [email protected].
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir [email protected] CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)
Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: [email protected]
IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing
IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Introduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: [email protected] http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
ICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman
A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline
DG Forwarding Algorithm
DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router
Communication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: [email protected]
IP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
Router and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
IP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding
CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell [email protected] our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Chapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Quality of Service (QoS)) in IP networks
Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T
Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
Savera Tanwir. Internet Protocol
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
PART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Top-Down Network Design
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
