CSE 3461: Introduction to Computer Networking and Internet Technologies. Packet Switching. Presentation G

Similar documents
Routing in packet-switching networks

Network layer: Overview. Network layer functions IP Routing and forwarding

IP addressing and forwarding Network layer

Network Layer: Network Layer and IP Protocol

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Internet Packets. Forwarding Datagrams

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

RARP: Reverse Address Resolution Protocol

IP - The Internet Protocol

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Introduction to LAN/WAN. Network Layer

8.2 The Internet Protocol

Transport Layer Protocols

Internet Protocols. Addressing & Services. Updated:

Future Internet Technologies

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Lecture Computer Networks

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Computer Networks. Main Functions

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

Module 2 Overview of Computer Networks

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Transport and Network Layer

Networking Test 4 Study Guide

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Final for ECE374 05/06/13 Solution!!

Chapter 4 Network Layer

Computer Networks and the Internet

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

Architecture and Performance of the Internet

Internet Control Protocols Reading: Chapter 3

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

NETWORK LAYER/INTERNET PROTOCOLS

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

CS335 Sample Questions for Exam #2

Introduction to Metropolitan Area Networks and Wide Area Networks

Overview of TCP/IP. TCP/IP and Internet

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Communications and Computer Networks

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Chapter 4 Network Layer

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Computer Networks. Chapter 5 Transport Protocols

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

Internet structure: network of networks

Protocols and Architecture. Protocol Architecture.

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Chapter 9. IP Secure

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

04 Internet Protocol (IP)

Ethernet. Ethernet. Network Devices

Internet Protocols Fall Lectures 7-8 Andreas Terzis

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Computer Networks CS321

Computer Networks: LANs, WANs The Internet

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

CS268 Exam Solutions. 1) End-to-End (20 pts)

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

The Network Layer Functions: Congestion Control

Based on Computer Networking, 4 th Edition by Kurose and Ross

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Protocol Architecture. ATM architecture

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Subnetting,Supernetting, VLSM & CIDR

Answers to Sample Questions on Network Layer

Internet Architecture and Philosophy

Chapter 6. The Network Layer

PART III. OPS-based wide area networks

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Chapter 4. Distance Vector Routing Protocols

The Internet. Internet Technologies and Applications

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Route Discovery Protocols

Internet Protocol Version 6 (IPv6)

technology standards and protocol for ip telephony solutions

Requirements of Voice in an IP Internetwork

A PPENDIX L TCP/IP and OSI

- IPv4 Addressing and Subnetting -

Lecture 8. IP Fundamentals

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Internet Protocols. Background CHAPTER

How do I get to

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Unix System Administration

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

PART IV. Network Layer

Transcription:

CSE 3461: Introduction to Computer Networking and Internet Technologies Packet Switching Presentation G Study: 10.5, 10.6, 12.1, 12.2, 13.1, 13.2, 18.3, 18.4 Gojko Babić 10-09-2012 The Network Core mesh of interconnected routers the fundamental question: how is data transferred through net? circuit switching: dedicated circuit per call: telephone net packet-switching: data sent thru net in discrete chunks 2 1

Network Layer Functions transport packet from sending to receiving hosts layer protocols in every host, router three important functions: path determination: route taken by packets from source to dest. Routing algorithms switching: move packets from router s input to appropriate router output call setup: some architectures require router call setup along path before data flows application transport data link physical data link physical data link physical data link physical data link physical data link physical data link physical data link physical data link physical application transport data link physical 3 Network Core: Packet Switching each end-end data stream divided into packets user A, B packets share resources each packet uses full link bandwidth resources used as needed, Bandwidth division into pieces Dedicated allocation Resource reservation resource contention: aggregate resource demand can exceed amount available congestion: packets queue, wait for link use store and forward: packets move one hop at a time transmit over link wait turn at next link 4 2

Packet Switching: Basic Operation Data transmitted in small packets Typically 1000 octets (bytes) Longer messages split into series of packets Each packet contains a portion of user data plus some control information Control information Routing (addressing) information Packets are received, stored briefly (buffered) and past on to the next node Store and forward Packets sent one at a time through any link Presentation G 5 Use of Packets Figure 10.8 Presentation G 6 3

Network Core: Packet Switching A 10 Mbs Ethernet statistical multiplexing C B queue of packets waiting for output link 1.5 Mbs D 45 Mbs E 7 Delays in Packet-Switched Networks packets experience delay on end-to-end path four sources of delay at each hop A transmission nodal processing: check bit errors determine output link queueing time waiting at output link for transmission depends on congestion level of router propagation B nodal processing queueing 8 4

Delays in Packet-Switched Networks Transmission delay: C=link bandwidth (bps) m=packet length (bits) time to send bits into link = m/c Propagation delay: d = length of physical link s = propagation speed in medium (~2x10 8 m/sec) propagation delay = d/s A transmission Note: s and C are very different quantities! propagation B nodal processing queueing 9 Line efficiency Single node to node link can be shared by many packets over time Packets queued and transmitted as fast as possible Data rate conversion Each station connects to the local node at its own speed Nodes buffer data if required to equalize rates Packets are accepted even when is busy Delivery may slow down Priorities can be used Packets handled in two ways: Datagram Virtual-circuit Packet Switching: Advantages Presentation G 10 5

Datagram approach: Each packet treated independently Packets can take any practical route Packets may arrive out of order Packets may go missing Up to receiver to re-order packets and recover from missing packets Virtual-Circuit approach Preplanned route established before any packets sent Call request and call accept packets establish connection (handshake) Once connection established, each packet contains a virtual circuit identifier instead of destination address No routing decisions required for each packet Clear request to drop circuit Datagram and Virtual-Circuit Presentation G 11 Virtual Circuits Figure 10.13 Presentation G 12 6

Virtual Circuits: Signaling Protocols used to setup, maintain & teardown VC used in ATM, frame-relay, X.25 not used in today s Internet application transport data link physical 5. Data flow begins 6. Receive data 4. Call connected 3. Accept call 1. Initiate call 2. incoming call application transport data link physical 13 Packet Switching: Virtual-Circuit Approach Figure 10.10 14 7

Datagram Networks: Internet Model no call setup at layer routers: no state about end-to-end connections no -level concept of connection packets typically routed using destination host ID packets between same source-dest pair may take different paths application transport data link physical 1. Send data 2. Receive data application transport data link physical 15 Packet Switching: Datagram Approach Figure 10.9 1 3 16 8

Virtual Circuits vs. Datagram Virtual circuits Network can provide sequencing and error control Packets are forwarded more quickly No routing decisions to make Less reliable Loss of a node looses all circuits through that node Datagram No call setup phase Better if few packets More flexible Routing can be used to avoid congested parts of the Presentation G 17 Packet Size Figure 10.11 Presentation G 18 9

Circuit Switching vs. Packet Switching Figure 10.12 19 Packet Switching vs. Circuit Switching Packet switching allows more users to use! 1 Mbit link each user: 100Kbps when active active 10% of time N users circuit-switching: 10 users packet switching: with 35 users, probability > 10 active less than.0004 1 Mbps link 20 10

X.25 Protocol Almost universal on virtual-circuit packet switched s and packet switching in ISDN Defines three layers: Physical Link: Link Access Protocol Balance LAPB (Subset of HDLC) Packet: Virtual Circuit Service Virtual Circuit Service: Logical connection between two stations Specific route established through for each connection Internal virtual circuit Typically one to one relationship between external and internal virtual circuits Considerable overhead Not appropriate for modern digital systems with high reliability Presentation G 21 X.25 Packets Call control packets: Call Request packet includes: packet type indicator, destination and source address, and virtual circuit number Call Accept packet includes: packet type indicator, and virtual circuit number Multiplexing of virtual circuits (data packets) at layer 3 Layer 3 data packets include flow and error control Data packet have send sequence numbers and receive sequence numbers similar as in data link layer, plus virtual circuit number, instead of destination address Presentation G 22 11

H1 X.25 Network: Connection Establishment a 1 c 1 d 1 c 2 c 3 a 2 b a A c a 1 b 1 b 2 c 1 H3 a B c b a d C c H4 b 3 virtual circuits to be established: H1-H2 over A, B and D H3-H2 over B and D H2-H4 over D, B, A and C a 1 b 1 a 2 b 2 b 3 a 3 a b D H2 a 1 c 1 Presentation G Each communication node has its virtual circuit table 23 IPv4 Datagram Format h e a d e r User Data Field, variable length (Carries user data from next upper layer up, typically a TCP segment or UDP segment) Figure 18.6 Max length of datagram 65,535 octets 24 12

IP Network: Design Issues Routing is based on the destination address: End systems and routers maintain routing tables that indicate next router to which datagram should be sent Static routing Dynamic routing: Flexible response to congestion and errors Source routing: Source specifies (in Options field) route as sequential list of routers to be followed Route recording and time-stamping (in Options field) by routes Datagram lifetime Fragmentation and re-assembly Error control Flow control Presentation G 25 IP Addressing: Introduction IP address: 32-bit identifier for host, router interface interface: connection between host, router and physical link router s typically have multiple interfaces host may have multiple interfaces IP addresses associated with interface, not host, router Dotted decimal notation 223.1.1.1 223.1.2.1 223.1.1.2 223.1.1.4 223.1.2.9 223.1.1.3 223.1.3.1 223.1.3.27 223.1.2.2 223.1.3.2 223.1.1.1 = 11011111 00000001 00000001 00000001 223 1 1 1 26 13

IP Addressing: Class-full Addressing 1111111 reserved for loopback Figure 18.7 All allocated All allocated Nearly all allocated Presentation G 27 IP addressing: CIDR classful addressing: inefficient use of address space, address space exhaustion e.g., class B net allocated enough addresses for 65K hosts, even if only 2K hosts in that CIDR: Classless InterDomain Routing portion of address of arbitrary length address format: a.b.c.d/x, where x is # bits in portion of address part 11001000 00010111 00010000 00000000 200.23.16.0/23 host part 28 14

IP Addressing IP address: part (high order bits) host part (low order bits) What s a? (from IP address perspective) device interfaces with same part of IP address can physically reach each other without intervening router 223.1.1.1 223.1.2.1 223.1.1.2 223.1.1.4 223.1.2.9 223.1.1.3 223.1.3.1 223.1.3.27 LAN 223.1.2.2 223.1.3.2 consisting of 3 IP s (for IP addresses starting with 223, first 24 bits are address) 29 Getting Datagram from Source to Destination 1 IP datagram: misc fields source IP addr dest IP addr data - datagram remains unchanged, as it travels source to destination - address fields of interest here A B routing table in A Dest. Net. next router Nhops 223.1.1 1 223.1.2 223.1.1.4 2 223.1.3 223.1.1.4 2 223.1.1.1 223.1.2.1 223.1.1.2 223.1.1.4 223.1.2.9 223.1.1.3 223.1.3.1 223.1.3.27 223.1.2.2 223.1.3.2 E 30 15

Getting Datagram from Source to Destination 2 misc fields 223.1.1.1 223.1.1.3 data Starting at A, given IP datagram addressed to B: - look up net. address of B - find B is on same as A - link layer will send datagram directly to B inside link-layer frame, since B and A are directly connected A B Dest. Net. next router Nhops 223.1.1 1 223.1.2 223.1.1.4 2 223.1.3 223.1.1.4 2 223.1.1.1 223.1.2.1 223.1.1.2 223.1.1.4 223.1.2.9 223.1.1.3 223.1.3.27 223.1.2.2 E 223.1.3.1 223.1.3.2 31 Getting Datagram from Source to Destination 3 misc fields 223.1.1.1 223.1.2.3 data Starting at A, dest. E: - look up address of E - E on different, i.e. A, E not directly attached - routing table: next hop router to E is 223.1.1.4 - link layer sends datagram to router 223.1.1.4 inside linklayer frame - datagram arrives at 223.1.1.4 continued.. A B Dest. Net. next router Nhops 223.1.1 1 223.1.2 223.1.1.4 2 223.1.3 223.1.1.4 2 223.1.1.1 223.1.2.1 223.1.1.2 223.1.1.4 223.1.2.9 223.1.1.3 223.1.3.1 223.1.3.27 223.1.2.2 223.1.3.2 E 32 16

Getting Datagram from Source to Destination 4 Dest. next misc fields 223.1.1.1 223.1.2.3 data router Nhops interface 223.1.1-1 223.1.1.4 Arriving at 223.1.4, destined for 223.1.2.2 - look up address of E - E on same as router s interface 223.1.2.9, i.e. router, E directly attached - link layer sends datagram to 223.1.2.2 inside link-layer frame via interface 223.1.2.9 - datagram arrives at 223.1.2.2!!! (hooray!) 223.1.2-1 223.1.2.9 223.1.3-1 223.1.3.27 A B 223.1.1.1 223.1.2.1 223.1.1.2 223.1.1.4 223.1.2.9 223.1.1.3 223.1.3.1 223.1.3.27 223.1.2.2 223.1.3.2 E 33 Datagram Lifetime & Type of Service Datagrams could loop indefinitely: Consumes resources Datagram marked with lifetime: Time to Live field in IP Hop count Decrement time to live on passing through each router Time count Once lifetime expires, datagram discarded (not forwarded) Type of Service filed: Specify treatment of data unit during transmission through s Presentation G 34 17

IP Fragmentation & Reassembly links have MTU (max.transfer size) - largest possible link-level frame. different link types, different MTUs large IP datagram divided ( fragmented ) within net one datagram becomes several datagrams reassembled only at final destination IP header bits used to identify, order related fragments reassembly fragmentation: in: one large datagram out: 3 smaller datagrams 35 Fragmentation and Re-assembly IP re-assembles at destination (resulting in packets getting smaller as data traverses internet), using: Data unit ID identified by: Source Address and Destination Address Protocol layer generating data (e.g. TCP) Identification supplied by that layer Fragment Offset: position of fragment of user data in original datagram, in multiples of 64 bits (8 octets) More bit: indicates that this is not the last fragment; also Don t Fragment bit Re-assembly may fail if some fragments get lost; reassembly time out assigned to first fragment to arrive. Presentation G 36 18

Fragmentation Example Data Length is the length of User Data Filed Presentation G 37 Error Control and Flow Control Error Control: Not guaranteed delivery Router should attempt (ICMP protocol used) to inform source if packet discarded, for time to live expiring Datagram identification needed Source may modify transmission strategy May inform high layer protocol Flow Control: Allows routers and/or stations to limit rate of incoming data Limited in connectionless systems Send flow control packets (ICMP used) Requesting reduced flow; again ICMP used No flow control currently provided for in Internet Presentation G 38 19

ICMP Internet Control Message Protocol IP protocol filed identifies ICMP Often considered as a part of IP layer Provides feedback from the : destination (, host, or protocol) unreachable or unknown time to live expiring parameter problem fragmentation needed but Don t Fragment bit set source quench Can be used by the host to obtain certain information: echo request and echo replay (ping program) timestamp request and timestamp replay Presentation G 39 IPv6 Header Format Presentation G 40 20

Routing in Packet Switching Networks Complex, crucial aspect of packet switched s Characteristics required: Correctness Simplicity Robustness Stability Fairness Optimality Efficiency Routing Strategies: Fixed Flooding Random Adaptive Presentation G 41 Elements of Routing Techniques Performance criteria: minimize number of hops minimize delay maximize throughput minimize cost Decision time: datagram each packet virtual circuit only call request packet Decision place distributed made by each node centralized made by central node source made by originating node Presentation G 42 21

Elements of Routing Techniques (continued) Network information source: Distributed routing each node makes decisions Nodes use local knowledge May collect information from adjacent nodes May collect information from all nodes on a potential route Central routing one central node makes decisions One node collects information for all nodes Update timing: Fixed - never updated After major load changes After topology changes Regular updates Presentation G 43 Example of Network for Fixed Routing Each link is assigned its cost, that is a base for routing decisions Link costs in different directions may be different Can have link value (i.e. link cost) inversely proportional to capacity Define cost of path between two nodes as sum of costs of links traversed Figure 12.1 Presentation G 44 22

Fixed Routing Least cost algorithm, for each node pair, finds a path with the least cost Single permanent route for each source to destination pair Route fixed, at least until a change in topology Figure 12.2 Presentation E 45 No info required Incoming packets retransmitted on every link except incoming link Eventually a number of copies will arrive at destination Each packet is uniquely numbered so duplicates can be discarded Nodes can remember packets already forwarded to keep load in bounds Can include a hop count in packets Property of flooding All possible routes are tried, thus it is very robust At least one packet will have taken minimum hop count route, thus it can be used to set up virtual circuit All nodes are visited, thus useful to distribute information (e.g. routing) Flooding Presentation G 46 23

Flooding Example Figure 12.3 Presentation E 47 Random Routing Node selects one outgoing path for retransmission of incoming packet Selection can be random or round robin Can select outgoing path based on probability calculation No info needed Resulting route is typically not least cost nor minimum hops But far less traffic than flooding Presentation G 48 24

Used by almost all packet switching s Routing decisions change as conditions on the change Link (or node) failure Congestion, i.e. change in traffic load Requires information about Decisions more complex Tradeoff between quality of information and overhead Classification based on information sources Local (isolated) Adjacent nodes All nodes Reacting too quickly can cause oscillation Reacting too slowly can make irrelevant Adaptive Routing Presentation G 49 Isolated Adaptive Routing Route to outgoing link with shortest queue Can include bias for each destination Rarely used - do not make use of easily available information Packet arriving with node 6 as destination will be sent through link 3; min (Q + B) = 4 Figure 12.4 Presentation G 50 25

First Generation ARPANET Routing Node makes routing decisions based on Next node column in its routing table Periodically, neighbor nodes exchange Delay columns Every node calculates delays on each of its links based on current queue lengths Having received new Delay columns, a node updates its routing table +2 +2 +2 +2 +2 +2 +5 +5 +5 +5 +5 +5 +1 +1 +1 +1 +1 +1 Figure 12.5 Presentation G 51 ARPANET Routing Distributed adaptive First generation ARPANET routing: Estimated delay used as performance criterion Node exchanges delay vector with its neighbors Update routing table based on incoming information Doesn't consider line speed, just queue length Queue length is not necessary a good measurement of delay Responds slowly to congestion Second generation ARPANET routing: Delay measured directly (time-stamped packets) If there are any significant changes in delay, the information is sent to all other nodes using flooding Each node maintains an estimate of delay on every link Good under light and medium loads Under heavy loads, oscillation may occur Presentation G 52 26

What is Congestion? Congestion: informally: too many sources sending too much data too fast for to handle different from flow control! manifestations: lost packets (buffer overflow at routers) long delays (queueing in router buffers) a top-10 problem! 53 What is Congestion? Congestion occurs when the number of packets being transmitted through the approaches the packet handling capacity of the Congestion control aims to keep number of packets below level at which performance falls off dramatically Generally 80% line utilization is critical Data is a of queues Packets arriving are stored at input buffers Routing decision made Packet moves to output buffer Packets queued for output transmitted as fast as possible If packets arrive too fast to be routed, or to be output, buffers will fill and congestion starts occurring finite queues mean data may be lost Presentation G 54 27

Interaction of Queues Node to node flow control can propagate congestion through Figure 13.2 Presentation G 55 Effects of Congestion No Control Figure 13.4 Presentation E 56 28

Mechanisms for Congestion Control backpressure choke packets implicit congestion signaling explicit congestion signaling Presentation G 57 Backpressure & Choke Packet Backpressure if node becomes congested it can slow down or halt flow of packets from other nodes and other nodes have to apply control on outgoing packet rates o propagates back to source used in connection oriented s that allow hop-by-hop flow control (e.g. X.25) Choke Packet generated at congested node and sent back to source node ICMP Source Quench packet o from router or destination end system and source cuts back until it no longer receives source quench messages o message is issued for every discarded packet Presentation G 58 29

Implicit & Explicit Congestion Signaling Implicit congestion signaling: o With congestion transmission delay increases and packets may be discarded o Source can detect congestion and reduce flow o Responsibility of end systems o Effective on connectionless (datagram) s Explicit congestion signaling: o Network alerts end systems of increasing congestion and end systems take steps to reduce offered load o Backward: congestion avoidance notification in opposite direction to packet required o Forward: congestion avoidance notification in same direction as packet required Presentation G 59 30