SlideShare ist ein Scribd-Unternehmen logo
1 von 145
Chapter 4 Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Networking: A Top Down Approach  5 th  edition.  Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network layer ,[object Object],[object Object],[object Object],[object Object],[object Object],application transport network data link physical application transport network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical
Two Key Network-Layer Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interplay between routing and forwarding 1 2 3 0111 value in arriving packet’s header routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1
Connection setup ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network service model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Q:  What  service model  for “channel” transporting datagrams from sender to receiver?
Network layer service models: Network Architecture Internet ATM ATM ATM ATM Service Model best effort CBR VBR ABR UBR Bandwidth none constant rate guaranteed rate guaranteed  minimum none Loss no yes yes no no Order no yes yes yes yes Timing no yes yes no no Congestion feedback no (inferred via loss) no congestion no congestion yes no Guarantees ?
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network layer connection and connection-less service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual circuits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VC implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forwarding table Forwarding table in northwest router: Routers maintain connection state information! 12 22 32 1 2 3 VC number interface number Incoming interface  Incoming VC #  Outgoing interface  Outgoing VC # 1  12  3  22 2  63  1  18  3  7  2  17 1  97  3  87 …  …  …  …
Virtual circuits: signaling protocols ,[object Object],[object Object],[object Object],1. Initiate call 2. incoming call 3. Accept call 4. Call connected 5. Data flow begins 6. Receive data application transport network data link physical application transport network data link physical
Datagram networks ,[object Object],[object Object],[object Object],[object Object],[object Object],1. Send data 2. Receive data application transport network data link physical application transport network data link physical
Forwarding table Destination Address Range   Link Interface 11001000 00010111 00010000 00000000 through  0  11001000 00010111 00010111 11111111 11001000 00010111 00011000 00000000 through  1 11001000 00010111 00011000 11111111  11001000 00010111 00011001 00000000 through  2 11001000 00010111 00011111 11111111  otherwise  3 4 billion  possible entries
Longest prefix matching Prefix Match   Link Interface 11001000 00010111 00010  0  11001000 00010111 00011000  1 11001000 00010111 00011  2 otherwise  3 DA: 11001000  00010111  00011000  10101010  Examples DA: 11001000  00010111  00010110  10100001  Which interface? Which interface?
Datagram or VC network: why? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Router Architecture Overview ,[object Object],[object Object],[object Object]
Input Port Functions ,[object Object],[object Object],[object Object],[object Object],Physical layer: bit-level reception Data link layer: e.g., Ethernet see chapter 5
Three types of switching fabrics
Switching Via Memory ,[object Object],[object Object],[object Object],[object Object],Input Port Output Port Memory System Bus
Switching Via a Bus ,[object Object],[object Object],[object Object],[object Object]
Switching Via An Interconnection Network ,[object Object],[object Object],[object Object],[object Object]
Output Ports ,[object Object],[object Object]
Output port queueing ,[object Object],[object Object]
How much buffering? ,[object Object],[object Object],[object Object],RTT  C . N
Input Port Queuing ,[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet Network layer ,[object Object],Transport layer: TCP, UDP Link layer physical layer Network layer forwarding table ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP datagram format ,[object Object],[object Object],[object Object],[object Object],ver length 32 bits data  (variable length, typically a TCP  or UDP segment) 16-bit identifier header checksum time to live 32 bit source IP address IP protocol version number header length (bytes) max number remaining hops (decremented at  each router) for fragmentation/ reassembly total datagram length (bytes) upper layer protocol to deliver payload to head. len type of service “ type” of data  flgs fragment offset upper layer 32 bit destination IP address Options (if any) E.g. timestamp, record route taken, specify list of routers  to visit.
IP Fragmentation & Reassembly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],fragmentation:  in:  one large datagram out:  3 smaller datagrams reassembly
IP Fragmentation and Reassembly ,[object Object],[object Object],[object Object],1480 bytes in  data field offset = 1480/8  ID =x offset =0 fragflag =0 length =4000 ID =x offset =0 fragflag =1 length =1500 ID =x offset =185 fragflag =1 length =1500 ID =x offset =370 fragflag =0 length =1040 One large datagram becomes several smaller datagrams
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Addressing: introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],223.1.1.1 223.1.1.3 223.1.1.4 223.1.2.9 223.1.1.1 = 11011111 00000001 00000001 00000001 223 1 1 1 223.1.1.2 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27
Subnets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 network consisting of 3 subnets subnet
Subnets ,[object Object],[object Object],Subnet mask: /24 223.1.1.0/24 223.1.2.0/24 223.1.3.0/24
Subnets ,[object Object],223.1.1.1 223.1.1.3 223.1.1.4 223.1.2.2 223.1.2.1 223.1.2.6 223.1.3.2 223.1.3.1 223.1.3.27 223.1.1.2 223.1.7.0 223.1.7.1 223.1.8.0 223.1.8.1 223.1.9.1 223.1.9.2
IP addressing: CIDR ,[object Object],[object Object],[object Object],11001000  00010111   0001000 0  00000000 subnet part host part 200.23.16.0/23
IP addresses: how to get one? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DHCP: Dynamic Host Configuration Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DHCP client-server scenario 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 DHCP  server arriving  DHCP  client  needs address in this network A B E
DHCP client-server scenario DHCP server: 223.1.2.5 arriving client time DHCP offer src: 223.1.2.5, 67  dest:  255.255.255.255, 68 yiaddrr: 223.1.2.4 transaction ID: 654 Lifetime: 3600 secs DHCP request src:  0.0.0.0, 68  dest::  255.255.255.255, 67 yiaddrr: 223.1.2.4 transaction ID: 655 Lifetime: 3600 secs DHCP ACK src: 223.1.2.5, 67  dest:  255.255.255.255, 68 yiaddrr: 223.1.2.4 transaction ID: 655 Lifetime: 3600 secs DHCP discover src : 0.0.0.0, 68  dest.: 255.255.255.255,67 yiaddr:  0.0.0.0 transaction ID: 654
IP addresses: how to get one? ,[object Object],[object Object],ISP's block  11001000  00010111  0001 0000  00000000  200.23.16.0/20  Organization 0  11001000  00010111  0001000 0  00000000  200.23.16.0/23  Organization 1  11001000  00010111  0001001 0  00000000  200.23.18.0/23  Organization 2  11001000  00010111  0001010 0  00000000  200.23.20.0/23  ...  …..  ….  …. Organization 7  11001000  00010111  0001111 0  00000000  200.23.30.0/23
Hierarchical addressing: route aggregation “ Send me anything with addresses  beginning  200.23.16.0/20” Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “ Send me anything with addresses  beginning  199.31.0.0/16” Organization 2 Hierarchical addressing allows efficient advertisement of routing  information: 200.23.16.0/23 200.23.18.0/23 200.23.30.0/23 200.23.20.0/23 . . . . . .
Hierarchical addressing: more specific routes ISPs-R-Us has a more specific route to Organization 1 “ Send me anything with addresses  beginning  200.23.16.0/20” Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “ Send me anything with addresses  beginning 199.31.0.0/16 or 200.23.18.0/23” Organization 2 200.23.16.0/23 200.23.18.0/23 200.23.30.0/23 200.23.20.0/23 . . . . . .
IP addressing: the last word... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NAT: Network Address Translation 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 138.76.29.7 local network (e.g., home network) 10.0.0/24 rest of Internet Datagrams with source or  destination in this network have 10.0.0/24 address for  source, destination (as usual) All  datagrams  leaving  local network have  same  single source NAT IP address: 138.76.29.7, different source port numbers
NAT: Network Address Translation ,[object Object],[object Object],[object Object],[object Object],[object Object]
NAT: Network Address Translation ,[object Object],[object Object],[object Object],[object Object],[object Object]
NAT: Network Address Translation 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 138.76.29.7 NAT translation table WAN side addr  LAN side addr 138.76.29.7, 5001  10.0.0.1, 3345 ……  …… 3:  Reply arrives dest. address: 138.76.29.7, 5001 4:  NAT router changes datagram dest addr from 138.76.29.7, 5001 to 10.0.0.1, 3345   S: 10.0.0.1, 3345 D: 128.119.40.186, 80 1 1:  host 10.0.0.1  sends datagram to  128.119.40.186, 80 S: 128.119.40.186, 80  D: 10.0.0.1, 3345 4 S: 138.76.29.7, 5001 D: 128.119.40.186, 80 2 2:  NAT router changes datagram source addr from 10.0.0.1, 3345 to 138.76.29.7, 5001, updates table S: 128.119.40.186, 80  D: 138.76.29.7, 5001 3
NAT: Network Address Translation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NAT traversal problem ,[object Object],[object Object],[object Object],[object Object],[object Object],10.0.0.1 10.0.0.4 NAT  router 138.76.29.7 Client ?
NAT traversal problem ,[object Object],[object Object],[object Object],[object Object],10.0.0.1 10.0.0.4 NAT  router 138.76.29.7 IGD
NAT traversal problem ,[object Object],[object Object],[object Object],[object Object],138.76.29.7 Client 1.  connection to relay initiated by NATted host 2.  connection to relay initiated by client 3.  relaying  established 10.0.0.1 NAT  router
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ICMP: Internet Control Message Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Type   Code   description 0  0  echo reply (ping) 3  0  dest. network unreachable 3  1  dest host unreachable 3  2  dest protocol unreachable 3  3  dest port unreachable 3  6  dest network unknown 3  7  dest host unknown 4  0  source quench (congestion control - not used) 8  0  echo request (ping) 9  0  route advertisement 10  0  router discovery 11  0  TTL expired 12  0  bad IP header
Traceroute and ICMP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 Header (Cont) Priority:   identify priority among datagrams in flow Flow Label:  identify datagrams in same “flow.”  (concept of“flow” not well defined). Next header:  identify upper layer protocol for data
Other Changes from IPv4 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Transition From IPv4 To IPv6 ,[object Object],[object Object],[object Object],[object Object]
Tunneling A B E F IPv6 IPv6 IPv6 IPv6 tunnel Logical view: Physical view: A B E F IPv6 IPv6 IPv6 IPv6 IPv4 IPv4
Tunneling IPv6 IPv6 IPv6 IPv6 tunnel Logical view: Physical view: IPv6 IPv6 IPv6 IPv6 IPv4 IPv4 A-to-B: IPv6 E-to-F: IPv6 B-to-C: IPv6 inside IPv4 B-to-C: IPv6 inside IPv4 A B E F A B E F C D Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Src:B Dest: E Flow: X Src: A Dest: F data Src:B Dest: E
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interplay between routing, forwarding 1 2 3 0111 value in arriving packet’s header routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1
Graph abstraction Graph: G = (N,E) N = set of routers = { u, v, w, x, y, z } E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) } Remark: Graph abstraction is useful in other network contexts Example: P2P, where N is set of peers and E is set of TCP connections u y x w v z 2 2 1 3 1 1 2 5 3 5
Graph abstraction: costs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cost of path (x 1 , x 2 , x 3 ,…, x p ) = c(x 1 ,x 2 ) + c(x 2 ,x 3 ) + … + c(x p-1 ,x p )  Question: What’s the least-cost path between u and z ? Routing algorithm: algorithm that finds least-cost path u y x w v z 2 2 1 3 1 1 2 5 3 5
Routing Algorithm classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Link-State Routing Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dijsktra’s Algorithm 1  Initialization:   2  N '  = {u}  3  for all nodes v  4  if v adjacent to u  5  then D(v) = c(u,v)  6  else D(v) =  ∞   7  8  Loop   9  find w not in N '  such that D(w) is a minimum  10  add w to N '   11  update D(v) for all v adjacent to w and not in N '  :  12  D(v) = min( D(v), D(w) + c(w,v) )  13  /* new cost to v is either old cost to v or known  14  shortest path cost to w plus cost from w to v */  15  until all nodes in N '
Dijkstra’s algorithm: example Step 0 1 2 3 4 5 N ' u ux uxy uxyv uxyvw uxyvwz D(v),p(v) 2,u 2,u 2,u D(w),p(w) 5,u 4,x 3,y 3,y D(x),p(x) 1,u D(y),p(y) ∞ 2,x D(z),p(z) ∞  ∞  4,y 4,y 4,y u y x w v z 2 2 1 3 1 1 2 5 3 5
Dijkstra’s algorithm: example (2)  Resulting shortest-path tree from u: Resulting forwarding table in u: u y x w v z v x y w z (u,v) (u,x) (u,x) (u,x) (u,x) destination link
Dijkstra’s algorithm, discussion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A D C B 1 1+e e 0 e 1 1 0 0 A D C B 2+e 0 0 0 1+e 1 A D C B 0 2+e 1+e 1 0 0 A D C B 2+e 0 e 0 1+e 1 initially …  recompute routing …  recompute …  recompute
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distance Vector Algorithm  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],v
Bellman-Ford example  Clearly, d v (z) = 5, d x (z) = 3, d w (z) = 3 d u (z) = min { c(u,v) + d v (z), c(u,x) + d x (z), c(u,w) + d w (z) } = min {2 + 5, 1 + 3, 5 + 3}  = 4 Node that achieves minimum is next hop in shortest path  ➜  forwarding table B-F equation says: u y x w v z 2 2 1 3 1 1 2 5 3 5
Distance Vector Algorithm  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Distance vector algorithm (4) ,[object Object],[object Object],[object Object],[object Object],D x (y) ← min v {c(x,v) + D v (y)}  for each node y  ∊  N ,[object Object]
Distance Vector Algorithm (5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Each node: wait  for (change in local link cost or msg from neighbor) recompute  estimates if DV to any dest has changed,  notify  neighbors
from from x  y  z x y z 0 from cost to x  y  z x y z ∞ ∞ ∞ ∞ ∞ cost to x  y  z x y z ∞ ∞ ∞ 7 1 0 cost to ∞ 2  0  1 ∞ ∞  ∞ 2  0  1 7  1  0 time node x table node y table node z table D x (y) = min{c(x,y) + D y (y), c(x,z) + D z (y)}    = min{2+0 , 7+1} = 2 D x (z) =  min{ c(x,y) +    D y (z), c(x,z) + D z (z) }  = min{2+1 , 7+0} = 3 3 2  x  y  z x y z 0  2  7 ∞ ∞ ∞ ∞ ∞ ∞ from cost to x z 1 2 7 y
from from x  y  z x y z 0  2  3 from cost to x  y  z x y z 0  2  3 from cost to x  y  z x y z ∞ ∞ ∞ ∞ ∞ cost to x  y  z x y z 0  2  7 from cost to x  y  z x y z 0  2  3 from cost to x  y  z x y z 0  2  3 from cost to x  y  z x y z 0  2  7 from cost to x  y  z x y z ∞ ∞ ∞ 7 1 0 cost to ∞ 2  0  1 ∞ ∞  ∞ 2  0  1 7  1  0 2  0  1 7  1  0 2  0  1 3  1  0 2  0  1 3  1  0 2  0  1 3  1  0 2  0  1 3  1  0 time node x table node y table node z table D x (y) = min{c(x,y) + D y (y), c(x,z) + D z (y)}    = min{2+0 , 7+1} = 2 D x (z) =  min{ c(x,y) +    D y (z), c(x,z) + D z (z) }  = min{2+1 , 7+0} = 3 x  y  z x y z 0  2  7 ∞ ∞ ∞ ∞ ∞ ∞ from cost to x z 1 2 7 y
Distance Vector: link cost changes ,[object Object],[object Object],[object Object],[object Object],“ good news  travels fast” At time  t 0 ,  y  detects the link-cost change, updates its DV,  and informs its neighbors. At time  t 1 ,  z  receives the update from  y  and updates its table.  It computes a new least cost to  x   and sends its neighbors its DV. At time  t 2 ,  y  receives  z ’s update and updates its distance table.  y ’s least costs do not change and hence  y   does  not  send any  message to  z .  x z 1 4 50 y 1
Distance Vector: link cost changes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],x z 1 4 50 y 60
Comparison of LS and DV algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hierarchical Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hierarchical Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interconnected ASes ,[object Object],[object Object],[object Object],3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b Intra-AS Routing  algorithm Inter-AS Routing  algorithm Forwarding table 3c
Inter-AS tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b 3c
Example: Setting forwarding table in router 1d ,[object Object],[object Object],[object Object],[object Object],3b 3a 2a AS3 AS1 AS2 1a x … 1d 1c 2c 2b 1b 3c
Example: Choosing among multiple ASes ,[object Object],[object Object],[object Object],x … … 3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b 3c
Example: Choosing among multiple ASes ,[object Object],[object Object],[object Object],[object Object],Learn from inter-AS  protocol that subnet  x is reachable via  multiple gateways Use routing info from intra-AS  protocol to determine costs of least-cost  paths to each of the gateways Hot potato routing: Choose the gateway that has the  smallest least cost Determine from forwarding table the  interface I that leads  to least-cost gateway.  Enter (x,I) in  forwarding table
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intra-AS Routing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RIP ( Routing Information Protocol) ,[object Object],[object Object],[object Object],From router A to subnets: D C B A u v w x y z destination   hops u  1 v  2 w  2 x  3 y  3 z  2
RIP advertisements ,[object Object],[object Object]
RIP: Example   Destination Network   Next  Router  Num. of hops to dest. w A 2 y B 2 z B 7 x -- 1 … . …. .... w x y z A C D B Routing/Forwarding table in D
RIP: Example   Destination Network   Next  Router  Num. of hops to dest. w A 2 y B 2 z B A 7 5 x -- 1 … . …. .... Routing/Forwarding table in D Dest  Next  hops w   -  1 x   -  1 z   C  4 … .   …  ... Advertisement from A to D w x y z A C D B
RIP: Link Failure and Recovery   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RIP Table processing ,[object Object],[object Object],physical link network  forwarding (IP)  table Transprt (UDP) physical link network (IP) Transprt (UDP) forwarding table routed routed
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OSPF (Open Shortest Path First) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OSPF “advanced” features (not in RIP) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hierarchical OSPF
Hierarchical OSPF ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet inter-AS routing: BGP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BGP basics ,[object Object],[object Object],[object Object],[object Object],[object Object],3b 3a 2a AS3 AS1 AS2 1a eBGP session iBGP session 1d 1c 2c 2b 1b 3c
Distributing reachability info ,[object Object],[object Object],[object Object],[object Object],3b 3a 2a AS3 AS1 AS2 1a eBGP session iBGP session 1d 1c 2c 2b 1b 3c
Path attributes & BGP routes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BGP route selection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BGP messages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BGP routing policy ,[object Object],[object Object],[object Object],[object Object],[object Object],A B C W X Y legend : customer  network: provider network
BGP routing policy (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A B C W X Y legend : customer  network: provider network
Why different Intra- and Inter-AS routing ?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Broadcast Routing ,[object Object],[object Object],[object Object],R1 R2 R3 R4 source duplication R1 R2 R3 R4 in-network duplication duplicate creation/transmission duplicate duplicate
In-network duplication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spanning Tree ,[object Object],[object Object],A B G D E c F A B G D E c F (a) Broadcast initiated at A (b) Broadcast initiated at D
Spanning Tree: Creation ,[object Object],[object Object],[object Object],1 2 3 4 5 ,[object Object],(b) Constructed spanning tree A B G D E c F A B G D E c F
Multicast Routing: Problem Statement ,[object Object],[object Object],[object Object],[object Object],Shared tree Source-based trees
Approaches for building mcast trees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],… we first look at basic approaches, then specific protocols adopting these approaches
Shortest Path Tree ,[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member link used for forwarding, i indicates order link added by algorithm LEGEND S: source 2 1 6 3 4 5 i
Reverse Path Forwarding ,[object Object],[object Object],[object Object],[object Object],[object Object]
Reverse Path Forwarding: example ,[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member datagram will be  forwarded LEGEND S: source datagram will not be  forwarded
Reverse Path Forwarding: pruning ,[object Object],[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member prune message LEGEND S: source links with multicast forwarding P P P
Shared-Tree: Steiner Tree ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Center-based trees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Center-based trees: an example Suppose R6 chosen as center: R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member path order in which join messages generated LEGEND 2 1 3 1
Internet Multicasting Routing: DVMRP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DVMRP: continued… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tunneling ,[object Object],[object Object],[object Object],[object Object],physical topology logical topology
PIM: Protocol Independent Multicast ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Consequences of Sparse-Dense Dichotomy:   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PIM- Dense Mode ,[object Object],[object Object],[object Object],[object Object]
PIM - Sparse Mode ,[object Object],[object Object],[object Object],[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 join join join all data multicast from rendezvous point rendezvous point
PIM - Sparse Mode ,[object Object],[object Object],[object Object],[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 join join join all data multicast from rendezvous point rendezvous point
Chapter 4: summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
Transport services
Transport servicesTransport services
Transport services
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Transport layer
Transport layerTransport layer
Transport layer
 
the transport layer
the transport layerthe transport layer
the transport layer
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Transport layer
Transport layer Transport layer
Transport layer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
CN_Lec 5_OSI
CN_Lec 5_OSICN_Lec 5_OSI
CN_Lec 5_OSI
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Transport Layer Description By Varun Tiwari
Transport Layer Description By Varun TiwariTransport Layer Description By Varun Tiwari
Transport Layer Description By Varun Tiwari
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Transport layer
Transport layerTransport layer
Transport layer
 
transport layer
transport layer transport layer
transport layer
 

Andere mochten auch

Computer Networks Homework Help
Computer Networks Homework HelpComputer Networks Homework Help
Computer Networks Homework HelpAssignmentpedia
 
GOOGLE CAR(autonomous car)
GOOGLE CAR(autonomous  car)GOOGLE CAR(autonomous  car)
GOOGLE CAR(autonomous car)SACHIN KS
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layertmavroidis
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing ProtocolsRam Dutt Shukla
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sirsharifbdp
 

Andere mochten auch (8)

Ch08
Ch08Ch08
Ch08
 
Computer Networks Homework Help
Computer Networks Homework HelpComputer Networks Homework Help
Computer Networks Homework Help
 
GOOGLE CAR(autonomous car)
GOOGLE CAR(autonomous  car)GOOGLE CAR(autonomous  car)
GOOGLE CAR(autonomous car)
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
 

Ähnlich wie Chapter4 Network

Chapter4 network layer
Chapter4 network layerChapter4 network layer
Chapter4 network layerKhánh Ghẻ
 
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4Computer Networking network layer chapter 4
Computer Networking network layer chapter 4RoopaRathod2
 
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptChapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptMaiTran87348
 
computer organizational architecture lecture 14 william starliin
computer organizational architecture lecture 14 william starliin computer organizational architecture lecture 14 william starliin
computer organizational architecture lecture 14 william starliin sahil shama
 
Chapter_4_v8.0.pptx
Chapter_4_v8.0.pptxChapter_4_v8.0.pptx
Chapter_4_v8.0.pptxChungHong22
 
Chapter 4 - Computer Networking a top-down Approach 7th
Chapter 4 - Computer Networking a top-down Approach 7thChapter 4 - Computer Networking a top-down Approach 7th
Chapter 4 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
Chapter_4_V7.01.ppt
Chapter_4_V7.01.pptChapter_4_V7.01.ppt
Chapter_4_V7.01.pptAzaiun
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networksNoor Azura Adnan
 
Lecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxLecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxHanzlaNaveed1
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2Techglyphs
 
Communication in Distributed System.ppt
Communication in Distributed System.pptCommunication in Distributed System.ppt
Communication in Distributed System.pptSELVAVINAYAGAMG
 

Ähnlich wie Chapter4 Network (20)

Chapter4 network layer
Chapter4 network layerChapter4 network layer
Chapter4 network layer
 
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4Computer Networking network layer chapter 4
Computer Networking network layer chapter 4
 
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptChapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.ppt
 
computer organizational architecture lecture 14 william starliin
computer organizational architecture lecture 14 william starliin computer organizational architecture lecture 14 william starliin
computer organizational architecture lecture 14 william starliin
 
Chapter 4 v6.11
Chapter 4 v6.11Chapter 4 v6.11
Chapter 4 v6.11
 
Chapter_4.pptx
Chapter_4.pptxChapter_4.pptx
Chapter_4.pptx
 
Chapter_4_v8.0.pptx
Chapter_4_v8.0.pptxChapter_4_v8.0.pptx
Chapter_4_v8.0.pptx
 
Chapter 4 - Computer Networking a top-down Approach 7th
Chapter 4 - Computer Networking a top-down Approach 7thChapter 4 - Computer Networking a top-down Approach 7th
Chapter 4 - Computer Networking a top-down Approach 7th
 
Lecture24
Lecture24Lecture24
Lecture24
 
Chapter_4_V7.01.ppt
Chapter_4_V7.01.pptChapter_4_V7.01.ppt
Chapter_4_V7.01.ppt
 
Lecture14
Lecture14Lecture14
Lecture14
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 
P5 Network Layer
P5 Network LayerP5 Network Layer
P5 Network Layer
 
Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networks
 
Lecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxLecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptx
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2
 
Communication in Distributed System.ppt
Communication in Distributed System.pptCommunication in Distributed System.ppt
Communication in Distributed System.ppt
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Chapter4 Network

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Interplay between routing and forwarding 1 2 3 0111 value in arriving packet’s header routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1
  • 7.
  • 8.
  • 9. Network layer service models: Network Architecture Internet ATM ATM ATM ATM Service Model best effort CBR VBR ABR UBR Bandwidth none constant rate guaranteed rate guaranteed minimum none Loss no yes yes no no Order no yes yes yes yes Timing no yes yes no no Congestion feedback no (inferred via loss) no congestion no congestion yes no Guarantees ?
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Forwarding table Forwarding table in northwest router: Routers maintain connection state information! 12 22 32 1 2 3 VC number interface number Incoming interface Incoming VC # Outgoing interface Outgoing VC # 1 12 3 22 2 63 1 18 3 7 2 17 1 97 3 87 … … … …
  • 15.
  • 16.
  • 17. Forwarding table Destination Address Range Link Interface 11001000 00010111 00010000 00000000 through 0 11001000 00010111 00010111 11111111 11001000 00010111 00011000 00000000 through 1 11001000 00010111 00011000 11111111 11001000 00010111 00011001 00000000 through 2 11001000 00010111 00011111 11111111 otherwise 3 4 billion possible entries
  • 18. Longest prefix matching Prefix Match Link Interface 11001000 00010111 00010 0 11001000 00010111 00011000 1 11001000 00010111 00011 2 otherwise 3 DA: 11001000 00010111 00011000 10101010 Examples DA: 11001000 00010111 00010110 10100001 Which interface? Which interface?
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Three types of switching fabrics
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. DHCP client-server scenario 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 DHCP server arriving DHCP client needs address in this network A B E
  • 46. DHCP client-server scenario DHCP server: 223.1.2.5 arriving client time DHCP offer src: 223.1.2.5, 67 dest: 255.255.255.255, 68 yiaddrr: 223.1.2.4 transaction ID: 654 Lifetime: 3600 secs DHCP request src: 0.0.0.0, 68 dest:: 255.255.255.255, 67 yiaddrr: 223.1.2.4 transaction ID: 655 Lifetime: 3600 secs DHCP ACK src: 223.1.2.5, 67 dest: 255.255.255.255, 68 yiaddrr: 223.1.2.4 transaction ID: 655 Lifetime: 3600 secs DHCP discover src : 0.0.0.0, 68 dest.: 255.255.255.255,67 yiaddr: 0.0.0.0 transaction ID: 654
  • 47.
  • 48. Hierarchical addressing: route aggregation “ Send me anything with addresses beginning 200.23.16.0/20” Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “ Send me anything with addresses beginning 199.31.0.0/16” Organization 2 Hierarchical addressing allows efficient advertisement of routing information: 200.23.16.0/23 200.23.18.0/23 200.23.30.0/23 200.23.20.0/23 . . . . . .
  • 49. Hierarchical addressing: more specific routes ISPs-R-Us has a more specific route to Organization 1 “ Send me anything with addresses beginning 200.23.16.0/20” Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “ Send me anything with addresses beginning 199.31.0.0/16 or 200.23.18.0/23” Organization 2 200.23.16.0/23 200.23.18.0/23 200.23.30.0/23 200.23.20.0/23 . . . . . .
  • 50.
  • 51. NAT: Network Address Translation 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 138.76.29.7 local network (e.g., home network) 10.0.0/24 rest of Internet Datagrams with source or destination in this network have 10.0.0/24 address for source, destination (as usual) All datagrams leaving local network have same single source NAT IP address: 138.76.29.7, different source port numbers
  • 52.
  • 53.
  • 54. NAT: Network Address Translation 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 138.76.29.7 NAT translation table WAN side addr LAN side addr 138.76.29.7, 5001 10.0.0.1, 3345 …… …… 3: Reply arrives dest. address: 138.76.29.7, 5001 4: NAT router changes datagram dest addr from 138.76.29.7, 5001 to 10.0.0.1, 3345 S: 10.0.0.1, 3345 D: 128.119.40.186, 80 1 1: host 10.0.0.1 sends datagram to 128.119.40.186, 80 S: 128.119.40.186, 80 D: 10.0.0.1, 3345 4 S: 138.76.29.7, 5001 D: 128.119.40.186, 80 2 2: NAT router changes datagram source addr from 10.0.0.1, 3345 to 138.76.29.7, 5001, updates table S: 128.119.40.186, 80 D: 138.76.29.7, 5001 3
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. IPv6 Header (Cont) Priority: identify priority among datagrams in flow Flow Label: identify datagrams in same “flow.” (concept of“flow” not well defined). Next header: identify upper layer protocol for data
  • 65.
  • 66.
  • 67. Tunneling A B E F IPv6 IPv6 IPv6 IPv6 tunnel Logical view: Physical view: A B E F IPv6 IPv6 IPv6 IPv6 IPv4 IPv4
  • 68. Tunneling IPv6 IPv6 IPv6 IPv6 tunnel Logical view: Physical view: IPv6 IPv6 IPv6 IPv6 IPv4 IPv4 A-to-B: IPv6 E-to-F: IPv6 B-to-C: IPv6 inside IPv4 B-to-C: IPv6 inside IPv4 A B E F A B E F C D Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Src:B Dest: E Flow: X Src: A Dest: F data Src:B Dest: E
  • 69.
  • 70. Interplay between routing, forwarding 1 2 3 0111 value in arriving packet’s header routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1
  • 71. Graph abstraction Graph: G = (N,E) N = set of routers = { u, v, w, x, y, z } E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) } Remark: Graph abstraction is useful in other network contexts Example: P2P, where N is set of peers and E is set of TCP connections u y x w v z 2 2 1 3 1 1 2 5 3 5
  • 72.
  • 73.
  • 74.
  • 75.
  • 76. Dijsktra’s Algorithm 1 Initialization: 2 N ' = {u} 3 for all nodes v 4 if v adjacent to u 5 then D(v) = c(u,v) 6 else D(v) = ∞ 7 8 Loop 9 find w not in N ' such that D(w) is a minimum 10 add w to N ' 11 update D(v) for all v adjacent to w and not in N ' : 12 D(v) = min( D(v), D(w) + c(w,v) ) 13 /* new cost to v is either old cost to v or known 14 shortest path cost to w plus cost from w to v */ 15 until all nodes in N '
  • 77. Dijkstra’s algorithm: example Step 0 1 2 3 4 5 N ' u ux uxy uxyv uxyvw uxyvwz D(v),p(v) 2,u 2,u 2,u D(w),p(w) 5,u 4,x 3,y 3,y D(x),p(x) 1,u D(y),p(y) ∞ 2,x D(z),p(z) ∞ ∞ 4,y 4,y 4,y u y x w v z 2 2 1 3 1 1 2 5 3 5
  • 78. Dijkstra’s algorithm: example (2) Resulting shortest-path tree from u: Resulting forwarding table in u: u y x w v z v x y w z (u,v) (u,x) (u,x) (u,x) (u,x) destination link
  • 79.
  • 80.
  • 81.
  • 82. Bellman-Ford example Clearly, d v (z) = 5, d x (z) = 3, d w (z) = 3 d u (z) = min { c(u,v) + d v (z), c(u,x) + d x (z), c(u,w) + d w (z) } = min {2 + 5, 1 + 3, 5 + 3} = 4 Node that achieves minimum is next hop in shortest path ➜ forwarding table B-F equation says: u y x w v z 2 2 1 3 1 1 2 5 3 5
  • 83.
  • 84.
  • 85.
  • 86. from from x y z x y z 0 from cost to x y z x y z ∞ ∞ ∞ ∞ ∞ cost to x y z x y z ∞ ∞ ∞ 7 1 0 cost to ∞ 2 0 1 ∞ ∞ ∞ 2 0 1 7 1 0 time node x table node y table node z table D x (y) = min{c(x,y) + D y (y), c(x,z) + D z (y)} = min{2+0 , 7+1} = 2 D x (z) = min{ c(x,y) + D y (z), c(x,z) + D z (z) } = min{2+1 , 7+0} = 3 3 2 x y z x y z 0 2 7 ∞ ∞ ∞ ∞ ∞ ∞ from cost to x z 1 2 7 y
  • 87. from from x y z x y z 0 2 3 from cost to x y z x y z 0 2 3 from cost to x y z x y z ∞ ∞ ∞ ∞ ∞ cost to x y z x y z 0 2 7 from cost to x y z x y z 0 2 3 from cost to x y z x y z 0 2 3 from cost to x y z x y z 0 2 7 from cost to x y z x y z ∞ ∞ ∞ 7 1 0 cost to ∞ 2 0 1 ∞ ∞ ∞ 2 0 1 7 1 0 2 0 1 7 1 0 2 0 1 3 1 0 2 0 1 3 1 0 2 0 1 3 1 0 2 0 1 3 1 0 time node x table node y table node z table D x (y) = min{c(x,y) + D y (y), c(x,z) + D z (y)} = min{2+0 , 7+1} = 2 D x (z) = min{ c(x,y) + D y (z), c(x,z) + D z (z) } = min{2+1 , 7+0} = 3 x y z x y z 0 2 7 ∞ ∞ ∞ ∞ ∞ ∞ from cost to x z 1 2 7 y
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104. RIP: Example Destination Network Next Router Num. of hops to dest. w A 2 y B 2 z B 7 x -- 1 … . …. .... w x y z A C D B Routing/Forwarding table in D
  • 105. RIP: Example Destination Network Next Router Num. of hops to dest. w A 2 y B 2 z B A 7 5 x -- 1 … . …. .... Routing/Forwarding table in D Dest Next hops w - 1 x - 1 z C 4 … . … ... Advertisement from A to D w x y z A C D B
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136. Center-based trees: an example Suppose R6 chosen as center: R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member path order in which join messages generated LEGEND 2 1 3 1
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.

Hinweis der Redaktion

  1. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-9
  2. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-11
  3. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-12
  4. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-13
  5. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-14
  6. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-15
  7. Notes: 1. See L. Wei and D. Estrin, “A Comparison of multicast trees and algorithms,” TR USC-CD-93-560, Dept. Computer Science, University of California, Sept 1993 for a comparison of heuristic approaches. 3.3 Network Layer: Multicast Routing Algorithms 3-16
  8. Notes: 1. It’s always nice to see a PhD dissertation with impact. The earliest discussion of center-based trees for multicast appears to be D. Wall, “Mechanisms for Broadcast and Selective Broadcast,” PhD dissertation, Stanford U., June 1980. 3.3 Network Layer: Multicast Routing Algorithms 3-17
  9. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-18
  10. Notes: D. Waitzman, S. Deering, C. Partridge, “Distance Vector Multicast Routing Protocol,” RFC 1075, Nov. 1988. The version of DVMRP in use today is considerably enhanced over the RFC1075 spec. A more up-to-date “work-in-progress” defines a version 3 of DVMRP: T. Pusateri, “Distance Vector Multicast Routing Protocol,” work-in-progress, draft-ietf-idmr-v3-05.ps 3.4 Network Layer: Internet Multicast Routing Algorithms 3-20
  11. Notes: 1. See www.mbone.com/mbone/routers.html for a (slightly outdatet) list of multicast capable routers (supporting DVMPR as well as other protocols) from various vendors. 2. ftp://parcftp.xerox.com/pub/net-research/ipmulti for circa 1996 public copy “mrouted” v3.8 of DVMRP routing software for various workstation routing platforms. 3.4 Network Layer: Internet Multicast Routing Algorithms 3-21
  12. Notes: For a general discussion of IP encapsulation, see C. Perkins, “IP Encapsulation within IP,” RFC 2003, Oct. 1996. The book S. Bradner, A Mankin, “Ipng: Internet protocol next generation,” Addison Wesley, 1995 has a very nice discussion of tunneling Tunneling can also be used to connect islands of IPv6 capable routers in a sea IPv4 capable routers. The long term hope is that the sea evaporates leaving only lands of IPv6! 3.4 Network Layer: Internet Multicast Routing Algorithms 3-22
  13. Notes: a very readable discussion of the PIM architecture is S. Deering, D. Estrin, D. Faranacci, V. Jacobson, C. Liu, L. Wei, “The PIM Architecture for Wide Area Multicasting,” IEEE/ACM Transactions on Networking, Vol. 4, No. 2, April 1996. D. Estrin et al, PIM-SM: Protocol Specification, RFC 2117, June 1997 S. Deering et al, PIM Version 2, Dense Mode Specification, work in progress, draft-ietf-idmr-pim-dm-05.txt PIM is implemented in Cisco routers and has been deployed in UUnet as part of their streaming multimedia delivery effort. See S. LaPolla, “IP Multicast makes headway among ISPs,” PC Week On-Line, http://www.zdnet.com/pcweek/news/1006/06isp.html 3.4 Network Layer: Internet Multicast Routing Algorithms 3-25
  14. Notes: 3.4 Network Layer: Internet Multicast Routing Algorithms 3-26
  15. Notes: 3.4 Network Layer: Internet Multicast Routing Algorithms 3-27
  16. Notes: 3.4 Network Layer: Internet Multicast Routing Algorithms 3-28
  17. Notes: 3.4 Network Layer: Internet Multicast Routing Algorithms 3-29