SlideShare ist ein Scribd-Unternehmen logo
1 von 154
Packet-Switching Networks
Packet-Switching Networks Network Services and Internal Network Operation Packet Network Topology Datagrams and Virtual Circuits Routing in Packet Networks Shortest Path Routing ATM Networks Traffic Management
Packet-Switching Networks Network Services and Internal Network Operation
Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packet Switching ,[object Object],[object Object],[object Object],t 0 t 1 Network
Network Service ,[object Object],[object Object],[object Object],End system β Physical layer Data link layer Physical layer Data link layer End system α Network layer Network layer Physical layer Data link layer Network layer Physical layer Data link layer Network layer Transport layer Transport layer Messages Messages Segments Network service Network service
Network Service vs. Operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Complexity at the Edge or in the Core? 1 1 3 3 2 1 2 2 3 2 1 1 2 2 1 2 1 Medium A B 3 2 1 1 2 2 1 C 2 1 2 1 2 1 4 1 2 3 4 End system α End system β Network 1 2 Physical layer entity Data link layer entity 3 Network layer entity 3 Network layer entity Transport layer entity 4
The End-to-End Argument for System Design ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Layer Functions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 7 Packet-Switching Networks Packet Network Topology
End-to-End Packet Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access Multiplexing ,[object Object],[object Object],[object Object],Access MUX To packet network
Oversubscription ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],N r/c n N/n 10 0.01 1 10 10 extremely lightly loaded users 10 0.05 3 3.3 10 very lightly loaded user 10 0.1 4 2.5 10 lightly loaded users 20 0.1 6 3.3 20 lightly loaded users 40 0.1 9 4.4 40 lightly loaded users 100 0.1 18 5.5 100 lightly loaded users •  • • Nr Nc r r r nc •  • •
Home LANs ,[object Object],[object Object],[object Object],[object Object],Home Router To packet network WiFi Ethernet
LAN Concentration ,[object Object],Switch / Router                                
Campus Network R R R R S S S s  s  s  s  s s s s s s R  s R Backbone To Internet or wide area network Organization Servers Departmental Server Gateway Only outgoing packets leave LAN through router High-speed campus backbone net connects dept routers Servers have redundant connectivity to backbone
Connecting to Internet Service Provider Interdomain level Intradomain level Autonomous system or domain Border routers Border routers Internet service provider s s s LAN Campus Network network administered by single organization
Internet Backbone ,[object Object],[object Object],National Service Provider A National Service Provider B National Service Provider C NAP NAP Private peering
R A R B R C Route Server NAP National Service Provider A National Service Provider B National Service Provider C LAN NAP NAP (a) (b) Private peering
Key Role of Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 7 Packet-Switching Networks Datagrams and Virtual Circuits
The Switching Function ,[object Object],[object Object],[object Object],[object Object],[object Object],Backbone Network Access Network Switch
Packet Switching Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Packet switch Network Transmission line User
[object Object],[object Object],[object Object],[object Object],[object Object],Message Switching Switches Message Destination Source Message Message Message
Message Switching Delay Additional queueing delays possible at each link t t t t Delay Source Destination T  Minimum delay = 3   + 3 T Switch 1 Switch 2
Long Messages vs. Packets ,[object Object],[object Object],[object Object],[object Object],1 Mbit  message How many bits need to be transmitted to deliver message? ,[object Object],[object Object],[object Object],[object Object],source dest BER=p=10 -6 BER=10 -6
Packet Switching - Datagram ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Packet 2 Packet 1 Packet 1 Packet 2 Packet 2
Packet Switching Delay Minimum Delay = 3 τ  + 5( T /3)  (single path assumed) Additional queueing delays possible at each link Packet pipelining enables message to arrive sooner Assume three packets corresponding to one message traverse same path t t t t Delay 3 1 2 3 1 2 3 2 1
Delay for k-Packet Message over L Hops t t t t 3 1 2 3 1 2 3 2 1 3   + 3( T /3)  first bit released 3    + 5 ( T /3)  last bit released L   + LP   first bit released L   +  LP + (k- 1 )P  last bit released where  T = k P 3 hops L  hops Source Destination Switch 1 Switch 2 
Routing Tables in Datagram Networks ,[object Object],[object Object],[object Object],[object Object],Destination address Output port 1345 12 2458 7 0785 6 12 1566
Example:  Internet Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packet Switching – Virtual Circuit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Virtual circuit Packet Packet Packet Packet
Connection Setup ,[object Object],[object Object],[object Object],[object Object],[object Object],SW 1 SW 2 SW  n Connect request Connect request Connect request Connect confirm Connect confirm Connect confirm …
Connection Setup Delay ,[object Object],[object Object],[object Object],t t t t 3 1 2 3 1 2 3 2 1 Release Connect request CR CR Connect confirm CC CC
Virtual Circuit Forwarding Tables ,[object Object],[object Object],[object Object],[object Object],[object Object],Input VCI Output port Output VCI 15 15 58 13 13 7 27 12 44 23 16 34
Cut-Through switching ,[object Object],[object Object],3 1 2 3 1 2 3 2 1 Minimum delay = 3    +  T   t t t t Source Destination Switch 1 Switch 2
Message vs. Packet Minimum Delay ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example:  ATM Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 7 Packet-Switching Networks Datagrams and Virtual Circuits Structure of a Packet Switch
Packet Switch:  Intersection where Traffic Flows Meet 1 2 N 1 2 N       ,[object Object],[object Object],[object Object],•  • • •  • • •  • •
Generic Packet Switch  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Controller 1 2 3 N Line card Line card Line card Line card Interconnection fabric Line card Line card Line card Line card 1 2 3 N Input ports Output ports Data path Control path (a) … … … …
Line Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Interconnection fabric Transceiver Transceiver Framer Framer Network processor Backplane transceivers To physical ports To switch fabric To other line cards
Shared Memory Packet Switch 1 2 3 N 1 2 3 N … Shared Memory Queue Control Ingress  Processing Connection Control … Output Buffering Small switches can be built by reading/writing into shared memory
Crossbar Switches 1 2 3 N 1 2 3 N Inputs Outputs (a) Input buffering 3 8 3 … … 1 2 3 N 1 2 3 N Inputs Outputs (b) Output buffering … … ,[object Object],[object Object],[object Object]
Self-Routing Switches ,[object Object],[object Object],[object Object],0 1 2 Inputs Outputs 3 4 5 6 7 0 1 2 3 4 5 6 7 Stage 1 Stage 2 Stage 3
Chapter 7 Packet-Switching Networks Routing in Packet Networks
Routing in Packet Networks ,[object Object],[object Object],[object Object],[object Object],1 2 3 4 5 6 Node  (switch or router)
Creating the Routing Tables ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Routing Algorithm Requirements  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Centralized vs Distributed Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Static vs Dynamic Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Routing in Virtual-Circuit Packet Networks ,[object Object],[object Object],1 2 3 4 5 6 A B C D 1 5 2 3 7 1 8 5 4 2 3 6 5 2 Switch or router Host VCI
Routing Tables in VC Packet Networks ,[object Object],[object Object],[object Object],Incoming  Outgoing Node  VCI  Node  VCI A  1  3  2 A  5  3  3 3  2  A  1 3  3  A  5 Incoming  Outgoing Node  VCI  Node  VCI 1  2  6  7 1  3  4  4 4  2  6  1 6  7  1  2 6  1  4  2 4  4  1  3 Incoming  Outgoing Node  VCI  Node  VCI 3  7  B  8 3  1  B  5 B  5  3  1 B  8  3  7 Incoming  Outgoing Node  VCI  Node  VCI C  6  4  3 4  3  C  6 Incoming  Outgoing Node  VCI  Node  VCI 2  3  3  2 3  4  5  5 3  2  2  3 5  5  3  4 Incoming  Outgoing Node  VCI  Node  VCI 4  5  D  2 D  2  4  5 Node 1 Node 2 Node 3 Node 4 Node 6 Node 5
Routing Tables in Datagram Packet Networks 2  2 3  3 4  4 5  2 6  3 Node 1 Node 2 Node 3 Node 4 Node 6 Node 5 1  1 2  4 4  4 5  6 6  6 1  3 2  5 3  3 4  3 5  5 Destination  Next node 1  1 3    1 4  4 5  5 6    5 1  4 2  2 3  4 4  4 6  6 1  1 2  2 3  3 5  5 6  3 Destination  Next node Destination  Next node Destination  Next node Destination  Next node Destination  Next node
Non-Hierarchical Addresses and Routing ,[object Object],[object Object],0000 0111 1010 1101 0001 0100 1011 1110 0011 0101 1000 1111 0011 0110 1001 1100 R 1 1 2 5 4 3 0000  1 0111  1 1010  1  …  … 0001  4 0100  4 1011  4  …  … R 2
Hierarchical Addresses and Routing ,[object Object],[object Object],0000 0001 0010 0011 0100 0101 0110 0111 1100 1101 1110 1111 1000 1001 1010 1011 R 1 R 2 1 2 5 4 3 00  1 01  3 10  2 11  3 00  3 01  4 10  3 11  5
Flat vs Hierarchical Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Specialized Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Flooding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Flooding is initiated from Node 1:  Hop 1 transmissions 1 2 3 4 5 6
Flooding is initiated from Node 1:  Hop 2 transmissions 1 2 3 4 5 6
1 2 3 4 5 6 Flooding is initiated from Node 1:  Hop 3 transmissions
Limited Flooding ,[object Object],[object Object],[object Object]
Deflection Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tunnel from last column to first column or vice versa 0,0 0,1 0,2 0,3 1,0 1,1 1,2 1,3 2,0 2,1 2,2 2,3 3,0 3,1 3,2 3,3
Example: Node (0,2) ->(1,0) 0,0 0,1 0,2 0,3 1,0 1,1 1,2 1,3 2,0 2,1 2,2 2,3 3,0 3,1 3,2 3,3 busy
Chapter 7 Packet-Switching Networks Shortest Path Routing
Shortest Paths & Routing ,[object Object],[object Object],[object Object],[object Object]
Routing Metrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Shortest Path Approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distance Vector Do you know the way to San Jose? San Jose  392 San Jose  596 San Jose  294 San Jose  250
Distance Vector ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],dest next dist
Shortest Path to SJ San Jose C ij D j D i If  D i   is the shortest distance to SJ from  i and if  j  is a neighbor on the shortest path, then  D i  = C ij  + D j Focus on how nodes find their shortest path to a given destination node, i.e.  SJ i j
But we don’t know the shortest paths i  only has local info from neighbors  D j" C ij” C ij D j D i C ij' D j' Pick current  shortest path  i San Jose j j" j'
Why Distance Vector Works 1 Hop From SJ 2 Hops From SJ 3 Hops From SJ Hop-1 nodes calculate current  (next hop, dist), & send to neighbors San Jose Accurate info about SJ ripples across network, Shortest Path Converges SJ sends accurate info
Bellman-Ford Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bellman-Ford Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
San Jose Table entry  @ node 1 for dest SJ Table entry  @ node 3 for dest SJ Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (-1,   ) (-1,   ) (-1,   ) (-1,   ) (-1,   ) 1 2 3 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
San Jose 0 2 1 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (-1,   ) (-1,   ) (-1,   ) (-1,   ) (-1,   ) 1 (-1,   ) (-1,   ) (6,1) (-1,   ) (6,2) 2 3 D 6 =0 D 3 =D 6 +1 n 3 =6 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5 D 6 =0 D 5 =D 6 +2 n 5 =6
San Jose 0 1 2 3 3 6 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (-1,   ) (-1,   ) (-1,   ) (-1,   ) (-1,   ) 1 (-1,   ) (-1,   ) (6, 1) (-1,   ) (6,2) 2 (3,3) (5,6) (6, 1) (3,3) (6,2) 3 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
San Jose 0 1 2 6 3 3 4 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (-1,   ) (-1,   ) (-1,   ) (-1,   ) (-1,   ) 1 (-1,   ) (-1,   ) (6, 1) (-1,   ) (6,2) 2 (3,3) (5,6) (6, 1) (3,3) (6,2) 3 (3,3) (4,4) (6, 1) (3,3) (6,2) 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
San Jose 0 1 2 3 3 4 Network disconnected;  Loop created between nodes 3 and 4 5 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (3,3) (4,4) (6, 1) (3,3) (6,2) 1 (3,3) (4,4) (4, 5) (3,3) (6,2) 2 3 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
San Jose 0 2 5 3 3 4 7 5 Node 4 could have chosen 2 as next node because of tie  Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (3,3) (4,4) (6, 1) (3,3) (6,2) 1 (3,3) (4,4) (4, 5) (3,3) (6,2) 2 (3,7) (4,4) (4, 5) (5,5) (6,2) 3 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
San Jose 0 2 5 5 7 4 7 6 Node 2 could have chosen 5 as next node because of tie Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (3,3) (4,4) (6, 1) (3,3) (6,2) 1 (3,3) (4,4) (4, 5) (3,3) (6,2) 2 (3,7) (4,4) (4, 5) (5,5) (6,2) 3 (3,7) (4,6) (4, 7) (5,5) (6,2) 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
San Jose 0 7 7 5 6 9 2 Node 1 could have chose 3 as next node because of tie 3 5 4 6 2 2 3 4 2 1 1 2 3 5 1 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 1 (3,3) (4,4) (4, 5) (3,3) (6,2) 2 (3,7) (4,4) (4, 5) (2,5) (6,2) 3 (3,7) (4,6) (4, 7) (5,5) (6,2) 4 (2,9) (4,6) (4, 7) (5,5) (6,2)
Counting to Infinity Problem Nodes believe best path is through each other (Destination is node 4) 3 1 2 4 1 1 1 3 1 2 4 1 1 X (a) (b) Update Node 1 Node 2 Node 3 Before break (2,3) (3,2) (4, 1) After break (2,3) (3,2) (2,3) 1 (2,3) (3,4) (2,3) 2 (2,5) (3,4) (2,5) 3 (2,5) (3,6) (2,5) 4 (2,7) (3,6) (2,7) 5 (2,7) (3,8) (2,7) … … … …
Problem:  Bad News Travels Slowly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Split Horizon with Poison Reverse Nodes believe best path is through each other 3 1 2 4 1 1 1 3 1 2 4 1 1 X (a) (b) Update Node 1 Node 2 Node 3 Before break (2, 3) (3, 2) (4, 1) After break (2, 3) (3, 2) (-1,   ) Node 2 advertizes its route to 4 to node 3 as having distance infinity;  node 3 finds there is no route to 4 1 (2, 3) (-1,   ) (-1,   ) Node 1 advertizes its route to 4 to node 2 as having distance infinity;  node 2 finds there is no route to 4 2 (-1,   ) (-1,   ) (-1,   ) Node 1 finds there is no route to 4
Link-State Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dijkstra Algorithm:  Finding shortest paths in order Closest node to  s  is 1 hop away 2 nd  closest node to  s  is 1 hop  away from  s  or  w” 3rd closest node to  s  is 1 hop  away from  s ,  w”,  or  x Find shortest paths from source s to all other destinations s w w" w' w" x x' x z z' w'
Dijkstra’s algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Minimum distance from s  to  j through node  i  in N
Execution of Dijkstra’s algorithm          Iteration N D 2 D 3 D 4 D 5 D 6 Initial {1} 3 2 5   1 {1,3} 3 2 4  3 2 {1,2,3} 3 2 4 7 3 3 {1,2,3,6} 3 2 4 5 3 4 {1,2,3,4,6} 3 2 4 5 3 5 {1,2,3,4,5,6} 3 2 4 5 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3
Shortest Paths in  Dijkstra’s Algorithm 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3
Reaction to Failure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why is Link State Better? ,[object Object],[object Object],[object Object],[object Object]
Source Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example 1 2 3 4 5 6 A B Source host Destination host 1,3,6,B 3,6,B 6,B B
Chapter 7 Packet-Switching Networks ATM Networks
Asynchronous Tranfer Mode (ATM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATM Networking ,[object Object],[object Object],ATM Adaptation Layer ATM Adaptation Layer ATM Network Video Packet Voice Video Packet Voice ,[object Object]
TDM vs. Packet Multiplexing    * * In mid-1980s, packet processing mainly in software and hence slow;  By late 1990s, very high speed packet processing possible Variable bit rate Delay Burst traffic Processing TDM Multirate only Low, fixed Inefficient Minimal, very high speed Packet Easily handled Variable Efficient Header & packet processing required
ATM:  Attributes of TDM & Packet Switching ,[object Object],[object Object],Packet Header MUX Wasted bandwidth ATM TDM 3  2  1  4  3  2  1  4  3  2  1 4  3  1  3  2  2  1 Voice Data packets Images 1 2 3 4
ATM Switching Switch carries out table translation and routing ,[object Object],[object Object],2 3 N 1 Switch N 1 5 6 video video voice data 25 32 32 61 75 67 39 67 N 1 3 2 video 75 voice data video … … … 32 25 32 61 39 67 67
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ATM Virtual Connections Physical link Virtual paths Virtual channels
VPI/VCI switching & multiplexing ,[object Object],[object Object],[object Object],[object Object],ATM Sw 1 ATM Sw 4 ATM Sw 2 ATM Sw 3 ATM cross- connect a b c d e VPI 3 VPI 5 VPI 2 VPI 1 a b c d e Sw = switch
MPLS & ATM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 7 Packet-Switching Networks Traffic Management  Packet Level Flow Level Flow-Aggregate Level
Traffic Management  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Time Scales & Granularities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
End-to-End QoS ,[object Object],[object Object],1 2 N N  – 1 Packet buffer …
Scheduling & QoS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FIFO Queueing ,[object Object],[object Object],[object Object],Packet buffer Transmission link Arriving packets Packet discard when full
FIFO Queueing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FIFO Queueing with Discard Priority Packet buffer Transmission link Arriving packets Packet discard when full Packet buffer Transmission link Arriving packets Class 1 discard when full Class 2 discard when threshold exceeded (a) (b)
HOL Priority Queueing ,[object Object],[object Object],[object Object],[object Object],Transmission link Packet discard when full High-priority packets Low-priority packets Packet discard when full When high-priority queue empty
HOL Priority Features ,[object Object],[object Object],[object Object],[object Object],[object Object],(Note: Need labeling) Delay Per-class loads
Earliest Due Date Scheduling ,[object Object],[object Object],[object Object],Sorted packet buffer Transmission link Arriving packets Packet discard when full Tagging unit
[object Object],[object Object],[object Object],[object Object],[object Object],Fair Queueing / Generalized Processor Sharing … … C  bits/second Transmission link Packet flow 1 Packet flow 2 Packet flow  n Approximated bit-level round robin service
Buffer 1 at  t =0 Buffer 2 at  t =0 1 t 1 2 Fluid-flow system: both packets served  at rate 1/2 Both packets complete service at  t  = 2 0 1 t 1 2 Packet-by-packet system: buffer 1 served first at rate 1; then buffer 2 served at rate 1. Packet from buffer 2 being served Packet from buffer 1 being served Packet from buffer 2 waiting 0
Buffer 1 at  t =0 Buffer 2 at  t =0 2 1 t 3 Fluid-flow system: both packets served  at rate 1/2 Packet from buffer 2 served at rate 1 0 2 1 t 1 2 Packet-by-packet  fair queueing: buffer 2 served at rate 1 Packet from buffer 1 served at rate 1 Packet from buffer 2 waiting 0 3
Buffer 1 at  t =0 Buffer 2 at  t =0 1 t 1 2 Fluid-flow system: packet from buffer 1 served at rate 1/4; Packet from buffer 1  served at rate 1 Packet from buffer 2 served at rate 3/4 0 1 t 1 2 Packet from buffer 1 served at rate 1 Packet from buffer 2  served at rate 1 Packet from buffer 1 waiting 0 Packet-by-packet weighted fair queueing: buffer 2 served first at rate 1; then buffer 1 served at rate 1
Packetized GPS/WFQ ,[object Object],[object Object],[object Object],[object Object],Sorted packet buffer Transmission link Arriving packets Packet discard when full Tagging unit
Bit-by-Bit Fair Queueing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],rounds Current Round #
Differential Service:  If a traffic flow is to receive twice as much bandwidth as a regular flow, then its packet completion time would be half Buffer 1 Buffer 2 Buffer  n Number of rounds = Number of bit transmission opportunities Rounds Packet of length k bits begins transmission at this time Packet completes transmission k rounds later …
[object Object],[object Object],[object Object],Computing the Finishing Time ,[object Object],[object Object],[object Object],[object Object],Generalize so  R(t)  continuous, not discrete R(t)  grows at rate inversely proportional to  n(t) rounds
WFQ and Packet QoS ,[object Object],[object Object],[object Object]
Buffer Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Early or Overloaded Drop ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Random Early Detection (RED) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packet Drop Profile in RED Average queue length Probability of packet drop 1 0 min th max th full
Chapter 7 Packet-Switching Networks Traffic Management at the Flow Level
Congestion occurs when a surge of traffic overloads network resources ,[object Object],[object Object],[object Object],4 8 6 3 2 1 5 7 Congestion
Ideal effect of congestion control:  Resources used efficiently up to capacity available Offered load Throughput Controlled Uncontrolled
Open-Loop Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Admission Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Typical bit rate demanded by a variable bit rate information source Time Bits/second Peak rate Average rate
Policing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Leaky Bucket algorithm can be used to police arrival rate of a packet stream Let X = bucket content at last conforming packet arrival Let t a  – last conforming packet arrival time = depletion in bucket water drains at a constant rate leaky bucket water poured irregularly Leak rate corresponds to long-term rate Bucket depth corresponds to maximum allowable burst arrival 1 packet per unit time Assume constant-length packet as in ATM
Leaky Bucket Algorithm Depletion rate:  1 packet per unit time L+I  = Bucket Depth I  = increment per arrival,  nominal interarrival time Interarrival time Current bucket content arriving packet would cause  overflow empty Non-empty conforming packet Arrival of a packet at time  t a X’  =  X  - ( t a   -  LCT ) X’  < 0? X’  >  L ? X  =  X’  +  I LCT  =  t a   conforming packet X’  = 0 Nonconforming packet X  =  value of the leaky bucket counter X’  =  auxiliary variable LCT  = last conformance time Yes No Yes No
Leaky Bucket Example I  = 4  L  = 6 Non-conforming packets not allowed into bucket & hence not included in calculations I L+I Bucket content Time Time Packet arrival Nonconforming * * * * * * * * *
Policing Parameters T  = 1 / peak rate MBS = maximum burst size I  = nominal interarrival time = 1 / sustainable rate Time MBS T L I
Dual Leaky Bucket Dual leaky bucket to police PCR, SCR, and MBS: Tagged or dropped Untagged traffic Incoming traffic Untagged traffic PCR = peak cell rate CDVT = cell delay variation tolerance SCR = sustainable cell rate MBS = maximum burst size Leaky bucket 1 SCR and MBS Leaky bucket 2 PCR and CDVT Tagged or dropped
Traffic Shaping ,[object Object],[object Object],[object Object],Network C Network A Network B Traffic shaping Traffic shaping Policing Policing 1 2 3 4
Leaky Bucket Traffic Shaper ,[object Object],[object Object],[object Object],[object Object],[object Object],Incoming traffic Shaped traffic Size  N Packet Server
Token Bucket Traffic Shaper ,[object Object],[object Object],[object Object],An incoming packet must have sufficient tokens before admission into the network Incoming traffic Shaped traffic Size  N Size  K Tokens arrive periodically Server Packet Token
Token Bucket Shaping Effect The token bucket constrains the traffic from a source to be limited to  b  +  r t  bits in an interval of length  t b + r t b  bytes instantly t r  bytes/second
Packet transfer with Delay Guarantees Token Shaper Bit rate  >  R > r e.g., using WFQ ,[object Object],[object Object],[object Object],[object Object],[object Object],bR b  R - r (b) Buffer occupancy at 1 0 Empty t t Buffer occupancy at 2 A(t) = b+rt R(t) No backlog of packets (a) 1 2
Delay Bounds with WFQ / PGPS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scheduling for Guaranteed Service ,[object Object],[object Object],[object Object],[object Object]
Current View of Router Function Classifier Input driver Internet forwarder Pkt. scheduler Output driver Routing Agent Reservation Agent Mgmt. Agent Admission Control [Routing database] [Traffic control database]
Closed-Loop Flow Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
End-to-End vs. Hop-by-Hop Congestion Control Source Destination Feedback information Packet flow Source Destination (a) (b)
Traffic Engineering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Shortest path routing congests link 4 to 8 Better flow allocation distributes flows more uniformly 4 6 3 2 1 5 8 7 4 6 3 2 1 5 8 7 (a) (b)

Weitere ähnliche Inhalte

Was ist angesagt?

Packet switching
Packet switchingPacket switching
Packet switchingVikash Dhal
 
Circuit Packet
Circuit PacketCircuit Packet
Circuit PacketWaqas !!!!
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Kaushik Panta
 
WT - Circuit & Packet switching
WT - Circuit & Packet switchingWT - Circuit & Packet switching
WT - Circuit & Packet switchingvinay arora
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 ProtocolMiles Kevin Galario
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Dc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingDc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingSyaiful Ahdan
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingDr Rajiv Srivastava
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switchingDr Rajiv Srivastava
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Tutun Juhana
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Switching
Switching Switching
Switching Abid Ali
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5hz3012
 
Switching Techniques Lecture12,wireless
Switching Techniques Lecture12,wirelessSwitching Techniques Lecture12,wireless
Switching Techniques Lecture12,wirelessNavaizImtiaz1
 

Was ist angesagt? (20)

Packet switching
Packet switchingPacket switching
Packet switching
 
Circuit Packet
Circuit PacketCircuit Packet
Circuit Packet
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
 
WT - Circuit & Packet switching
WT - Circuit & Packet switchingWT - Circuit & Packet switching
WT - Circuit & Packet switching
 
Lecture set 1
Lecture set 1Lecture set 1
Lecture set 1
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
Networks 1-intro
Networks 1-introNetworks 1-intro
Networks 1-intro
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Dc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switchingDc ch10 : circuit switching and packet switching
Dc ch10 : circuit switching and packet switching
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Switching
Switching Switching
Switching
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
 
packet switching
packet switchingpacket switching
packet switching
 
Switching Techniques Lecture12,wireless
Switching Techniques Lecture12,wirelessSwitching Techniques Lecture12,wireless
Switching Techniques Lecture12,wireless
 

Andere mochten auch

Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switchingSneha Dalvi
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching9181511
 
Evolution Of Telecommunication
Evolution Of TelecommunicationEvolution Of Telecommunication
Evolution Of TelecommunicationRohan Attravanam
 
Computer Networks 2
Computer Networks 2Computer Networks 2
Computer Networks 2Mr Smith
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2Techglyphs
 
Palestra Fabiano Coura
Palestra Fabiano CouraPalestra Fabiano Coura
Palestra Fabiano Couramarkimtv
 
layering-protocol-verif
layering-protocol-veriflayering-protocol-verif
layering-protocol-verifRavindra Ganti
 
2b switching in networks
2b switching in networks2b switching in networks
2b switching in networkskavish dani
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithmslavanyapathy
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingBisrat Girma
 

Andere mochten auch (15)

Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switching
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
 
CCNA- part 11 frame relay
CCNA- part 11 frame relayCCNA- part 11 frame relay
CCNA- part 11 frame relay
 
Evolution Of Telecommunication
Evolution Of TelecommunicationEvolution Of Telecommunication
Evolution Of Telecommunication
 
Computer Networks 2
Computer Networks 2Computer Networks 2
Computer Networks 2
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2
 
Chap 03
Chap 03Chap 03
Chap 03
 
Palestra Fabiano Coura
Palestra Fabiano CouraPalestra Fabiano Coura
Palestra Fabiano Coura
 
layering-protocol-verif
layering-protocol-veriflayering-protocol-verif
layering-protocol-verif
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
2b switching in networks
2b switching in networks2b switching in networks
2b switching in networks
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 

Ähnlich wie Unit i packet switching networks

Wmcn ch.3
Wmcn ch.3Wmcn ch.3
Wmcn ch.3Alaa2
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)Sri Prasanna
 
Lecture 2 review of network technologies
Lecture 2 review of network technologiesLecture 2 review of network technologies
Lecture 2 review of network technologiesBatzaya Dashdondog
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overviewSripati Mahapatra
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Aswini Badatya
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Saumendra Pradhan
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsUMA MAHESWARI
 
Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communicationAshwin Namewar
 
Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Sugan Nalla
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
lec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptlec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptMahamKhurram4
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systemskingGovindi
 

Ähnlich wie Unit i packet switching networks (20)

Tcp ip
Tcp ipTcp ip
Tcp ip
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Chapter#3
Chapter#3Chapter#3
Chapter#3
 
Wmcn ch.3
Wmcn ch.3Wmcn ch.3
Wmcn ch.3
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
Lecture 2 review of network technologies
Lecture 2 review of network technologiesLecture 2 review of network technologies
Lecture 2 review of network technologies
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communication
 
22 circuits
22 circuits22 circuits
22 circuits
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
lec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptlec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.ppt
 
Chapter4 Network
Chapter4 NetworkChapter4 Network
Chapter4 Network
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systems
 

Mehr von sangusajjan

Unit iv atm networks
Unit iv atm networksUnit iv atm networks
Unit iv atm networkssangusajjan
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Network management
Network managementNetwork management
Network managementsangusajjan
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and videosangusajjan
 
Computer network lesson plan
Computer network lesson planComputer network lesson plan
Computer network lesson plansangusajjan
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introductionsangusajjan
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission controlsangusajjan
 
Unit VI Overlays
Unit VI OverlaysUnit VI Overlays
Unit VI Overlayssangusajjan
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and securitysangusajjan
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDPsangusajjan
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 

Mehr von sangusajjan (19)

Unit iv atm networks
Unit iv atm networksUnit iv atm networks
Unit iv atm networks
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
TCPIP
TCPIPTCPIP
TCPIP
 
Network management
Network managementNetwork management
Network management
 
Vp ns
Vp nsVp ns
Vp ns
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
 
ATM Network
ATM NetworkATM Network
ATM Network
 
Computer network lesson plan
Computer network lesson planComputer network lesson plan
Computer network lesson plan
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
Profile
ProfileProfile
Profile
 
VII VoIP
VII VoIPVII VoIP
VII VoIP
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introduction
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
 
Unit VI Overlays
Unit VI OverlaysUnit VI Overlays
Unit VI Overlays
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
 
Vivpn pp tfinal
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinal
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 

Unit i packet switching networks

  • 2. Packet-Switching Networks Network Services and Internal Network Operation Packet Network Topology Datagrams and Virtual Circuits Routing in Packet Networks Shortest Path Routing ATM Networks Traffic Management
  • 3. Packet-Switching Networks Network Services and Internal Network Operation
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Complexity at the Edge or in the Core? 1 1 3 3 2 1 2 2 3 2 1 1 2 2 1 2 1 Medium A B 3 2 1 1 2 2 1 C 2 1 2 1 2 1 4 1 2 3 4 End system α End system β Network 1 2 Physical layer entity Data link layer entity 3 Network layer entity 3 Network layer entity Transport layer entity 4
  • 9.
  • 10.
  • 11. Chapter 7 Packet-Switching Networks Packet Network Topology
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Campus Network R R R R S S S s s s s s s s s s s R s R Backbone To Internet or wide area network Organization Servers Departmental Server Gateway Only outgoing packets leave LAN through router High-speed campus backbone net connects dept routers Servers have redundant connectivity to backbone
  • 18. Connecting to Internet Service Provider Interdomain level Intradomain level Autonomous system or domain Border routers Border routers Internet service provider s s s LAN Campus Network network administered by single organization
  • 19.
  • 20. R A R B R C Route Server NAP National Service Provider A National Service Provider B National Service Provider C LAN NAP NAP (a) (b) Private peering
  • 21.
  • 22. Chapter 7 Packet-Switching Networks Datagrams and Virtual Circuits
  • 23.
  • 24.
  • 25.
  • 26. Message Switching Delay Additional queueing delays possible at each link t t t t Delay Source Destination T  Minimum delay = 3  + 3 T Switch 1 Switch 2
  • 27.
  • 28.
  • 29. Packet Switching Delay Minimum Delay = 3 τ + 5( T /3) (single path assumed) Additional queueing delays possible at each link Packet pipelining enables message to arrive sooner Assume three packets corresponding to one message traverse same path t t t t Delay 3 1 2 3 1 2 3 2 1
  • 30. Delay for k-Packet Message over L Hops t t t t 3 1 2 3 1 2 3 2 1 3  + 3( T /3) first bit released 3  + 5 ( T /3) last bit released L  + LP first bit released L  + LP + (k- 1 )P last bit released where T = k P 3 hops L hops Source Destination Switch 1 Switch 2 
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Chapter 7 Packet-Switching Networks Datagrams and Virtual Circuits Structure of a Packet Switch
  • 41.
  • 42.
  • 43.
  • 44. Shared Memory Packet Switch 1 2 3 N 1 2 3 N … Shared Memory Queue Control Ingress Processing Connection Control … Output Buffering Small switches can be built by reading/writing into shared memory
  • 45.
  • 46.
  • 47. Chapter 7 Packet-Switching Networks Routing in Packet Networks
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55. Routing Tables in Datagram Packet Networks 2 2 3 3 4 4 5 2 6 3 Node 1 Node 2 Node 3 Node 4 Node 6 Node 5 1 1 2 4 4 4 5 6 6 6 1 3 2 5 3 3 4 3 5 5 Destination Next node 1 1 3 1 4 4 5 5 6 5 1 4 2 2 3 4 4 4 6 6 1 1 2 2 3 3 5 5 6 3 Destination Next node Destination Next node Destination Next node Destination Next node Destination Next node
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. Flooding is initiated from Node 1: Hop 1 transmissions 1 2 3 4 5 6
  • 62. Flooding is initiated from Node 1: Hop 2 transmissions 1 2 3 4 5 6
  • 63. 1 2 3 4 5 6 Flooding is initiated from Node 1: Hop 3 transmissions
  • 64.
  • 65.
  • 66. Tunnel from last column to first column or vice versa 0,0 0,1 0,2 0,3 1,0 1,1 1,2 1,3 2,0 2,1 2,2 2,3 3,0 3,1 3,2 3,3
  • 67. Example: Node (0,2) ->(1,0) 0,0 0,1 0,2 0,3 1,0 1,1 1,2 1,3 2,0 2,1 2,2 2,3 3,0 3,1 3,2 3,3 busy
  • 68. Chapter 7 Packet-Switching Networks Shortest Path Routing
  • 69.
  • 70.
  • 71.
  • 72. Distance Vector Do you know the way to San Jose? San Jose 392 San Jose 596 San Jose 294 San Jose 250
  • 73.
  • 74. Shortest Path to SJ San Jose C ij D j D i If D i is the shortest distance to SJ from i and if j is a neighbor on the shortest path, then D i = C ij + D j Focus on how nodes find their shortest path to a given destination node, i.e. SJ i j
  • 75. But we don’t know the shortest paths i only has local info from neighbors D j&quot; C ij” C ij D j D i C ij' D j' Pick current shortest path i San Jose j j&quot; j'
  • 76. Why Distance Vector Works 1 Hop From SJ 2 Hops From SJ 3 Hops From SJ Hop-1 nodes calculate current (next hop, dist), & send to neighbors San Jose Accurate info about SJ ripples across network, Shortest Path Converges SJ sends accurate info
  • 77.
  • 78.
  • 79. San Jose Table entry @ node 1 for dest SJ Table entry @ node 3 for dest SJ Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (-1,  ) (-1,  ) (-1,  ) (-1,  ) (-1,  ) 1 2 3 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
  • 80. San Jose 0 2 1 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (-1,  ) (-1,  ) (-1,  ) (-1,  ) (-1,  ) 1 (-1,  ) (-1,  ) (6,1) (-1,  ) (6,2) 2 3 D 6 =0 D 3 =D 6 +1 n 3 =6 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5 D 6 =0 D 5 =D 6 +2 n 5 =6
  • 81. San Jose 0 1 2 3 3 6 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (-1,  ) (-1,  ) (-1,  ) (-1,  ) (-1,  ) 1 (-1,  ) (-1,  ) (6, 1) (-1,  ) (6,2) 2 (3,3) (5,6) (6, 1) (3,3) (6,2) 3 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
  • 82. San Jose 0 1 2 6 3 3 4 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (-1,  ) (-1,  ) (-1,  ) (-1,  ) (-1,  ) 1 (-1,  ) (-1,  ) (6, 1) (-1,  ) (6,2) 2 (3,3) (5,6) (6, 1) (3,3) (6,2) 3 (3,3) (4,4) (6, 1) (3,3) (6,2) 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
  • 83. San Jose 0 1 2 3 3 4 Network disconnected; Loop created between nodes 3 and 4 5 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (3,3) (4,4) (6, 1) (3,3) (6,2) 1 (3,3) (4,4) (4, 5) (3,3) (6,2) 2 3 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
  • 84. San Jose 0 2 5 3 3 4 7 5 Node 4 could have chosen 2 as next node because of tie Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (3,3) (4,4) (6, 1) (3,3) (6,2) 1 (3,3) (4,4) (4, 5) (3,3) (6,2) 2 (3,7) (4,4) (4, 5) (5,5) (6,2) 3 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
  • 85. San Jose 0 2 5 5 7 4 7 6 Node 2 could have chosen 5 as next node because of tie Iteration Node 1 Node 2 Node 3 Node 4 Node 5 Initial (3,3) (4,4) (6, 1) (3,3) (6,2) 1 (3,3) (4,4) (4, 5) (3,3) (6,2) 2 (3,7) (4,4) (4, 5) (5,5) (6,2) 3 (3,7) (4,6) (4, 7) (5,5) (6,2) 3 1 5 4 6 2 2 3 4 2 1 1 2 3 5
  • 86. San Jose 0 7 7 5 6 9 2 Node 1 could have chose 3 as next node because of tie 3 5 4 6 2 2 3 4 2 1 1 2 3 5 1 Iteration Node 1 Node 2 Node 3 Node 4 Node 5 1 (3,3) (4,4) (4, 5) (3,3) (6,2) 2 (3,7) (4,4) (4, 5) (2,5) (6,2) 3 (3,7) (4,6) (4, 7) (5,5) (6,2) 4 (2,9) (4,6) (4, 7) (5,5) (6,2)
  • 87. Counting to Infinity Problem Nodes believe best path is through each other (Destination is node 4) 3 1 2 4 1 1 1 3 1 2 4 1 1 X (a) (b) Update Node 1 Node 2 Node 3 Before break (2,3) (3,2) (4, 1) After break (2,3) (3,2) (2,3) 1 (2,3) (3,4) (2,3) 2 (2,5) (3,4) (2,5) 3 (2,5) (3,6) (2,5) 4 (2,7) (3,6) (2,7) 5 (2,7) (3,8) (2,7) … … … …
  • 88.
  • 89. Split Horizon with Poison Reverse Nodes believe best path is through each other 3 1 2 4 1 1 1 3 1 2 4 1 1 X (a) (b) Update Node 1 Node 2 Node 3 Before break (2, 3) (3, 2) (4, 1) After break (2, 3) (3, 2) (-1,  ) Node 2 advertizes its route to 4 to node 3 as having distance infinity; node 3 finds there is no route to 4 1 (2, 3) (-1,  ) (-1,  ) Node 1 advertizes its route to 4 to node 2 as having distance infinity; node 2 finds there is no route to 4 2 (-1,  ) (-1,  ) (-1,  ) Node 1 finds there is no route to 4
  • 90.
  • 91. Dijkstra Algorithm: Finding shortest paths in order Closest node to s is 1 hop away 2 nd closest node to s is 1 hop away from s or w” 3rd closest node to s is 1 hop away from s , w”, or x Find shortest paths from source s to all other destinations s w w&quot; w' w&quot; x x' x z z' w'
  • 92.
  • 93. Execution of Dijkstra’s algorithm          Iteration N D 2 D 3 D 4 D 5 D 6 Initial {1} 3 2 5   1 {1,3} 3 2 4  3 2 {1,2,3} 3 2 4 7 3 3 {1,2,3,6} 3 2 4 5 3 4 {1,2,3,4,6} 3 2 4 5 3 5 {1,2,3,4,5,6} 3 2 4 5 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3
  • 94. Shortest Paths in Dijkstra’s Algorithm 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3 1 2 4 5 6 1 1 2 3 2 3 5 2 4 3 3
  • 95.
  • 96.
  • 97.
  • 98. Example 1 2 3 4 5 6 A B Source host Destination host 1,3,6,B 3,6,B 6,B B
  • 99. Chapter 7 Packet-Switching Networks ATM Networks
  • 100.
  • 101.
  • 102. TDM vs. Packet Multiplexing    * * In mid-1980s, packet processing mainly in software and hence slow; By late 1990s, very high speed packet processing possible Variable bit rate Delay Burst traffic Processing TDM Multirate only Low, fixed Inefficient Minimal, very high speed Packet Easily handled Variable Efficient Header & packet processing required
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108. Chapter 7 Packet-Switching Networks Traffic Management Packet Level Flow Level Flow-Aggregate Level
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115. FIFO Queueing with Discard Priority Packet buffer Transmission link Arriving packets Packet discard when full Packet buffer Transmission link Arriving packets Class 1 discard when full Class 2 discard when threshold exceeded (a) (b)
  • 116.
  • 117.
  • 118.
  • 119.
  • 120. Buffer 1 at t =0 Buffer 2 at t =0 1 t 1 2 Fluid-flow system: both packets served at rate 1/2 Both packets complete service at t = 2 0 1 t 1 2 Packet-by-packet system: buffer 1 served first at rate 1; then buffer 2 served at rate 1. Packet from buffer 2 being served Packet from buffer 1 being served Packet from buffer 2 waiting 0
  • 121. Buffer 1 at t =0 Buffer 2 at t =0 2 1 t 3 Fluid-flow system: both packets served at rate 1/2 Packet from buffer 2 served at rate 1 0 2 1 t 1 2 Packet-by-packet fair queueing: buffer 2 served at rate 1 Packet from buffer 1 served at rate 1 Packet from buffer 2 waiting 0 3
  • 122. Buffer 1 at t =0 Buffer 2 at t =0 1 t 1 2 Fluid-flow system: packet from buffer 1 served at rate 1/4; Packet from buffer 1 served at rate 1 Packet from buffer 2 served at rate 3/4 0 1 t 1 2 Packet from buffer 1 served at rate 1 Packet from buffer 2 served at rate 1 Packet from buffer 1 waiting 0 Packet-by-packet weighted fair queueing: buffer 2 served first at rate 1; then buffer 1 served at rate 1
  • 123.
  • 124.
  • 125. Differential Service: If a traffic flow is to receive twice as much bandwidth as a regular flow, then its packet completion time would be half Buffer 1 Buffer 2 Buffer n Number of rounds = Number of bit transmission opportunities Rounds Packet of length k bits begins transmission at this time Packet completes transmission k rounds later …
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131. Packet Drop Profile in RED Average queue length Probability of packet drop 1 0 min th max th full
  • 132. Chapter 7 Packet-Switching Networks Traffic Management at the Flow Level
  • 133.
  • 134. Ideal effect of congestion control: Resources used efficiently up to capacity available Offered load Throughput Controlled Uncontrolled
  • 135.
  • 136.
  • 137.
  • 138. Leaky Bucket algorithm can be used to police arrival rate of a packet stream Let X = bucket content at last conforming packet arrival Let t a – last conforming packet arrival time = depletion in bucket water drains at a constant rate leaky bucket water poured irregularly Leak rate corresponds to long-term rate Bucket depth corresponds to maximum allowable burst arrival 1 packet per unit time Assume constant-length packet as in ATM
  • 139. Leaky Bucket Algorithm Depletion rate: 1 packet per unit time L+I = Bucket Depth I = increment per arrival, nominal interarrival time Interarrival time Current bucket content arriving packet would cause overflow empty Non-empty conforming packet Arrival of a packet at time t a X’ = X - ( t a - LCT ) X’ < 0? X’ > L ? X = X’ + I LCT = t a conforming packet X’ = 0 Nonconforming packet X = value of the leaky bucket counter X’ = auxiliary variable LCT = last conformance time Yes No Yes No
  • 140. Leaky Bucket Example I = 4 L = 6 Non-conforming packets not allowed into bucket & hence not included in calculations I L+I Bucket content Time Time Packet arrival Nonconforming * * * * * * * * *
  • 141. Policing Parameters T = 1 / peak rate MBS = maximum burst size I = nominal interarrival time = 1 / sustainable rate Time MBS T L I
  • 142. Dual Leaky Bucket Dual leaky bucket to police PCR, SCR, and MBS: Tagged or dropped Untagged traffic Incoming traffic Untagged traffic PCR = peak cell rate CDVT = cell delay variation tolerance SCR = sustainable cell rate MBS = maximum burst size Leaky bucket 1 SCR and MBS Leaky bucket 2 PCR and CDVT Tagged or dropped
  • 143.
  • 144.
  • 145.
  • 146. Token Bucket Shaping Effect The token bucket constrains the traffic from a source to be limited to b + r t bits in an interval of length t b + r t b bytes instantly t r bytes/second
  • 147.
  • 148.
  • 149.
  • 150. Current View of Router Function Classifier Input driver Internet forwarder Pkt. scheduler Output driver Routing Agent Reservation Agent Mgmt. Agent Admission Control [Routing database] [Traffic control database]
  • 151.
  • 152. End-to-End vs. Hop-by-Hop Congestion Control Source Destination Feedback information Packet flow Source Destination (a) (b)
  • 153.
  • 154. Shortest path routing congests link 4 to 8 Better flow allocation distributes flows more uniformly 4 6 3 2 1 5 8 7 4 6 3 2 1 5 8 7 (a) (b)

Hinweis der Redaktion

  1. 7-9 The text boxes are callouts or labels.