# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved
|
|
- Eunice Cox
- 6 years ago
- Views:
Transcription
1 A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one) and slide content to suit you needs. They obviously epesent a lot of wok on ou pat. In etun fo use, we only ask the following: If you use these slides (e.g., in a class) in substantially unalteed fom, that you mention thei souce (afte all, we d like people to use ou book!) If you post any slides in substantially unalteed fom on a www site, that you note that they ae adapted fom (o pehaps identical to) ou slides, and note ou copyight of this mateial.!" #! %&&' Thanks and enjoy! JFK/KWR All mateial copyight J.F Kuose and K.W. Ross, All Rights Reseved
2 ( ) m ) m *) m m +, m m ) -.)/! (! - %
3 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 0
4 * ) )!) )! ; * -.
5 8 * ) * 2 ( * * * * * m 4
6 -(* outing algoithm local fowading table heade value output link value in aiving packet s heade /
7 0 * m 3!*!<%4 (* *! ) ( ) m )) ) ) m ( + )) ) *1, m ( '
8 ) > # ) *?@ * )A B; ) * ) ) ) & B; ) * ** ) (* =
9 ) Netwok Achitectue Sevice Model Bandwidth Guaantees? Loss Ode Timing Congestion feedback Intenet ATM ATM ATM ATM best effot CBR VBR ABR UBR none constant ate guaanteed ate guaanteed minimum none no yes yes no no no yes yes yes yes no yes yes no no no (infeed via loss) no congestion no congestion yes no C
10 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 &
11 ) ) ) 1) ) )! ( m ) m ) m
12 1? m * m!*(* * 1*+, *! +(!(**, ( 1+ D( ), %
13 1 1 * * % 1 (! (* 0 *( (1 1 ( +, 1 (( m 1 ( * *( 0
14 8( 1 ( % % 0 %% 0% 8( * ( - *- 1 E 6 *6 1 E %0 %% %/0 = 0'% ' C'0 =' F F F F " * G
15 1! 1 3!*!< %4 2-4*( - /") 0 % 4
16 ( m )*?@ * m ( ** 7 %") /
17 8( ( ( Destination Addess Range Link Inteface though though though othewise 3 '
18 *; Pefix Match Link Inteface othewise 3 B; &&&&&&&&&&&&&&&&&&& # *A &&&&&&&&&&&&&&&&&&& # *A =
19 1 A -+, ; )! +, m!*!) m! ;?@ m ** m * )** 3 +1, ))* ) m!( H m * )? (@ m m ; C
20 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 %&
21 "6 )) * I+"-.!6 7.8!9:., * * %
22 -.8. ()!B 4 )! *( J 2 H* )* * *( %%
23 * *( %0
24 713 8 *.K 2 ( (+%(, Input Pot Memoy Output Pot System Bus %
25 719 * ) ( ( (( ( 0%:( (! 4/&& ** * %4
26 7 1 - ) ( ( 9! ) ) * *;! *( %&&& /&:( %/
27 6. 9** H )* *(* 7 H * %'
28 6 H (**)) ; H+, (**)*G %=
29 5 (**A "800C* ()(** " + %4&, m!d&: %4:( (** " *! (**H " %C
30 -.> 8( (LH H 5* +56,( H **H) H* )* H (**)*G 0&
31 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 0
32 - 5!*.!K. " M M"-.!6 7.8!9:. * ( -. M ) M * M) -3. M 0%
33 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 00
34 -. * -.) ( +(,?@ * ; ( +, ) ).A %&( *. %&( *-. D&( N ) ) /(* ) 0%( * ) * 0%( -. * ** 0%( -. +)(!. K., +(, * * I ( 6 +*, B!! * * ) 0
35 -.8 O" ( )3 K + ; * P, ()* m **! **3 K -. ) m ( ) m? (@ * m -.( *! * ( * 0 04
36 -.8 " ( B; &&&( 3 KD4&&( D&&& - D; ** D& ** D& 6 ( ) =&( * ** D =&I= D4&& D4&& D&& - D; - D; - D; ** D ** D ** D& ** D& ** D=4 ** D0'& 0/
37 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 0'
38 %( **! * * ( I m 2 ) * m * m -. * = =
39 7( -. m (+ (, m + (, # 2 (A m )* (*-. m ) ( *0 ( 0C
40 7( / /24 " (! **! * B ( /24 7( I% &
41 7( A
42 -. -" -" - " m (* *( m * (I;!; E ( (* ( %&&%0/&I%0 %
43 -. A > 5 -. A ( * m # LL* LIL m K -< II* 5. 5 *. * ) m?@ 0
44 5. 5 *. : ( -. * )Q * +?@ 7 * ( Q+, 5.)) m (?5. )@ m 5. )?5.**@ m H m 5. )?5.@
45 5. ) DHCP seve B aiving DHCP client needs addess in this netwok 4
46 5. ) 5. )%%0%4 DHCP discove sc : , 68 dest.: ,67 yiadd: tansaction ID: 654 ) DHCP equest DHCP offe sc: , 67 dest: , 68 yiadd: tansaction ID: 654 Lifetime: 3600 secs sc: , 68 dest:: , 67 yiadd: tansaction ID: 655 DHCP seve ID: Lifetime: 3600 secs DHCP ACK sc: , 67 dest: , 68 yiadd: tansaction ID: 655 DHCP seve ID: Lifetime: 3600 secs /
47 -. A > 5 (*-. A * )-7.2 ISP's block /20 Oganization /23 Oganization /23 Oganization / Oganization /23 '
48 5 5 **) * * 6 P& %&&%0/&I%0 6 P %&&%0=&I%0 6 P% %&&%0%&&I%0 6 P' 89-7.?7 ( %&&%0/&I%&@ - %&&%00&&I%0-7. "K?7 ( CC0&&I/@ =
49 5 * -7. "K *6 P 6 P& %&&%0/&I%0 6 P% %&&%0%&&I%0 6 P' 89-7.?7 ( %&&%0/&I%&@ - %&&%00&&I%0 6 P %&&%0=&I%0-7. "K?7 (CC0&&I/ %&&%0=&I%0@ C
50 -. > 5-7.(* A --* ( m m 7 m! ) 4&
51 * - 0='/%C' &&& +!, &&&I% &&& &&&% &&&0 ) ) -. 0='/%C'! ** ( )&&&I% *! +, 4
52 3 ) Q -. * m * * -7.Q -. *) m *) * m -7. * ) m ) ; (! ) (( +, 4%
53 - m + -.! E,*) + -.! E, I ) + -.!E, m (+ (,)+ -.!E,+ -.!E, m + -.! E, * *) + -.!E, ( 40
54 % * &&&!004 0='/%C'!4&&! ( % ( # 0='/%C'!4&&&&&!004 FF FF 70='/%C'!4&& %=C&=/!=& &&& 7 &&&!004 %=C&=/!=& &&& %=C&=/!=& &&& &&&% 0='/%C' 7 %=C&=/!=& 0='/%C'!4&& 0 0 ") 0='/%C'!4&& 7 %=C&=/!=& &&&!004 &&&0 * 0='/%C'!4&&&&&!004 4
55 /( (* m /&!&&& G ) m 0 m ) M ( ((!!.%. m ( )( -.)/ 44
56 ) ( ) &&& m ) &&& +2, m ;) ( 0='/%C' * * H ) ) m!+%0'/%c'!%4&&, *&&& %4&&& A 0='/%C' &&& &&& 4/
57 ) ( %K)..+K..,-: )+-:,. (-. +0='/%C', ; I ) +, 0='/%C' -: &&& &&&! * 4'
58 ) ( 0+ 7, m ) ( m B; m ( ( % ( 0 ( ( 0='/%C' &&& 4=
59 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 4C
60 ( O ) * m (!!! m H I+ (,?()@ -. m ! * =( *-. Type Code desciption 0 0 echo eply (ping) 3 0 dest. netwok uneachable 3 1 dest host uneachable 3 2 dest potocol uneachable 3 3 dest pot uneachable 3 6 dest netwok unknown 3 7 dest host unknown 4 0 souce quench (congestion contol - not used) 8 0 echo equest (ping) 9 0 oute advetisement 10 0 oute discovey 11 0 TTL expied 12 0 bad IP heade /&
61 -3. 7 * K. m 8 D m 7 D%! m K ( # ) m " m -3. +! &, m 3 * O-. # -3. )! " 0 7 K. ) ) -3.? (@ +0!0, # -3.! /
62 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 /%
63 -.)/ - ) 0%( ( ) m * I* m *> 7 -.)/ * m *;&( m * /0
64 -.)/5+,. * * 8 ( *?*@ +*?*@ *, ; ** /
65 6 * -.) ) 6!( *! (?;5@ * -3.)/ ) *-3. m!?. 9@ m * /4
66 8 -.)-.)/ ( m 5 ;-.) -.)/ A -.)/ -.) -.) //
67 ) 9 B 8 -.)/ -.)/ -.)/ -.)/. ) 9 B 8 -.)/ -.)/ -.)/ -.)/ -.) -.) /'
68 ) 9 B 8 -.)/ -.)/ -.)/ -.)/. ) 9 B 8 -.)/ -.)/ -.) -.) -.)/ -.)/ 8< B 8< B 8< 7 8 8< )/ 9 -.)/ -.) 9 -.)/ -.) B8 -.)/ /=
69 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 /C
70 -(!* outing algoithm local fowading table heade value output link value in aiving packet s heade '&
71 :( 4 Gaph: G = (N,E) % ) ; % % P N = set of outes = { u, v, w, x, y, z } E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) } " :( *; B;.%.! * B *. '
72 :( % 4 ) ; % % P M +;!;2,D *+;!;2,!+!P,D4 M (! ) (! ) *+;!; %!; 0!F!;,D+;!; %,N+; %!; 0,NF N+;!;, > # 2 (PA " * '%
73 " * :(P * A :( )! P (! ( ) *!;* *(? )@ 7 A 7 ) H m m '0
74 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 '
75 7" Q 2! m )? m ) * * m ) *( * )*! 2 c(x,y): * ;RD * ( D(v): )* ** ) p(v): * ) N': * *) '4
76 Q 2 1 Initialization: 2 N'= {u} 3 fo all nodes v 4 if v adjacent to u 5 then D(v) = c(u,v) 6 else D(v) = 7 8 Loop 9 find w not in N'such that D(w) is a minimum 10 add w to N' 11 update D(v) fo all v adjacent to w and not in N': 12 D(v) = min( D(v), D(w) + c(w,v) ) 13 /* new cost to v is eithe old cost to v o known 14 shotest path cost to w plus cost fom w to v */ 15 until all nodes in N' '/
77 Q 2 ; Step N' u ux uxy uxyv uxyvw uxyvwz D(v),p(v) 2,u 2,u 2,u D(w),p(w) 5,u 4,x 3,y 3,y D(x),p(x) 1,u D(y),p(y) 2,x D(z),p(z) 4,y 4,y 4,y 4 % ) ; % % P ''
78 Q 2 ; +%, " * ) P ; " *( ) ; P +!), +!;, +!;, +!;, +!;, '=
79 Q 2! ;!! +N,I% 6 + %, ** (6 +, 6 (! D *** & & & N 9 %N & N & & 9 F & %N & & N 9 F %N & N & F 9 'C
80 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 =&
81 1 9 8BH+, * ; +,D * * ; ; +,D S+;!),N ) +,T ) )( )*; =
82 9 8; % 4 ) ; % % P! ) +P,D4! ; +P,D0! +P,D0 98H +P,D S+!),N ) +P,! +!;,N ; +P,! +!,N +P,T D S%N4! N0! 4N0TD ) ; *( =%
83 1 ; +, D * * ; ; () +;!), ; ) ; D U ; +,V W ; ( 2 ) m 8()!; ) DU ) +,V W =0
84 ) +, 9 B ) ( # ;) 1 * (! 1 98H ; +, ) S+;!),N ) +,T* K!! ; +,) ; +, =
85 1 +4, -)! ( 1 * ( ( * ( 1 m ( * ( * B wait fo (change in local link cost o msg fom neighbo) ecompute estimates if DV to any dest has changed, notify neighbos =4
86 ; +,D S+;!,N +,!+;!P,N P +,T D S%N&!'NTD% ;P ;P ; &%' P ;P * ; %& P ;P * * ; P ' & * ; P & % 0 %& '& ; +P,D S+;!,N +P,!+;!P,N P +P,T D S%N!'N&TD0 % ; P ' =/
87 ; +,D S+;!,N +,!+;!P,N P +,T D S%N&!'NTD% ;P ;P ;P ; &%' ; &%0 ; &%0 %& %& P P '& P 0& ;P ;P ;P ; ; &%' ; &%0 %& %& %& P P '& P 0& ;P ;P ;P * * * ; P ' & * * * ; P &%' %& 0& * * * ; P &%0 %& 0& ; +P,D S+;!,N +P,!+;!P,N P +P,T D S%N!'N&TD0 % ; P ' ='
88 1 *! ) *1!*( ; P 4&? ) &!! 1! * (!P ) * ( - ; ( 1 %! ) P2 ( 2 P ==
89 1 ) * ( )?*@ ( G (* (P ;. ) -*X Y < m X Y +X 2, < *+ Y2 < )X, ) *( A /& ; P 4& =C
90 * 71 3 ; 7!B! 6 +B, 1 ;( ( m ) ) 7 *) 7 6 +, H 6 +B, m ) 1) ) m ( m *( "( * * A 7 1 m ) m ( m 1) m 2 ( ( M C&
91 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 C
92 5" 6 * P?*@ F %&& 2 2 ( G (; G ) D* C%
93 +7, 7 m?7@ m **7 ** 7 : 7 C0
94 ( 70 ( Inta-AS Routing algoithm 7 Fowading table Inte-AS Routing algoithm % % 7% %( *( *(( 7 m 7 * m 7 O - * ; C
95 -7 7 ) *7 m *!( A 7 ( 7%! 70 % (* 7 (*7 G 0 0 0( 70 ( 7 % % 7% %( C4
96 B; 7 *( 7 +)7, ( ; ()7 0+,()7% 7 (* * 7 * *- m *(+;!-, 0 0 0( 70 F ; ( 7 % % %( 7% C/
97 B; 7 7 * 7 (; (* 7 0 * 7% **(! * * ; m Q(*7 G 0 0 0( 70 F ; ( F 7 % % 7% %( C'
98 B; 7 7 * 7 (; (* 7 0 * 7% **(! * * ; m Q(*7 G * Lean fom inte-as potocol that subnet x is eachable via multiple gateways Use outing info fom inta-as potocol to detemine costs of least-cost paths to each of the gateways Hot potato outing: Choose the gateway that has the smallest least cost Detemine fom fowading table the inteface I that leads to least-cost gateway. Ente (x,i) in fowading table C=
99 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 CC
100 -7" -:. +-:., -7 m "-."-*. m m -:".-:".+, &&
101 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 &
102 "-.+"-*., ) 97 K -< (C=% E * + ;D4, 8 ( P ) 9 ; )% % ;0 0 P% &%
103 "-.) ) ; ( )0& )" 3 + ), ) *%4 7 &0
104 "-.B; ; 9 P!! " # # "( &
105 "-.B;! "! " %& # # ' ; 9 P!! " # # "( &4
106 "-. 8") -*) *=& L (I m )() m ) ( m ( ) +* (, m **H+A, m ) ) +* D/, &/
107 "-.( "-.( (!' +, ) K.! +K., * +-.,( * ( +K., +-., &'
108 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 &=
109 m 7 m m Q ) ( ) 7 +) *, m )-.+. K. &C
110 6 * +"-., ), + "-., 8! *** 6 7+!?@ *( **R *, m , ( &
111 56 7.8
112 )!(( m ) m R +, (? P@!) 9 (( (( ( 72 %
113 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 0
114 -79:. 9:.+9:., * 9:.) 7 6 ( ((* * (7 %.(* 7 0?@ ( ( (* () ;
115 9:.( * +9:.,;* ). 9:. m 9:. 7%) *;7 m 7% * *; m 7%*; ) 0 0 0( :. 9:. ( % % 7% %( 4
116 ((* 9:. (0!70 *;(*7 m 9:. (*; * 7 m () (* 7%)(%9:. **;! **; *( 0 0 0( :. 9:. ( % % 7% %( /
117 .( O9:. ) *; 9:.( m *;N( D?@ ( m *; )!7 /'!7 ' m B< 56. *7 ;7 + ( * 7 ;7, ) )! I '
118 9:. ( *;" *)( % B< 56. =
119 9:. 9:. ;. 9:. m 6.B. m K. B ) +, m BB. -1 B )( * K.B7R 6.BH m ) R C
120 9:. 9 : ) ( % ) *!9!) <!#!Y +*), < m < * 9)< m <) 9 %&
121 9:.+%, 9 : ) ( % ) * ) # 9 9) 9# < 7 9) 9# A m G9?)@ *9# # 92 m 9 *) m 9 I* G %
122 # **- -7 A. -7 ) **! -7! 7 ) ( P! **.* -7 * * -7 )* %%
123 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 %0
124 9 " ) * ** duplicate " duplicate ceation/tansmission " "% "% duplicate "0 " "0 " souce duplication in-netwok duplication A %
125 - *) (! ( m.( O( *( * 2( (* m * ( m 6 ) *+".8,* *) ( m )( %4
126 7 8 * B 8 B (a) Boadcast initiated at A : (b) Boadcast initiated at D : %/
127 7 B Q m 3 *) ( B B : : (a) Stepwise constuction of spanning tee (b) Constucted spanning tee %'
128 3 ".( 7 +,*+, ) ( m ( m ( *** ) m ( ( 7 7(
129 *( ( m m ) * m +7, m ( F* (! *
130 7. ** * ) m Q 2 7 " % " "% 4 0 "0 / "/ "' "4 B:B ( ( **! (
131 ").8 2 * * *() + ) (, *
132 ").8; 7 "% " " "4 B:B ( ( "0 "/ "' ( * ( * M *) 7. Z ((
133 ").8 * ( ( m * ( m?@ ( ( 7 B:B " " ( "0 "%.. "/ "' "4. ( *
134 7 7 7 ( (. ; ; m ; m * ( m ) QI)
135 ( ) ( *?@ * Q m Q m ( * m Q ; (*!) m (Q ( (* *
136 ( ; 7 "/ B:B " 0 " ( "0 "% % "/ "' "4 ( Q
137 -3 "1 3 ". 1 3 ". )!"8&'4 * ) *! ( m ".8( 1 3 ".2 ( ( 1 3 ". m ( m * ))".8 m
138 13 ".F * 1 3 ( m * ( m ) H* m *-:3.Q* m m 3 ( 1 3 ".
139 -, * +, -.?@ )-. ) )
140 * +, ** ( ; ( * 7 E ( E (*
141 H *7 ( ( ; ) +!".8, ( * 7 ( ;Q ) ) * +!(, ( ))
142 .-3 3 *".8! 1 3 ".( ) ".8* * + **, *1 3 ". * *
143 ( Q P) +"., " Q " m *Q *Q)".! * m *! "0 "% Q * P) "/ Q "4 "' P)
144 , ".! ( ". " Q " ".; ". * ) m? G@ "0 "% Q * P) "/ Q "4 "' P)
145 - 4" %1 0# m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m m 9:. '9 4
! "# $ $ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1
A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and
More informationCSC 4900 Computer Networks: Routing Algorithms
CSC 4900 Computer Networks: Routing Algorithms Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 01 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #4 Due Thursday, Nov 1 st Project # Due Tuesday, Nov 6 th Later this semester: Homework #5 Due Thursday,
More informationCSCE 463/612 Networks and Distributed Processing Spring 2017
CSCE 46/6 Networks and Distributed Processing Spring 07 Network Layer III Dmitri Loguinov Texas A&M University April, 07 Original slides copyright 996-004 J.F Kurose and K.W. Ross Homework #4 Grading Default
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13
CMPE 50/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3 Lab3 online Due March 4 th. Introduction -2 IP addresses: how to get one? Q: how does network
More informationChapter 4: Network Layer, partb
Chapter 4: Network Layer, partb The slides are adaptations of the slides available by the main textbook authors, Kurose&Ross Network Layer 4-1 Interplay between routing, forwarding routing algorithm local
More informationModule 3 Network Layer CS755! 3-1!
Module 3 Network Layer CS755 3-1 Please note: Most of these slides come from this book. Note their copyright notice below A note on the use of these ppt slides: We re making these slides freely available
More informationΔίκτυα Υπολογιστών ΙΙ. Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων
Δίκτυα Υπολογιστών ΙΙ Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων Course information introductory course in computer networking course materials: text:
More informationInternet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst
Internet rou)ng V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Slide material copyright 1996-2013 J.F Kurose and K.W. Ross, All Rights Reserved Graph abstraction 5 graph: G
More informationCSCD 330 Network Programming Spring 2018
CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network
More informationCSCD 330 Network Programming Spring 2017
CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007
More information! "# $ $ %&&' 3-1. Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved
A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)
More informationCMPE 80N: Introduction to Networking and the Internet. Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 20
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 0 Announcements Final exam: June 7 th at 4pm. Comprehensive. Photo id required.
More informationLecture 9. Network Layer (cont d) Network Layer 1-1
Lecture 9 Network Layer (cont d) Network Layer 1-1 Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest
More informationChapter 4 Network Layer
Chapter 4 Network Layer CPSC 335 Data Communication Systems Readings: 4.4.3, 4.4.4, 4.5, 4.5.1 David Nguyen Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March
More informationLecture 4. The Network Layer (cont d)
Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols
More informationCSC 401 Data and Computer Communications Networks
CSC 40 Data and Computer Communications Networks Network Layer NAT, Routing, Link State, Distance Vector Prof. Lina Battestilli Fall 07 Chapter 4 Outline Network Layer: Data Plane 4. Overview of Network
More informationEC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane
EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:
More informationCSC 8560 Computer Networks: Control Plane
CSC 8560 Computer Networks: Control Plane Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:
More informationNetwork layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical
Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport layer network layer protocols in every
More informationChapter 4 Network Layer
Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato
More informationNetwork Technology 1 5th - Network Layer. Mario Lombardo -
Network Technology 1 5th - Network Layer Mario Lombardo - lombardo@informatik.dhbw-stuttgart.de 1 NETWORK LAYER transport segment from sending to receiving host on sending side encapsulates segments into
More informationData Communications & Networks. Session 7 Main Theme Networks: Part II Circuit Switching, Packet Switching, The Network Layer
Data Communications & Networks Session 7 Main Theme Networks: Part II Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science Department Courant
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationChapter 4 Network Layer. Network Layer 4-1
Chapter 4 Network Layer Network Layer 4- Chapter 4: Network Layer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing
More informationCourse on Computer Communication and Networks. Lecture 7 Network Layer, Chapter 4 (6/e) - Part B (7/e Ch5)
Course on Computer Communication and Networks Lecture 7 Network Layer, Chapter 4 (6/e) - Part B (7/e Ch5) EDA344/DIT 420, CTH/GU Based on the book Computer Networking: A Top Down Approach, Jim Kurose,
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationChapter 4: Network Layer
Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint
More informationChapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer. Chapter goals:
Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 004. Chapter 4: Network Layer Chapter goals: understand principles
More informationChapter 4 Network Layer
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved
More informationChapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationChapter 4: Network Layer
Chapter 4: Network Layer Chapter goals: understand principles behind layer services: routing (path selection) dealing with scale how a router works advanced topics: IPv6, mobility instantiation and implementation
More informationDepartment of Computer Science Southern Illinois University Carbondale
Department of Computer Science Southern Illinois University Carbondale CS441 Mobile & Wireless Computing Overview of Computer Networking Network Layer of TCP/IP Model Data and Computer Communications 7
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More information5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet
Chapter 5: outline 5.1 introduction 5.5 The SDN control 5.2 routing protocols plane link state 5.6 ICMP: The Internet distance vector Control Message 5.3 intra-as routing in Protocol the Internet t 5.7
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane Lu Su Assistant Professor Department of Computer Science and Engineering State University of New York at Buffalo Adapted from the slides of the book s authors
More informationTelecomunicazioni. Docente: Andrea Baiocchi DIET - Stanza 107, 1 piano palazzina P. Piga Via Eudossiana 18
University of Roma La Sapienza Telecomunicazioni Docente: Andrea Baiocchi DIET - Stanza 07, piano palazzina P. Piga Via Eudossiana 8 E-mail: andrea.baiocchi@uniroma.it Corso di Laurea in Ingegneria Gestionale
More informationChapter 4: network layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationChapter 4 Network Layer
Chapter 4 Network Layer Modified form the following All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationRouting Algorithms : Fundamentals of Computer Networks Bill Nace
Routing Algorithms 4-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Recall from Last Time Routing Algorithm
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCOMPUTER NETWORKS CHAP 4 : NETWORK LAYER
COMPUTER NETWORKS CHAP 4 : NETWORK LAYER 0160 08 h 12 h 29 Sep 2011 Chapter 4: 4-2 Chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing
More informationCS118 Discussion 1A, Week 6. Zengwen Yuan Dodd Hall 78, Friday 10:00 10:50 a.m.
CS118 Discussion 1A, Week 6 Zengwen Yuan Dodd Hall 78, Friday 10:00 10:50 a.m. 1 Outline Network Layer Overview: data v.s. control plane IPv4/IPv6, DHCP, NAT Project 2 spec Midterm review 2 Network layer:
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationChapter 4 Network Layer
Chapter 4 Network Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved
More informationAll material copyright J.F Kurose and K.W. Ross, All Rights Reserved
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 4 Network Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. All
More informationChapter IV: Network Layer
Chapter IV: Network Laer UG3 Computer Communications & Networks (COMN) Mungjin Lee mungjin.lee@ed.ac.uk Slides copright of Kurose and Ross IP addresses: how to get one? Q: How does a host get IP address?
More informationCS 43: Computer Networks. 23: Routing Algorithms November 14, 2018
S 3: omputer Networks 3: Routing lgorithms November, 08 Last class NT: Network ddress Translators: NT is mostly bad, but in some cases, it s a necessary evil. IPv6: Simpler, faster, better Tunneling: IPv6
More informationChapter 4: network layer
Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationLecture 17: Network Layer Addressing, Control Plane, and Routing
Lecture 17: Network Layer Addressing, Control Plane, and Routing COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition:
More informationInterplay Between Routing, Forwarding
Internet Routing 1 Interplay Between Routing, Forwarding routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 1 value in arriving packet s header 0111 3 1 Graph Abstraction
More informationChapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationChapter 4 Network Layer. Chapter 4: Network Layer. Chapter 4: Network Layer. Chapter goals: understand principles behind network layer services:
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCMPT 371: Data Communications and Networking. Chapter 4: Network Layer
School of Computing Science Simon Fraser University CMPT 371: Data Communications and Networking Chapter 4: Network Layer Network Layer 4-1 Chapter 4: Network Layer Chapter goals: understand principles
More informationChapter 4: Network Layer. Chapter 4: Network Layer
Chapter 4: Network Layer Chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) dealing with
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2010 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th Homework #5 Due Thursday, Nov 17 th Later this semester: Homework #6 - Presentation
More informationLecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationCOMP 3331/9331: Computer Networks and Applications
OMP /9: omputer Networks and pplications Week 9 Network Layer: Routing Reading Guide: hapter 4: Sections 4.5 Network Layer nnouncements v Labs Lab 4 ongestion ontrol Lab 5 Simple Router (start up for ssignment,
More informationChapter 4 Network Layer. Network Layer 4-1
Chapter 4 Network Layer Network Layer 4-1 Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationChapter 4 Network Layer
Chapter 4 Network Layer Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University May 2007 Computer Networking: A Top Down Approach Featuring the Internet,
More informationChapter 4 Network Layer
CSB051 Computer Networks 電腦網路 Chapter 4 Network Layer 吳俊興 國立高雄大學資訊工程學系 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol
More informationLecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 009. Chapter 4: Network Layer Chapter goals: understand principles behind layer
More informationChapter 4: Network Layer
Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link
More informationIntra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
Intra-AS Routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesle http://xkcd.com/85/ Some materials copright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 4: network layer
Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,
More informationTelecomunicazioni. Docente: Andrea Baiocchi. DIET - Stanza 107, 1 piano palazzina P. Piga Via Eudossiana 18
University of Roma La Sapiena Telecomunicaioni Docente: Andrea Baiocchi DIET - Stana 07, piano palaina P. Piga Via Eudossiana 8 E-mail: andrea.baiocchi@uniroma.it Corso di Laurea in Ingegneria Gestionale
More informationKR_4. Strato di rete
INFO-COM Dpt. Dipartimento di Scienza e Tecnica dell Informazione e della Comunicazione Università degli Studi di Roma La Sapienza KR_4. Strato di rete TELECOMUNICAZIONI per Ingegneria Informatica (secondo
More informationChapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP
Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link
More informationNetwork layer functions. Chapter 4 Network Layer. Network layer functions. Network layer functions
Network layer functions Chapter 4 Network Layer transport packet from sending to receiving hosts layer entity in every host, router functions: path determination: route taken by packets from source to
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationNetwork Layer: Routing. Routing. Routing protocol. Graph abstraction for routing algorithms: graph nodes are routers graph edges are physical links
Network Layer: Routing A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationDynamic Routing. The Protocols
Dynamic Routing The Protocols Desirable Characteristics of Dynamic Routing Automatically detect and adapt to topology changes Provide optimal routing Scalability Robustness Simplicity Rapid convergence
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationChapter 4 Network Layer
CSB051 Computer Networks 電腦網路 Chapter 4 Network Layer 吳俊興國立高雄大學資訊工程學系 Chapter 4: Network Layer Chapter goals: understand principles behind network layer services: routing (path selection) dealing with
More informationGraph abstraction: costs. Graph abstraction 10/26/2018. Interplay between routing and forwarding
0/6/08 Interpla between routing and forwarding Routing Algorithms Link State Distance Vector BGP routing routing algorithm local forwarding table header value output link 000 00 0 00 value in arriving
More informationNetwork Layer: Routing
Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationInterplay between routing, forwarding
Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state
More informationAccelerating Storage with RDMA Max Gurtovoy Mellanox Technologies
Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More information