SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Several Design Issues at Network layer ,[object Object]
Implementation of Connection oriented Services
Comparison of datagram subnet and virtual-circuit subnetAshishDubey(9) Hansel Gonsalves(12) KashyapDavariya(7)
Implementation of Connectionless Services In Connectionless Service, no need to establish connection In this packets are injected into subnet and routed independently of each other. No advance set up is needed In this context the packets are frequently called datagram and subnet is called datagram subnet.
Routing within a datagram subnet
 Let see the working of datagram subnet. Suppose process p1 has long message for process p2. It hands message with instructions to transport layer to deliver it to process 2 on host 2. The transport layer code runs on H1,within an OS. It prepends a transport header to the front of message and hands the result to the network layer.
Assume that message is four times longer than maximum packet size. The Network layer breaks it into four packets 1, 2 ,3 and 4 and sends all to router A using point-to-point protocol. At this point carrier takes over. Every router has an internal table that tells where to send packets for each possible destinations.
Each table entry is a pair consisting of a destination and the outgoing line to use for that destination. Only directly connected lines can be used. For eg: A has only two outgoing lines - to B and C - so every incoming packet must be sent to one of these routers, even if ultimate destination is some other router.
As packets arrived at A, packets 1, 2 and 3 were stored briefly(to verify their checksums). Then each was forwarded to C according to A’s table . Packet 1 was then forwarded to C according to A’s table. Packet 1 was then forwarded to E and then to F and at F it was encapsulated in datalink layer frame and sent to H2 over the LAN.
Packet 2 and 3 follow the same route. However packet 4 was routed at different router(i.e at B) for some reason. Perhaps it learned of traffic jam somewhere along the ACE path and updated its router table as “later”. The algorithm that manages the tables and makes the routing decisions is called Routing Algorithm.
Implementation of Connection Oriented Services In this a connection is established. A path from source to the destination router must be established before any packets can be sent.  This connection is virtual circuit with physical circuit set up by the telephone system  Subnet is called virtual circuit subnet. The particular route choosen is used for all traffic flowing over the connection.
With connection oriented service , each packet carries an identifier telling which virtual circuit it belongs.
Routing within a virtual-circuit subnet.
Here , host H1 has established a connection 1 with host H2. It is remembered as the first entry in each of the routing tables. The first lines of A’s table says that if a packet bearing  connection identifier 1 comes from H1, it to be sent to router C and given a connection identifier 1. Similarly, the first entry at C routes the packet to E, also with connection identifier 1.
Now let consider what happens if H3 also wants to establish a connection to H2. It chooses identifier 1(because it is initiating the connection and this is its only connection) and tells the subnet to establish the virtual circuit. This leads to the second row in the tables. Note that we have a conflict here because although A can easily distinguish connection 1 packets from H1 from connection 1 packets  from H3 , C cannot do this.
For this reason, A assigns a different connection identifier to the outgoing traffic for the second connection. Avoiding conflicts of this kind is why routers need the ability to replace connection identifiers in outgoing packets. In some contexts, this is called label swithing.

Weitere ähnliche Inhalte

Was ist angesagt?

Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
jayaprakash
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
ymghorpade
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 

Was ist angesagt? (20)

Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 

Andere mochten auch

Math project final 1
Math project final 1Math project final 1
Math project final 1
Rain Wolf's
 
Prefixes
PrefixesPrefixes
Prefixes
Eve_55
 
Ip address concepts
Ip address conceptsIp address concepts
Ip address concepts
myrajendra
 
Polygon clipping
Polygon clippingPolygon clipping
Polygon clipping
Mohd Arif
 

Andere mochten auch (20)

Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Math project final 1
Math project final 1Math project final 1
Math project final 1
 
network hardware
network hardwarenetwork hardware
network hardware
 
Prefixes
PrefixesPrefixes
Prefixes
 
Prefixes
PrefixesPrefixes
Prefixes
 
Quantitative Analysis for Management, Tenth Edition
Quantitative Analysis for Management, Tenth EditionQuantitative Analysis for Management, Tenth Edition
Quantitative Analysis for Management, Tenth Edition
 
data link layer
data link layerdata link layer
data link layer
 
Chapter 7: Transmission Media
Chapter 7: Transmission MediaChapter 7: Transmission Media
Chapter 7: Transmission Media
 
Ip address concepts
Ip address conceptsIp address concepts
Ip address concepts
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
My presentation minimum spanning tree
My presentation minimum spanning treeMy presentation minimum spanning tree
My presentation minimum spanning tree
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Computer networks
Computer networksComputer networks
Computer networks
 
Ch 21
Ch 21Ch 21
Ch 21
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
IP addressing
IP addressingIP addressing
IP addressing
 
Polygon clipping
Polygon clippingPolygon clipping
Polygon clipping
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 

Ähnlich wie Final several design issues at network layer

4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
mrcopyxerox
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedting
H K
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
MelkamtseganewTigabi1
 
Forwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docxForwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docx
budbarber38650
 

Ähnlich wie Final several design issues at network layer (20)

4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
CN R16 -UNIT-5.pdf
CN R16 -UNIT-5.pdfCN R16 -UNIT-5.pdf
CN R16 -UNIT-5.pdf
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
Notes
NotesNotes
Notes
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedting
 
Routing
RoutingRouting
Routing
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulation
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Module_3_Part_3.pptx
Module_3_Part_3.pptxModule_3_Part_3.pptx
Module_3_Part_3.pptx
 
CN-UNIT-3 __Network Layer (2).pptx
CN-UNIT-3 __Network Layer (2).pptxCN-UNIT-3 __Network Layer (2).pptx
CN-UNIT-3 __Network Layer (2).pptx
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 
Mit6 02 f12_chap18
Mit6 02 f12_chap18Mit6 02 f12_chap18
Mit6 02 f12_chap18
 
Forwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docxForwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docx
 
Transport layer
Transport layerTransport layer
Transport layer
 
Link layer
Link layerLink layer
Link layer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Final several design issues at network layer

  • 1.
  • 2. Implementation of Connection oriented Services
  • 3. Comparison of datagram subnet and virtual-circuit subnetAshishDubey(9) Hansel Gonsalves(12) KashyapDavariya(7)
  • 4. Implementation of Connectionless Services In Connectionless Service, no need to establish connection In this packets are injected into subnet and routed independently of each other. No advance set up is needed In this context the packets are frequently called datagram and subnet is called datagram subnet.
  • 5. Routing within a datagram subnet
  • 6. Let see the working of datagram subnet. Suppose process p1 has long message for process p2. It hands message with instructions to transport layer to deliver it to process 2 on host 2. The transport layer code runs on H1,within an OS. It prepends a transport header to the front of message and hands the result to the network layer.
  • 7. Assume that message is four times longer than maximum packet size. The Network layer breaks it into four packets 1, 2 ,3 and 4 and sends all to router A using point-to-point protocol. At this point carrier takes over. Every router has an internal table that tells where to send packets for each possible destinations.
  • 8. Each table entry is a pair consisting of a destination and the outgoing line to use for that destination. Only directly connected lines can be used. For eg: A has only two outgoing lines - to B and C - so every incoming packet must be sent to one of these routers, even if ultimate destination is some other router.
  • 9. As packets arrived at A, packets 1, 2 and 3 were stored briefly(to verify their checksums). Then each was forwarded to C according to A’s table . Packet 1 was then forwarded to C according to A’s table. Packet 1 was then forwarded to E and then to F and at F it was encapsulated in datalink layer frame and sent to H2 over the LAN.
  • 10. Packet 2 and 3 follow the same route. However packet 4 was routed at different router(i.e at B) for some reason. Perhaps it learned of traffic jam somewhere along the ACE path and updated its router table as “later”. The algorithm that manages the tables and makes the routing decisions is called Routing Algorithm.
  • 11. Implementation of Connection Oriented Services In this a connection is established. A path from source to the destination router must be established before any packets can be sent. This connection is virtual circuit with physical circuit set up by the telephone system Subnet is called virtual circuit subnet. The particular route choosen is used for all traffic flowing over the connection.
  • 12. With connection oriented service , each packet carries an identifier telling which virtual circuit it belongs.
  • 13. Routing within a virtual-circuit subnet.
  • 14. Here , host H1 has established a connection 1 with host H2. It is remembered as the first entry in each of the routing tables. The first lines of A’s table says that if a packet bearing connection identifier 1 comes from H1, it to be sent to router C and given a connection identifier 1. Similarly, the first entry at C routes the packet to E, also with connection identifier 1.
  • 15. Now let consider what happens if H3 also wants to establish a connection to H2. It chooses identifier 1(because it is initiating the connection and this is its only connection) and tells the subnet to establish the virtual circuit. This leads to the second row in the tables. Note that we have a conflict here because although A can easily distinguish connection 1 packets from H1 from connection 1 packets from H3 , C cannot do this.
  • 16. For this reason, A assigns a different connection identifier to the outgoing traffic for the second connection. Avoiding conflicts of this kind is why routers need the ability to replace connection identifiers in outgoing packets. In some contexts, this is called label swithing.
  • 17. Comparison of datagram subnet and virtual-circuit subnet
  • 18. Comparison of datagram subnet and virtual-circuit subnet