# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

Size: px
Start display at page:

Download "# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved"

Transcription

1 A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one) and slide content to suit you needs. They obviously epesent a lot of wok on ou pat. In etun fo use, we only ask the following: If you use these slides (e.g., in a class) in substantially unalteed fom, that you mention thei souce (afte all, we d like people to use ou book!) If you post any slides in substantially unalteed fom on a www site, that you note that they ae adapted fom (o pehaps identical to) ou slides, and note ou copyight of this mateial.!" #! %&&' Thanks and enjoy! JFK/KWR All mateial copyight J.F Kuose and K.W. Ross, All Rights Reseved

2 ( ) m ) m *) m m +, m m ) -.)/! (! - %

3 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 0

4 * ) )!) )! ; * -.

5 8 * ) * 2 ( * * * * * m 4

6 -(* outing algoithm local fowading table heade value output link value in aiving packet s heade /

7 0 * m 3!*!<%4 (* *! ) ( ) m )) ) ) m ( + )) ) *1, m ( '

8 ) > # ) *?@ * )A B; ) * ) ) ) & B; ) * ** ) (* =

9 ) Netwok Achitectue Sevice Model Bandwidth Guaantees? Loss Ode Timing Congestion feedback Intenet ATM ATM ATM ATM best effot CBR VBR ABR UBR none constant ate guaanteed ate guaanteed minimum none no yes yes no no no yes yes yes yes no yes yes no no no (infeed via loss) no congestion no congestion yes no C

10 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 &

11 ) ) ) 1) ) )! ( m ) m ) m

12 1? m * m!*(* * 1*+, *! +(!(**, ( 1+ D( ), %

13 1 1 * * % 1 (! (* 0 *( (1 1 ( +, 1 (( m 1 ( * *( 0

14 8( 1 ( % % 0 %% 0% 8( * ( - *- 1 E 6 *6 1 E %0 %% %/0 = 0'% ' C'0 =' F F F F " * G

15 1! 1 3!*!< %4 2-4*( - /") 0 % 4

16 ( m )*?@ * m ( ** 7 %") /

17 8( ( ( Destination Addess Range Link Inteface though though though othewise 3 '

18 *; Pefix Match Link Inteface othewise 3 B; &&&&&&&&&&&&&&&&&&& # *A &&&&&&&&&&&&&&&&&&& # *A =

19 1 A -+, ; )! +, m!*!) m! ;?@ m ** m * )** 3 +1, ))* ) m!( H m * )? (@ m m ; C

20 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 %&

21 "6 )) * I+"-.!6 7.8!9:., * * %

22 -.8. ()!B 4 )! *( J 2 H* )* * *( %%

23 * *( %0

24 713 8 *.K 2 ( (+%(, Input Pot Memoy Output Pot System Bus %

25 719 * ) ( ( (( ( 0%:( (! 4/&& ** * %4

26 7 1 - ) ( ( 9! ) ) * *;! *( %&&& /&:( %/

27 6. 9** H )* *(* 7 H * %'

28 6 H (**)) ; H+, (**)*G %=

29 5 (**A "800C* ()(** " + %4&, m!d&: %4:( (** " *! (**H " %C

30 -.> 8( (LH H 5* +56,( H **H) H* )* H (**)*G 0&

31 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 0

32 - 5!*.!K. " M M"-.!6 7.8!9:. * ( -. M ) M * M) -3. M 0%

33 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 00

34 -. * -.) ( +(,?@ * ; ( +, ) ).A %&( *. %&( *-. D&( N ) ) /(* ) 0%( * ) * 0%( -. * ** 0%( -. +)(!. K., +(, * * I ( 6 +*, B!! * * ) 0

35 -.8 O" ( )3 K + ; * P, ()* m **! **3 K -. ) m ( ) m? (@ * m -.( *! * ( * 0 04

36 -.8 " ( B; &&&( 3 KD4&&( D&&& - D; ** D& ** D& 6 ( ) =&( * ** D =&I= D4&& D4&& D&& - D; - D; - D; ** D ** D ** D& ** D& ** D=4 ** D0'& 0/

37 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 0'

38 %( **! * * ( I m 2 ) * m * m -. * = =

39 7( -. m (+ (, m + (, # 2 (A m )* (*-. m ) ( *0 ( 0C

40 7( / /24 " (! **! * B ( /24 7( I% &

41 7( A

42 -. -" -" - " m (* *( m * (I;!; E ( (* ( %&&%0/&I%0 %

43 -. A > 5 -. A ( * m # LL* LIL m K -< II* 5. 5 *. * ) m?@ 0

44 5. 5 *. : ( -. * )Q * +?@ 7 * ( Q+, 5.)) m (?5. )@ m 5. )?5.**@ m H m 5. )?5.@

45 5. ) DHCP seve B aiving DHCP client needs addess in this netwok 4

46 5. ) 5. )%%0%4 DHCP discove sc : , 68 dest.: ,67 yiadd: tansaction ID: 654 ) DHCP equest DHCP offe sc: , 67 dest: , 68 yiadd: tansaction ID: 654 Lifetime: 3600 secs sc: , 68 dest:: , 67 yiadd: tansaction ID: 655 DHCP seve ID: Lifetime: 3600 secs DHCP ACK sc: , 67 dest: , 68 yiadd: tansaction ID: 655 DHCP seve ID: Lifetime: 3600 secs /

47 -. A > 5 (*-. A * )-7.2 ISP's block /20 Oganization /23 Oganization /23 Oganization / Oganization /23 '

48 5 5 **) * * 6 P& %&&%0/&I%0 6 P %&&%0=&I%0 6 P% %&&%0%&&I%0 6 P' 89-7.?7 ( %&&%0/&I%&@ - %&&%00&&I%0-7. "K?7 ( CC0&&I/@ =

49 5 * -7. "K *6 P 6 P& %&&%0/&I%0 6 P% %&&%0%&&I%0 6 P' 89-7.?7 ( %&&%0/&I%&@ - %&&%00&&I%0 6 P %&&%0=&I%0-7. "K?7 (CC0&&I/ %&&%0=&I%0@ C

50 -. > 5-7.(* A --* ( m m 7 m! ) 4&

51 * - 0='/%C' &&& +!, &&&I% &&& &&&% &&&0 ) ) -. 0='/%C'! ** ( )&&&I% *! +, 4

52 3 ) Q -. * m * * -7.Q -. *) m *) * m -7. * ) m ) ; (! ) (( +, 4%

53 - m + -.! E,*) + -.! E, I ) + -.!E, m (+ (,)+ -.!E,+ -.!E, m + -.! E, * *) + -.!E, ( 40

54 % * &&&!004 0='/%C'!4&&! ( % ( # 0='/%C'!4&&&&&!004 FF FF 70='/%C'!4&& %=C&=/!=& &&& 7 &&&!004 %=C&=/!=& &&& %=C&=/!=& &&& &&&% 0='/%C' 7 %=C&=/!=& 0='/%C'!4&& 0 0 ") 0='/%C'!4&& 7 %=C&=/!=& &&&!004 &&&0 * 0='/%C'!4&&&&&!004 4

55 /( (* m /&!&&& G ) m 0 m ) M ( ((!!.%. m ( )( -.)/ 44

56 ) ( ) &&& m ) &&& +2, m ;) ( 0='/%C' * * H ) ) m!+%0'/%c'!%4&&, *&&& %4&&& A 0='/%C' &&& &&& 4/

57 ) ( %K)..+K..,-: )+-:,. (-. +0='/%C', ; I ) +, 0='/%C' -: &&& &&&! * 4'

58 ) ( 0+ 7, m ) ( m B; m ( ( % ( 0 ( ( 0='/%C' &&& 4=

59 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 4C

60 ( O ) * m (!!! m H I+ (,?()@ -. m ! * =( *-. Type Code desciption 0 0 echo eply (ping) 3 0 dest. netwok uneachable 3 1 dest host uneachable 3 2 dest potocol uneachable 3 3 dest pot uneachable 3 6 dest netwok unknown 3 7 dest host unknown 4 0 souce quench (congestion contol - not used) 8 0 echo equest (ping) 9 0 oute advetisement 10 0 oute discovey 11 0 TTL expied 12 0 bad IP heade /&

61 -3. 7 * K. m 8 D m 7 D%! m K ( # ) m " m -3. +! &, m 3 * O-. # -3. )! " 0 7 K. ) ) -3.? (@ +0!0, # -3.! /

62 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 /%

63 -.)/ - ) 0%( ( ) m * I* m *> 7 -.)/ * m *;&( m * /0

64 -.)/5+,. * * 8 ( *?*@ +*?*@ *, ; ** /

65 6 * -.) ) 6!( *! (?;5@ * -3.)/ ) *-3. m!?. 9@ m * /4

66 8 -.)-.)/ ( m 5 ;-.) -.)/ A -.)/ -.) -.) //

67 ) 9 B 8 -.)/ -.)/ -.)/ -.)/. ) 9 B 8 -.)/ -.)/ -.)/ -.)/ -.) -.) /'

68 ) 9 B 8 -.)/ -.)/ -.)/ -.)/. ) 9 B 8 -.)/ -.)/ -.) -.) -.)/ -.)/ 8< B 8< B 8< 7 8 8< )/ 9 -.)/ -.) 9 -.)/ -.) B8 -.)/ /=

69 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 /C

70 -(!* outing algoithm local fowading table heade value output link value in aiving packet s heade '&

71 :( 4 Gaph: G = (N,E) % ) ; % % P N = set of outes = { u, v, w, x, y, z } E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) } " :( *; B;.%.! * B *. '

72 :( % 4 ) ; % % P M +;!;2,D *+;!;2,!+!P,D4 M (! ) (! ) *+;!; %!; 0!F!;,D+;!; %,N+; %!; 0,NF N+;!;, > # 2 (PA " * '%

73 " * :(P * A :( )! P (! ( ) *!;* *(? )@ 7 A 7 ) H m m '0

74 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 '

75 7" Q 2! m )? m ) * * m ) *( * )*! 2 c(x,y): * ;RD * ( D(v): )* ** ) p(v): * ) N': * *) '4

76 Q 2 1 Initialization: 2 N'= {u} 3 fo all nodes v 4 if v adjacent to u 5 then D(v) = c(u,v) 6 else D(v) = 7 8 Loop 9 find w not in N'such that D(w) is a minimum 10 add w to N' 11 update D(v) fo all v adjacent to w and not in N': 12 D(v) = min( D(v), D(w) + c(w,v) ) 13 /* new cost to v is eithe old cost to v o known 14 shotest path cost to w plus cost fom w to v */ 15 until all nodes in N' '/

77 Q 2 ; Step N' u ux uxy uxyv uxyvw uxyvwz D(v),p(v) 2,u 2,u 2,u D(w),p(w) 5,u 4,x 3,y 3,y D(x),p(x) 1,u D(y),p(y) 2,x D(z),p(z) 4,y 4,y 4,y 4 % ) ; % % P ''

78 Q 2 ; +%, " * ) P ; " *( ) ; P +!), +!;, +!;, +!;, +!;, '=

79 Q 2! ;!! +N,I% 6 + %, ** (6 +, 6 (! D *** & & & N 9 %N & N & & 9 F & %N & & N 9 F %N & N & F 9 'C

80 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 =&

81 1 9 8BH+, * ; +,D * * ; ; +,D S+;!),N ) +,T ) )( )*; =

82 9 8; % 4 ) ; % % P! ) +P,D4! ; +P,D0! +P,D0 98H +P,D S+!),N ) +P,! +!;,N ; +P,! +!,N +P,T D S%N4! N0! 4N0TD ) ; *( =%

83 1 ; +, D * * ; ; () +;!), ; ) ; D U ; +,V W ; ( 2 ) m 8()!; ) DU ) +,V W =0

84 ) +, 9 B ) ( # ;) 1 * (! 1 98H ; +, ) S+;!),N ) +,T* K!! ; +,) ; +, =

85 1 +4, -)! ( 1 * ( ( * ( 1 m ( * ( * B wait fo (change in local link cost o msg fom neighbo) ecompute estimates if DV to any dest has changed, notify neighbos =4

86 ; +,D S+;!,N +,!+;!P,N P +,T D S%N&!'NTD% ;P ;P ; &%' P ;P * ; %& P ;P * * ; P ' & * ; P & % 0 %& '& ; +P,D S+;!,N +P,!+;!P,N P +P,T D S%N!'N&TD0 % ; P ' =/

87 ; +,D S+;!,N +,!+;!P,N P +,T D S%N&!'NTD% ;P ;P ;P ; &%' ; &%0 ; &%0 %& %& P P '& P 0& ;P ;P ;P ; ; &%' ; &%0 %& %& %& P P '& P 0& ;P ;P ;P * * * ; P ' & * * * ; P &%' %& 0& * * * ; P &%0 %& 0& ; +P,D S+;!,N +P,!+;!P,N P +P,T D S%N!'N&TD0 % ; P ' ='

88 1 *! ) *1!*( ; P 4&? ) &!! 1! * (!P ) * ( - ; ( 1 %! ) P2 ( 2 P ==

89 1 ) * ( )?*@ ( G (* (P ;. ) -*X Y < m X Y +X 2, < *+ Y2 < )X, ) *( A /& ; P 4& =C

90 * 71 3 ; 7!B! 6 +B, 1 ;( ( m ) ) 7 *) 7 6 +, H 6 +B, m ) 1) ) m ( m *( "( * * A 7 1 m ) m ( m 1) m 2 ( ( M C&

91 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 C

92 5" 6 * P?*@ F %&& 2 2 ( G (; G ) D* C%

93 +7, 7 m?7@ m **7 ** 7 : 7 C0

94 ( 70 ( Inta-AS Routing algoithm 7 Fowading table Inte-AS Routing algoithm % % 7% %( *( *(( 7 m 7 * m 7 O - * ; C

95 -7 7 ) *7 m *!( A 7 ( 7%! 70 % (* 7 (*7 G 0 0 0( 70 ( 7 % % 7% %( C4

96 B; 7 *( 7 +)7, ( ; ()7 0+,()7% 7 (* * 7 * *- m *(+;!-, 0 0 0( 70 F ; ( 7 % % %( 7% C/

97 B; 7 7 * 7 (; (* 7 0 * 7% **(! * * ; m Q(*7 G 0 0 0( 70 F ; ( F 7 % % 7% %( C'

98 B; 7 7 * 7 (; (* 7 0 * 7% **(! * * ; m Q(*7 G * Lean fom inte-as potocol that subnet x is eachable via multiple gateways Use outing info fom inta-as potocol to detemine costs of least-cost paths to each of the gateways Hot potato outing: Choose the gateway that has the smallest least cost Detemine fom fowading table the inteface I that leads to least-cost gateway. Ente (x,i) in fowading table C=

99 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 CC

100 -7" -:. +-:., -7 m "-."-*. m m -:".-:".+, &&

101 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 &

102 "-.+"-*., ) 97 K -< (C=% E * + ;D4, 8 ( P ) 9 ; )% % ;0 0 P% &%

103 "-.) ) ; ( )0& )" 3 + ), ) *%4 7 &0

104 "-.B; ; 9 P!! " # # "( &

105 "-.B;! "! " %& # # ' ; 9 P!! " # # "( &4

106 "-. 8") -*) *=& L (I m )() m ) ( m ( ) +* (, m **H+A, m ) ) +* D/, &/

107 "-.( "-.( (!' +, ) K.! +K., * +-.,( * ( +K., +-., &'

108 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 &=

109 m 7 m m Q ) ( ) 7 +) *, m )-.+. K. &C

110 6 * +"-., ), + "-., 8! *** 6 7+!?@ *( **R *, m , ( &

111 56 7.8

112 )!(( m ) m R +, (? P@!) 9 (( (( ( 72 %

113 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 0

114 -79:. 9:.+9:., * 9:.) 7 6 ( ((* * (7 %.(* 7 0?@ ( ( (* () ;

115 9:.( * +9:.,;* ). 9:. m 9:. 7%) *;7 m 7% * *; m 7%*; ) 0 0 0( :. 9:. ( % % 7% %( 4

116 ((* 9:. (0!70 *;(*7 m 9:. (*; * 7 m () (* 7%)(%9:. **;! **; *( 0 0 0( :. 9:. ( % % 7% %( /

117 .( O9:. ) *; 9:.( m *;N( D?@ ( m *; )!7 /'!7 ' m B< 56. *7 ;7 + ( * 7 ;7, ) )! I '

118 9:. ( *;" *)( % B< 56. =

119 9:. 9:. ;. 9:. m 6.B. m K. B ) +, m BB. -1 B )( * K.B7R 6.BH m ) R C

120 9:. 9 : ) ( % ) *!9!) <!#!Y +*), < m < * 9)< m <) 9 %&

121 9:.+%, 9 : ) ( % ) * ) # 9 9) 9# < 7 9) 9# A m G9?)@ *9# # 92 m 9 *) m 9 I* G %

122 # **- -7 A. -7 ) **! -7! 7 ) ( P! **.* -7 * * -7 )* %%

123 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 %0

124 9 " ) * ** duplicate " duplicate ceation/tansmission " "% "% duplicate "0 " "0 " souce duplication in-netwok duplication A %

125 - *) (! ( m.( O( *( * 2( (* m * ( m 6 ) *+".8,* *) ( m )( %4

126 7 8 * B 8 B (a) Boadcast initiated at A : (b) Boadcast initiated at D : %/

127 7 B Q m 3 *) ( B B : : (a) Stepwise constuction of spanning tee (b) Constucted spanning tee %'

128 3 ".( 7 +,*+, ) ( m ( m ( *** ) m ( ( 7 7(

129 *( ( m m ) * m +7, m ( F* (! *

130 7. ** * ) m Q 2 7 " % " "% 4 0 "0 / "/ "' "4 B:B ( ( **! (

131 ").8 2 * * *() + ) (, *

132 ").8; 7 "% " " "4 B:B ( ( "0 "/ "' ( * ( * M *) 7. Z ((

133 ").8 * ( ( m * ( m?@ ( ( 7 B:B " " ( "0 "%.. "/ "' "4. ( *

134 7 7 7 ( (. ; ; m ; m * ( m ) QI)

135 ( ) ( *?@ * Q m Q m ( * m Q ; (*!) m (Q ( (* *

136 ( ; 7 "/ B:B " 0 " ( "0 "% % "/ "' "4 ( Q

137 -3 "1 3 ". 1 3 ". )!"8&'4 * ) *! ( m ".8( 1 3 ".2 ( ( 1 3 ". m ( m * ))".8 m

138 13 ".F * 1 3 ( m * ( m ) H* m *-:3.Q* m m 3 ( 1 3 ".

139 -, * +, -.?@ )-. ) )

140 * +, ** ( ; ( * 7 E ( E (*

141 H *7 ( ( ; ) +!".8, ( * 7 ( ;Q ) ) * +!(, ( ))

142 .-3 3 *".8! 1 3 ".( ) ".8* * + **, *1 3 ". * *

143 ( Q P) +"., " Q " m *Q *Q)".! * m *! "0 "% Q * P) "/ Q "4 "' P)

144 , ".! ( ". " Q " ".; ". * ) m? G@ "0 "% Q * P) "/ Q "4 "' P)

145 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 4

! "# $ $ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1

! # $ $ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and

More information

CSC 4900 Computer Networks: Routing Algorithms

CSC 4900 Computer Networks: Routing Algorithms CSC 4900 Computer Networks: Routing Algorithms Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 01 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #4 Due Thursday, Nov 1 st Project # Due Tuesday, Nov 6 th Later this semester: Homework #5 Due Thursday,

More information

CSCE 463/612 Networks and Distributed Processing Spring 2017

CSCE 463/612 Networks and Distributed Processing Spring 2017 CSCE 46/6 Networks and Distributed Processing Spring 07 Network Layer III Dmitri Loguinov Texas A&M University April, 07 Original slides copyright 996-004 J.F Kurose and K.W. Ross Homework #4 Grading Default

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13 CMPE 50/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3 Lab3 online Due March 4 th. Introduction -2 IP addresses: how to get one? Q: how does network

More information

Chapter 4: Network Layer, partb

Chapter 4: Network Layer, partb Chapter 4: Network Layer, partb The slides are adaptations of the slides available by the main textbook authors, Kurose&Ross Network Layer 4-1 Interplay between routing, forwarding routing algorithm local

More information

Module 3 Network Layer CS755! 3-1!

Module 3 Network Layer CS755! 3-1! Module 3 Network Layer CS755 3-1 Please note: Most of these slides come from this book. Note their copyright notice below A note on the use of these ppt slides: We re making these slides freely available

More information

Δίκτυα Υπολογιστών ΙΙ. Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων

Δίκτυα Υπολογιστών ΙΙ. Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων Δίκτυα Υπολογιστών ΙΙ Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων Course information introductory course in computer networking course materials: text:

More information

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Internet rou)ng V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Slide material copyright 1996-2013 J.F Kurose and K.W. Ross, All Rights Reserved Graph abstraction 5 graph: G

More information

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2018 CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007

More information

! "# $ $ %&&' 3-1. Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

! # $ $ %&&' 3-1. Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)

More information

CMPE 80N: Introduction to Networking and the Internet. Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 20

CMPE 80N: Introduction to Networking and the Internet. Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 20 CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 0 Announcements Final exam: June 7 th at 4pm. Comprehensive. Photo id required.

More information

Lecture 9. Network Layer (cont d) Network Layer 1-1

Lecture 9. Network Layer (cont d) Network Layer 1-1 Lecture 9 Network Layer (cont d) Network Layer 1-1 Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer CPSC 335 Data Communication Systems Readings: 4.4.3, 4.4.4, 4.5, 4.5.1 David Nguyen Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March

More information

Lecture 4. The Network Layer (cont d)

Lecture 4. The Network Layer (cont d) Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 40 Data and Computer Communications Networks Network Layer NAT, Routing, Link State, Distance Vector Prof. Lina Battestilli Fall 07 Chapter 4 Outline Network Layer: Data Plane 4. Overview of Network

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

CSC 8560 Computer Networks: Control Plane

CSC 8560 Computer Networks: Control Plane CSC 8560 Computer Networks: Control Plane Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:

More information

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport layer network layer protocols in every

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato

More information

Network Technology 1 5th - Network Layer. Mario Lombardo -

Network Technology 1 5th - Network Layer. Mario Lombardo - Network Technology 1 5th - Network Layer Mario Lombardo - lombardo@informatik.dhbw-stuttgart.de 1 NETWORK LAYER transport segment from sending to receiving host on sending side encapsulates segments into

More information

Data Communications & Networks. Session 7 Main Theme Networks: Part II Circuit Switching, Packet Switching, The Network Layer

Data Communications & Networks. Session 7 Main Theme Networks: Part II Circuit Switching, Packet Switching, The Network Layer Data Communications & Networks Session 7 Main Theme Networks: Part II Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science Department Courant

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

Chapter 4 Network Layer. Network Layer 4-1

Chapter 4 Network Layer. Network Layer 4-1 Chapter 4 Network Layer Network Layer 4- Chapter 4: Network Layer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing

More information

Course on Computer Communication and Networks. Lecture 7 Network Layer, Chapter 4 (6/e) - Part B (7/e Ch5)

Course on Computer Communication and Networks. Lecture 7 Network Layer, Chapter 4 (6/e) - Part B (7/e Ch5) Course on Computer Communication and Networks Lecture 7 Network Layer, Chapter 4 (6/e) - Part B (7/e Ch5) EDA344/DIT 420, CTH/GU Based on the book Computer Networking: A Top Down Approach, Jim Kurose,

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint

More information

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer. Chapter goals:

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer. Chapter goals: Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 004. Chapter 4: Network Layer Chapter goals: understand principles

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved

More information

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009. Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Layer Chapter goals: understand principles behind layer services: routing (path selection) dealing with scale how a router works advanced topics: IPv6, mobility instantiation and implementation

More information

Department of Computer Science Southern Illinois University Carbondale

Department of Computer Science Southern Illinois University Carbondale Department of Computer Science Southern Illinois University Carbondale CS441 Mobile & Wireless Computing Overview of Computer Networking Network Layer of TCP/IP Model Data and Computer Communications 7

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet Chapter 5: outline 5.1 introduction 5.5 The SDN control 5.2 routing protocols plane link state 5.6 ICMP: The Internet distance vector Control Message 5.3 intra-as routing in Protocol the Internet t 5.7

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane Lu Su Assistant Professor Department of Computer Science and Engineering State University of New York at Buffalo Adapted from the slides of the book s authors

More information

Telecomunicazioni. Docente: Andrea Baiocchi DIET - Stanza 107, 1 piano palazzina P. Piga Via Eudossiana 18

Telecomunicazioni. Docente: Andrea Baiocchi DIET - Stanza 107, 1 piano palazzina P. Piga Via Eudossiana 18 University of Roma La Sapienza Telecomunicazioni Docente: Andrea Baiocchi DIET - Stanza 07, piano palazzina P. Piga Via Eudossiana 8 E-mail: andrea.baiocchi@uniroma.it Corso di Laurea in Ingegneria Gestionale

More information

Chapter 4: network layer

Chapter 4: network layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Modified form the following All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Routing Algorithms : Fundamentals of Computer Networks Bill Nace

Routing Algorithms : Fundamentals of Computer Networks Bill Nace Routing Algorithms 4-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Recall from Last Time Routing Algorithm

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

COMPUTER NETWORKS CHAP 4 : NETWORK LAYER

COMPUTER NETWORKS CHAP 4 : NETWORK LAYER COMPUTER NETWORKS CHAP 4 : NETWORK LAYER 0160 08 h 12 h 29 Sep 2011 Chapter 4: 4-2 Chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing

More information

CS118 Discussion 1A, Week 6. Zengwen Yuan Dodd Hall 78, Friday 10:00 10:50 a.m.

CS118 Discussion 1A, Week 6. Zengwen Yuan Dodd Hall 78, Friday 10:00 10:50 a.m. CS118 Discussion 1A, Week 6 Zengwen Yuan Dodd Hall 78, Friday 10:00 10:50 a.m. 1 Outline Network Layer Overview: data v.s. control plane IPv4/IPv6, DHCP, NAT Project 2 spec Midterm review 2 Network layer:

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

CS 3516: Computer Networks

CS 3516: Computer Networks Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved

More information

All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 4 Network Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. All

More information

Chapter IV: Network Layer

Chapter IV: Network Layer Chapter IV: Network Laer UG3 Computer Communications & Networks (COMN) Mungjin Lee mungjin.lee@ed.ac.uk Slides copright of Kurose and Ross IP addresses: how to get one? Q: How does a host get IP address?

More information

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018 S 3: omputer Networks 3: Routing lgorithms November, 08 Last class NT: Network ddress Translators: NT is mostly bad, but in some cases, it s a necessary evil. IPv6: Simpler, faster, better Tunneling: IPv6

More information

Chapter 4: network layer

Chapter 4: network layer Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Lecture 17: Network Layer Addressing, Control Plane, and Routing

Lecture 17: Network Layer Addressing, Control Plane, and Routing Lecture 17: Network Layer Addressing, Control Plane, and Routing COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition:

More information

Interplay Between Routing, Forwarding

Interplay Between Routing, Forwarding Internet Routing 1 Interplay Between Routing, Forwarding routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 1 value in arriving packet s header 0111 3 1 Graph Abstraction

More information

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Chapter 4 Network Layer. Chapter 4: Network Layer. Chapter 4: Network Layer. Chapter goals: understand principles behind network layer services:

Chapter 4 Network Layer. Chapter 4: Network Layer. Chapter 4: Network Layer. Chapter goals: understand principles behind network layer services: Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

CMPT 371: Data Communications and Networking. Chapter 4: Network Layer

CMPT 371: Data Communications and Networking. Chapter 4: Network Layer School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 4: Network Layer Network Layer 4-1 Chapter 4: Network Layer Chapter goals: understand principles

More information

Chapter 4: Network Layer. Chapter 4: Network Layer

Chapter 4: Network Layer. Chapter 4: Network Layer Chapter 4: Network Layer Chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) dealing with

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2010 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th Homework #5 Due Thursday, Nov 17 th Later this semester: Homework #6 - Presentation

More information

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications OMP /9: omputer Networks and pplications Week 9 Network Layer: Routing Reading Guide: hapter 4: Sections 4.5 Network Layer nnouncements v Labs Lab 4 ongestion ontrol Lab 5 Simple Router (start up for ssignment,

More information

Chapter 4 Network Layer. Network Layer 4-1

Chapter 4 Network Layer. Network Layer 4-1 Chapter 4 Network Layer Network Layer 4-1 Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University May 2007 Computer Networking: A Top Down Approach Featuring the Internet,

More information

Chapter 4 Network Layer

Chapter 4 Network Layer CSB051 Computer Networks 電腦網路 Chapter 4 Network Layer 吳俊興 國立高雄大學資訊工程學系 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol

More information

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer Chapter 4 Network Layer Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 009. Chapter 4: Network Layer Chapter goals: understand principles behind layer

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link

More information

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. Intra-AS Routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesle http://xkcd.com/85/ Some materials copright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Chapter 4: network layer

Chapter 4: network layer Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,

More information

Telecomunicazioni. Docente: Andrea Baiocchi. DIET - Stanza 107, 1 piano palazzina P. Piga Via Eudossiana 18

Telecomunicazioni. Docente: Andrea Baiocchi. DIET - Stanza 107, 1 piano palazzina P. Piga Via Eudossiana 18 University of Roma La Sapiena Telecomunicaioni Docente: Andrea Baiocchi DIET - Stana 07, piano palaina P. Piga Via Eudossiana 8 E-mail: andrea.baiocchi@uniroma.it Corso di Laurea in Ingegneria Gestionale

More information

KR_4. Strato di rete

KR_4. Strato di rete INFO-COM Dpt. Dipartimento di Scienza e Tecnica dell Informazione e della Comunicazione Università degli Studi di Roma La Sapienza KR_4. Strato di rete TELECOMUNICAZIONI per Ingegneria Informatica (secondo

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link

More information

Network layer functions. Chapter 4 Network Layer. Network layer functions. Network layer functions

Network layer functions. Chapter 4 Network Layer. Network layer functions. Network layer functions Network layer functions Chapter 4 Network Layer transport packet from sending to receiving hosts layer entity in every host, router functions: path determination: route taken by packets from source to

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Network Layer: Routing. Routing. Routing protocol. Graph abstraction for routing algorithms: graph nodes are routers graph edges are physical links

Network Layer: Routing. Routing. Routing protocol. Graph abstraction for routing algorithms: graph nodes are routers graph edges are physical links Network Layer: Routing A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Dynamic Routing. The Protocols

Dynamic Routing. The Protocols Dynamic Routing The Protocols Desirable Characteristics of Dynamic Routing Automatically detect and adapt to topology changes Provide optimal routing Scalability Robustness Simplicity Rapid convergence

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Chapter 4 Network Layer

Chapter 4 Network Layer CSB051 Computer Networks 電腦網路 Chapter 4 Network Layer 吳俊興國立高雄大學資訊工程學系 Chapter 4: Network Layer Chapter goals: understand principles behind network layer services: routing (path selection) dealing with

More information

Graph abstraction: costs. Graph abstraction 10/26/2018. Interplay between routing and forwarding

Graph abstraction: costs. Graph abstraction 10/26/2018. Interplay between routing and forwarding 0/6/08 Interpla between routing and forwarding Routing Algorithms Link State Distance Vector BGP routing routing algorithm local forwarding table header value output link 000 00 0 00 value in arriving

More information

Network Layer: Routing

Network Layer: Routing Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Interplay between routing, forwarding

Interplay between routing, forwarding Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state

More information

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information