Advantages. Basic Operation of Packet Switching. Principles. Chapter 10 Packet Switching

Similar documents
Routing in packet-switching networks

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to LAN/WAN. Network Layer

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

CS335 Sample Questions for Exam #2

Transport Layer Protocols

MPLS. Packet switching vs. circuit switching Virtual circuits

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

CS Computer Networks 1: Routing Algorithms

Analog vs. Digital Transmission

Computer Networks and the Internet

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.

Horizon: Balancing TCP over multiple paths in wireless mesh networks

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking

Computer Networks Homework 1

Internet Control Message Protocol (ICMP)

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements

10CS64: COMPUTER NETWORKS - II

Final for ECE374 05/06/13 Solution!!

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Module 2 Overview of Computer Networks

Ring Protection: Wrapping vs. Steering

Routing with OSPF. Introduction

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Route Discovery Protocols

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Architecture and Performance of the Internet

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

: Instructor

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Scaling 10Gb/s Clustering at Wire-Speed

Computer Networks. Main Functions

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN

PART III. OPS-based wide area networks

Interconnection Network Design

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Network Load Balancing Using Ant Colony Optimization

Question: 3 When using Application Intelligence, Server Time may be defined as.

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Introduction, Rate and Latency

Requirements of Voice in an IP Internetwork

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Strategies. Addressing and Routing

Controlled Random Access Methods

Announcements. Midterms. Mt #1 Tuesday March 6 Mt #2 Tuesday April 15 Final project design due April 11. Chapters 1 & 2 Chapter 5 (to 5.

Network management and QoS provisioning - QoS in the Internet

Overview of Asynchronous Transfer Mode (ATM) and MPC860SAR. For More Information On This Product, Go to:

Introduction to Communication Networks Spring Unit 5 Switching Principles

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

1 Introduction to mobile telecommunications

Lecture 12: Link-state Routing"

Network Layer: Network Layer and IP Protocol

Answers to Sample Questions on Network Layer

Location Information Services in Mobile Ad Hoc Networks

Internet Packets. Forwarding Datagrams

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

ΤΕΙ Κρήτης, Παράρτηµα Χανίων

Introduction to Packet Voice Technologies and VoIP

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Chapter 3 ATM and Multimedia Traffic

CSCI Topics: Internet Programming Fall 2008

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

Chapter 1. Introduction

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Computer Networks. By Hardeep Singh

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Real-Time (Paradigms) (51)

Chapter 4. Distance Vector Routing Protocols

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Optimization models for congestion control with multipath routing in TCP/IP networks

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

- Hubs vs. Switches vs. Routers -

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Network Technologies

Routing Protocols (RIP, OSPF, BGP)

Optical interconnection networks with time slot routing

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline

Cpt S 223. School of EECS, WSU

Transcription:

Chapter 10 Packet Switching Packet Switching Principles Switching Techniques (Datagram, Virtual Circuit) Packet Size Comparison of Circuit Switching & Packet Switching Routing Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection is idle Data rate is fixed: Both ends must operate at the same rate Not efficient for bursty type of data traffic Packet Switching: suit better for data network application Least-Cost Routing Algorithms Dijkstra s Algorithm Bellman-Ford Algorithm Routing Strategies Basic Operation of Packet Switching Data transmitted in small packets Maximum Size 1000 Bytes Longer messages split into series of packets Each packet contains a portion of user data plus some control info Control info: Routing (addressing) info Packets are received, stored briefly (buffered) and passed on to the next node Store-and-forward Line efficiency Advantages Single node to node link can be shared by many packets over time (Statistic Time Division Multiplexing based) Packets queued and transmitted as fast as possible Data rate conversion Each station connects to the local node at its own speed Nodes buffer data if required to equalize rates Packets are accepted even when network is busy Delivery may slow down Priorities can be used 1

Switching Technique Datagram Host breaks long message into packets Packets sent one at a time to the network Packets handled in two ways Datagram Virtual circuit Each packet treated independently Packets can take any practical route Packets may arrive out of order Packets may go missing Up to receiver to re-order packets and recover from missing packets Virtual Circuit X.25: Use of Virtual Circuits Preplanned route established before any packets sent Call request and call accept packets establish connection (handshake) Each packet contains a virtual circuit identifier instead of destination address No routing decisions required for each packet Clear request to drop circuit Not a dedicated path though! 2

Virtual Circuits vs. Datagram Virtual circuits Network can provide sequencing and error control Packets are forwarded more quickly No routing decisions to make Less reliable Datagram Loss of a node looses all circuits through that node No call setup phase Better if few packets More flexible Routing can be used to avoid congested parts of the network Packet Size Store-and-forward cut-through Circuit vs. Packet Switching Routing in Packet Switching Networks CS based on FDM & Synchronous TDM; PS based on Statistic TDM Performance Propagation delay Transmission time Node delay Reading Assignment: P312: table 10.1 Complex, crucial aspect of packet switched networks Characteristics required Correctness Simplicity Robustness Stability Fairness Optimality Efficiency 3

Performance Criteria Used for selection of route: e.g. Minimum hop Costing of Routes Least cost (appendix 10A) Dijkstra s Algorithm Bellman-Ford Algorithm Dijkstra s Algorithm A greedy algorithm finding shortest paths from source node to all other nodes Define: N: set of nodes in the network S: source node T: set of nodes so far incorporated in the algorithm W(i,j): link cost from node i to node j; W(i,i)=0; w(i,j)= for two none directly connected nodes w(i,j) =c L(n): least cost path from node s to node n that is currently known to the algorithm. At the end, this is the final least cost path Dijkstra s Algorithm (Con t) Step 1: Initialization T = {s} : at initial stage, only source node included L(n) = w(i,j) for all n s Step 2: Find the neighboring node not in T that has the least-cost path from node s and include that node into T, i.e., add node x to T Step 3: Update least-cost paths due to node x included L(n) = min [L(n), L(x) +w(x,n)] Step 4: algorithm terminates when all nodes included in T, otherwise, go back to step 2 Source node Dijkstra s Algorithm 4

Bellman-Ford Algorithm Idea: Find the shortest paths from a given source node subject to the constraint that the paths contain at most one link; then find the shortest paths with a constraint of at most two links, and so on. Algorithm terminates when the increase of the maximum link number brings no improvement. Define: S: source node W(i,j): link cost from node i to node j; W(i,i)=0; w(i,j)= for two none directly connected nodes w(i,j) =c L h (n): least cost path from node s to node n under the constraint of no more than h links Bellman-Ford Algorithm Algorithm: Step 1: Initialization L 0 (n) =, for all n s L h (s) = 0, for all h Step 1: Update when L h+1 (n) less than L h (n) For each successive h 0: For each n s, compute L h+1 (n) = min [ L h (j) + w(j,n)] for all predecessor node j Step 2: Terminate when increase of h brings no improvement Bellman-Ford Algorithm Network Information Source and Update Timing Routing decisions usually based on knowledge of network (not always) Distributed routing Nodes use local knowledge May collect info from adjacent nodes May collect info from all nodes on a potential route Central routing: Collect info from all nodes Update timing When network info nodes updated Fixed - never updated Adaptive - regular updates 5

Routing Strategies Fixed Flooding Random Adaptive Reading Assignment: p318 pp329 6