Computer Networks. College of Computing. Copyleft 2003~2018

Size: px
Start display at page:

Download "Computer Networks. College of Computing. Copyleft 2003~2018"

Transcription

1 Computer Networks

2 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~

3 Attention The materias beow are avaiabe for use by others. Instructors are wecome to use them in their own courses, downoad them to their own cass' web site, or modify them to suit. However, you must acknowedge the source of the origina and not attempt to pace your own copyright on this materia. Thanks to 3

4 Roadmap Introduction Physica Layer Data Link Layer Medium Access Subayer Network Layer Transport Layer Appication Layer 4

5 Chapter 5 The Network Layer

6 Now I have come to the crossroads in my days, and I have aways known the right path, aways, without exception, I knew. But I never took it, you know why? Because it's too damn hard. ---A Pacino, scent of a woman inwei@cuc.edu.cn 6

7 Do you Taobao? ogistics :42: :59: :03: :04: :18: :32: :29: :35: :36: :57: :24: :01:11 B B,,, B,,,,,, :03: :36: :02: :05: :53: :50: :51:02,, inwei@cuc.edu.cn 7

8 What you wi earn: The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It s a about routing. 5.1 Network ayer design issues 5.2 Routing agorithms 5.3 Congestion contro agorithms 5.4 Quaity of service 5.5 Internetworking 5.6 The Networking ayer in the internet inwei@cuc.edu.cn 8

9 5.1 Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Impementation of Connectioness Service Impementation of Connection-Oriented Service Comparison of Virtua-Circuit and Datagram Networks 9

10 OSI Reference Mode 10

11 Communication subnet 11

12 Store-and-Forward Packet Switching ISP s equipment xdsl The environment of the network ayer protocos. inwei@cuc.edu.cn 12

13 Store-and-Forward Packet Switching Mechanism A host with a packet to send transmits it to the nearest router, either on its own LAN or over a point-to-point ink to the carrier. The packet is stored there unti it has fuy arrived so the checksum can be verified. Then it is forwarded to the next router aong the path unti it reaches the destination host, where it is deivered inwei@cuc.edu.cn 13

14 Who-Does-What The network ayer is responsibe for routing packets from the source to destination. The routing agorithm is the piece of software that decides where a packet goes next (e.g., which output ine, or which node on a broadcast channe). For connectioness networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time. inwei@cuc.edu.cn 14

15 Design Goa of the Network Layer 1. Services independent of router technoogy. 2. Transport ayer shieded from number, type, topoogy of routers. 3. Network addresses avaiabe to transport ayer use uniform numbering pan - even across LANs and WANs inwei@cuc.edu.cn 15

16 The Discussion Does error/fow contro beong in network or transport ayer? (Whether the network ayer shoud provide connectionoriented service or connectioness service) 16

17 Internet community viewpoint The subnet is inherenty unreiabe no matter how it is designed. Thus, hosts are forced to do error/fow contro anyway. Given that they perform error/fow contro, why have the network ayer dupicate the same function? The TCP/IP Internet is connectioness in its impementation but provides connections to its users. 17

18 Teephone Companies Viewpoint The connection oriented approach is the right way. Users don't want compex error/fow contro protocos in host machines. User's want reiabe, troube-free service. Quaity of Service is the dominant factor. 18

19 Datagram vs. Virtua Circuit Datagram for connectioness service: Each packet sent is routed independenty of its predecessors. Decisions are made "on the fy", so more computing required, however this method is more robust. Virtua Circuit for connection-oriented service: A path from the source router to the destination router must be estabished before any data packets can be sent. Avoids choosing a new route for each packet. A virtua circuit is a state -- it remembers how to send a packet from source to destination. This state is hed in the subnet, in the source DLL or in each of the DLL ayers aong the route. inwei@cuc.edu.cn 19

20 Impementation of Connectioness Service ISP s equipment A s tabe (initiay) A s tabe (ater) C s Tabe E s Tabe Every router has an interna tabe teing it where to send packets for each possibe dest. Each tabe entry is a pair consisting of a dest and the outgoing ine to use for that dest. Routing within a datagram network. inwei@cuc.edu.cn 20

21 Impementation of Connection- Oriented Service ISP s equipment A s tabe C s Tabe E s Tabe Incoming packets with connection id 1 is to be sent to router C and given id 1 Routing within a virtua-circuit network. inwei@cuc.edu.cn 21

22 Labe Switching Virtua Circuit Ca setup, teardown for each ca before data can fow Each packet carries VC identifier (not destination host ID) Every router on source-destination path maintains state for each passing connection Transport-ayer connection ony invoved two end systems Link, router resources (bandwidth, buffers) may be aocated to VC MPLS(MutiProtoco Labe Switching) Used within ISP networks in the Internet, with IP packets wrapped in an MPLS header having a 20-bit connection ID. inwei@cuc.edu.cn 22

23 Comparison of VC and Datagram Networks 23

24 Trade-offs between VC and datagram Setup time versus address parsing time Using VC requires a setup phase, which takes time. In a datagram subnet, a more compicated ookup procedure is required to ocate the entry for the destination. Overhead and bandwidth If the packets tend to be fairy short, a fu dest. address in every packet may represent a significant amount of overhead and wasted bandwidth. Amount of tabe space in router memory Datagram network needs entry for each possibe destination Whereas a VC network just needs an entry for each VC inwei@cuc.edu.cn 24

25 5.2 Routing Agorithms The Optimaity Principe Shortest Path Routing Fooding Distance Vector Routing Link State Routing Hierarchica Routing Broadcast Routing Muticast Routing Anycast Routing Routing for Mobie Hosts Routing in Ad Hoc Networks 25

26 Routing and Forwarding One can think of a router as having two processes inside it. Forwarding process: handes each packet as it arrives, ooking up the outgoing ine to use for it in the routing tabes. Routing process: responsibe for fiing in and updating the routing tabes. --that is where the routing agorithm comes into pay. inwei@cuc.edu.cn 26

27 Routing Agorithms Routing is concerned with the question: Which ine shoud router J use when forwarding a packet to router K? Goa: determine good path (sequence of routers) through network from source to destination The routing agorithm is that part of the network ayer software responsibe for deciding which output ine an incoming packet shoud be transmitted on. inwei@cuc.edu.cn 27

28 Goas for Routing Agorithms Correctness and Simpicity Robustness networks are never taken down; individua parts (e.g., inks, routers) may fai, but the whoe network shoud not. During years of continuous operation, being abe to hande a kinds of hardware and software faiures. Being abe to hande changes in topoogy and traffic patterns. Stabiity A stabe agorithm reaches equiibrium and stays there. It shoud converge quicky too. Fairness and efficiency Often contradictory inwei@cuc.edu.cn 28

29 Fairness vs. Efficiency Network with a confict between fairness and efficiency. inwei@cuc.edu.cn 29

30 Types of Agorithms Non-adaptive agorithms Routes never change once initia routes have been seected. Aso caed static routing. Because it does not respond to faiures, static routing is mosty usefu for situations in which the routing choice is cear. Adaptive agorithms Use such dynamic information as current traffic, topoogy, deay, etc. to seect routes. Differ in where they get information(ocay, adjacent routers, or a routers), when they change the routes(when changes happen, every Δt), and what metric is used for optimization(distance, number of hops, estimated transit time). inwei@cuc.edu.cn 30

31 The Optimaity Principe This simpy states that if router J is on the optima path from router I to router K, then the optima path from J to K aso fas aong this same path. This means we can form a sink tree (optima paths to B) as in the next Figure. I J K inwei@cuc.edu.cn 31

32 Sink tree Sink tree: the set of optima routes from a sources to a given destination form a tree rooted at the destination. The goa of a routing agorithms is to discover and use the sink trees for a routers. (a) A network. (b) A sink tree for router B. inwei@cuc.edu.cn 32

33 Graph abstraction Graph abstraction for routing agorithms: 1.graph nodes are routers 2.graph edges are physica inks ink cost: deay, $ cost, or congestion eve To choose a route between a given pair of routers: find Good path typicay means minimum cost path other definitions possibe inwei@cuc.edu.cn 33

34 Shortest Path Routing Often used because simpe and easy to understand Shortest Path Metrics (Path Length) Number of Hops Physica Distance Mean Queuing and Transmission Deay Bandwidth Average Traffic Communication Cost 34

35 Dijkstra's agorithm Use Dijkstra's agorithm (or variation) (SPF, Shortest Path First agorithm) Basic idea is: Choose the source, and put nodes connected to source in ist to consider. From the ist to consider choose the nearest node. Note: Edsger Wybe Dijkstra ( ; [ˈɛtsxər ˈwibə ˈdɛɪkstra]) 35

36 The Agorithm on a Weighted, Undirected Graph The first 6 steps used in computing the shortest path from A to D. The arrows indicate the working node. inwei@cuc.edu.cn 36

37 Dijkstra s Agorithm 1 Initiaization: 2 N = {A} 3 for a nodes v 4 if v one-step reachabe from A 5 then D(v) = c(a,v) 6 ese D(v) = infinity 7 8 Loop 9 find w not in N such that D(w) is a minimum 10 add w to N 11 update D(v) for a v one-step reachabe from w and not in N: 12 D(v) = min( D(v), D(w) + c(w,v) ) 13 /* new cost to v is either od cost to v or known 14 shortest path cost to w pus cost from w to v */ 15 unti a nodes in N inwei@cuc.edu.cn 37

38 Dijsktra s Agorithm 5-8 top Dijkstra's agorithm to compute the shortest path through a graph. inwei@cuc.edu.cn 38

39 Dijsktra s Agorithm 5-8 bottom Dijkstra's agorithm to compute the shortest path through a graph. inwei@cuc.edu.cn 39

40 Fooding Fooding is a form of isoated routing. Does not seect a specific route. When a router receives a packet, it sends a copy of the packet out on each ine (except the one on which it arrived). To prevent packets from ooping forever, each router decrements a hop count contained in the packet header. Whenever the hop count decrements to zero, the router discards the packet. inwei@cuc.edu.cn 40

41 Fooding Reduce Looping Add a sequence number to each packet. Each router maintains a private sequence number. When it sends a new packet, it copies the sequence number into the packet, and increments its private sequence number. For each source router S, a router: a) Keeps track of the highest sequence number seen from S. b) Whenever it receives a packet from S containing a sequence number ower than the one stored in its tabe, it discards the packet. c) Otherwise, it updates the entry for S and forwards the packet on inwei@cuc.edu.cn 41

42 Fooding uses Fooding has severa important uses: In miitary appications, the network must remain robust in the face of (extreme) hostiity Sending routing updates, because updates can't rey on the correctness of a router's routing tabe. Theoretica-chooses a possibe paths, so it chooses the shortest one. inwei@cuc.edu.cn 42

43 Distance Vector Routing Aso known as Beman-Ford, used in the Internet under name RIP Each router maintains a tabe (vector) giving the best known distance to a destination and the ine to use for sending there. Tabes are updated by exchanging information with neighbors. Each router knows the distance (cost) of reaching its neighbors (e.g. send echo requests). Routers periodicay exchange routing tabes with each of their neighbors. Upon receipt of an update, for each destination in its tabe, a router: Compares the metric in its oca tabe with the metric in the neighbor's tabe pus the cost of reaching that neighbor. if the path via the neighbor has a ower cost, the router updates its oca tabe to forward packets to the neighbor inwei@cuc.edu.cn 43

44 D-V Routing Exampe destination Metric is deay JàA: 8 ms JàI: 10ms JàH: 12ms JàK: 6ms cost Outgoing ink to use (a) A network. (b) Input from A, I, H, K, and the new routing tabe for J. inwei@cuc.edu.cn 44

45 The Count-to-Infinity Probem This agorithm was used in the origina ARPANET. Unfortunatey, it suffers from the probem: convergence takes time, good news traves quicky, bad news traves sowy (count-to-infinity probem). Convergence: the setting of routes to best paths across the network is caed convergence. 45

46 The Count-to-Infinity Probem Suppose A is down initiay and a the Others know this. When A comes up, the other routers Learn about it via the vector exchanges. A routers are initiay up, and Suddeny A goes down The count-to-infinity probem. inwei@cuc.edu.cn 46

47 The Count-to-Infinity Probem The core of the probem is: When X tes Y that it has a path somewhere, Y has no way of knowing whether it itsef is on the path. Attempts to sove: Spit horizon with poisoned reverse in RFC 1058 inwei@cuc.edu.cn 47

48 Probems with D-V The `od' Arpanet routing agorithm was repaced in Probems with od agorithm incuded: High-priority routing update packets were arge, adversey affecting traffic. Network was too sow in adapting to congestion, too fast to react to minor changes. Average queue ength was used to estimate deay. This works ony if a ines have the same capacity and propagation deay. Doesn't take into account that packets have varying sizes. inwei@cuc.edu.cn 48

49 Link State Routing Each router maintains a database describing the topoogy and ink deays between each router. That is, each router keeps track of the fu graph of inks and nodes. Avoids the count to infinity probem since a routers get each other router s information. Each router uses an SPF agorithm to cacuate shortest paths based on the current vaues in its database. Because each router makes its cacuation using the same information, better routing decisions are made. inwei@cuc.edu.cn 49

50 Five Steps Each router must do the foowing: 1. Discover its neighbors, earn who its neighbors are. 2. Set distance/cost metric to each of its neighbors. 3. Construct a packet teing a it has just earned. 4. Send this packet to, receive packets from a other routers. 5. Compute the shortest path to every other router. inwei@cuc.edu.cn 50

51 Learning about the Neighbors When a router is booted, its first task is to earn who its neighbors are. It accompishes this goa by sending a specia HELLO packet on each point-to-point ine. The router on the other end is expected to send back a repy giving its name. These names must be gobay unique. inwei@cuc.edu.cn 51

52 A graph mode of a network Modeing the LAN: introduced a new, artificia node, N, to which A,C, and F are connected. One designated router on the LAN is seected to pay the roe of N in the routing protoco. (a) Nine routers and a LAN. (b) A graph mode of (a). inwei@cuc.edu.cn 52

53 Setting Link Cost The cost to reach neighbors can be set automaticay, or configured by the network operator. A common choice is to make the cost inversey proportiona to the bandwidth of the ink. If the network is geographicay spread out, the deay of the inks may be factored into the cost so that paths over shorter inks are better choices. The most direct way to determine this deay is to send over the ine a specia ECHO packet that other side is required to send back immediatey. By measuring the round-trip time and dividing it by two, the sending router can get a reasonabe estimate of the deay. inwei@cuc.edu.cn 53

54 Buiding Link State Packets ID of the sender Sequence number (32-bits, one per second, wrap around after 137 years) Age for the packet (decrement once per second) A ist of neighbors and deay for it (a) A network. (b) The ink state packets for this subnet. inwei@cuc.edu.cn 54

55 Distributing the Link State Packets Basic distribution agorithm: Fooding To keep the food in check, each packet contains a sequence number that is incremented for each new packet sent. Routers keep track of a the (source router, sequence) pairs they see (in a ink state database). When a new ink state packet comes in, it is checked against the ist of packets aready seen. If it is new, it is forwarded on a ines except the one it arrived on. If it is a dupicate, it is discarded. If a packet with a sequence number ower than the highest one seen so far ever arrives, it is rejected as being obsoete since the router has more recent data. inwei@cuc.edu.cn 55

56 The Age fied Probems: Sequence number confusion Router crashes and ose track of its sequence num. A sequence number is corrupted. Soution: The Age fied Incude the age of each packet after the Seq. and decrement it once per second. When the age (in the router s ink state database) hits zero, the information from that router is discarded. The age fied is aso decremented by each router during the initia fooding process, to make sure no packet can get ost and ive for an indefinite period of time (a packet whose age is zero is discarded). inwei@cuc.edu.cn 56

57 Agorithm Refinements When a ink state packet comes in to a router for fooding, it is not queued for transmission immediatey. Instead it is first put in a hoding area to wait a short whie. If another ink state packet from the same source comes in before the first packet is transmitted, their sequence numbers are compared. If they are equa, the dupicate is discarded. If they are different, the oder one is thrown out. To guard against errors on the router-router ines, a ink state packets are acknowedged. inwei@cuc.edu.cn 57

58 Exampe LSP buffer for router B To reduce the numbers of ink state packets, wait for a short time and set 2 fags before forward the received ink state packets : the third packet, from E, is different. It arrived twice, once via EAB and once via EFB it has to be sent ony to C but acknowedged to both A and F The send fags mean that the packet must be sent on the indicated ink. The ack fags mean that it must be acknowedged there. The packet buffer for router B in the previous side (Fig. 5-12a). inwei@cuc.edu.cn 58

59 Computing the New Routes Once a router has accumuated a fu set of ink state packets, it can construct the entire network graph because every ink is represented. Every ink is, in fact, represented twice, once for each direction. The different directions may even have different costs. Now Dijkstra's agorithm can be run ocay to construct the shortest path to a possibe destinations. The resuts of this agorithm can be instaed in the routing tabes, and norma operation resumed. inwei@cuc.edu.cn 59

60 Limitations of Link State Routing For arge networks, the memory required to store the input data and the computation time can be an issue. Nevertheess, in many practica situations, ink state routing works we because it does not suffer from sow convergence probems. 60

61 Exampe Protocos using Link State Routing Agorithm IS-IS (Intermediate System-Intermediate System) in some Internet backbones. OSPF (Open Shortest Path First) in Internet (5.6.6) 61

62 Hierarchica Routing Hierarchica routing. 62

63 Broadcast Routing Sending a packet to a destinations simutaneousy is known as broadcasting. There are severa ways to impement broadcasting: For Broadcast Networks: The impementation is trivia: designate a specia address as the `a hosts address'. inwei@cuc.edu.cn 63

64 Broadcast Routing For Non-Broadcast Networks: 1. Send a unicast packet to each destination. However, this approach makes poor use of resources. 2. Food packets to a nodes. Fooding generates many packets and consumes too much bandwidth. 3. Use muti-destination routing: a) Each packet contains a ist (or bitmap) of a destinations, and when a router forwards a packet across two or more ines, it spits the packet and divides the destination addresses accordingy. b) This approach is simiar to sending uni-cast packets, except that we don't send individua copies of each messages. c) However, the copy operations sow down the abiity of a router to process many packets. inwei@cuc.edu.cn 64

65 Broadcast Routing For Non-Broadcast Networks: 4. Use a spanning tree. If the network can be reduced to a tree a) (There s ony one path between any two pairs of routers), copy a packet to each ine of spanning tree except the one on which it arrived. b) Works ony if each router understands the same spanning tree. 5. Reverse Path Forwarding (RPF): a) Use a sink tree (assume sink/source trees are the same). b) If a packet, originating from X, arrives on a ine of the sink tree eading to X, the packet is traveing aong the shortest path, so it must be the first copy we've seen. c) Copy the packet to a outgoing ines of the sink tree. If the packet arrives on another ine, assume that the packet is a copy - it didn't arrive on the shortest path - and discard it. RPF is easy to impement and makes efficient use of bandwidth. inwei@cuc.edu.cn 65

66 Reverse path forwarding Reverse path forwarding. (a) A network. (b) a Sink tree for router I. (c) The tree buit by reverse path forwarding. inwei@cuc.edu.cn 66

67 Muticast Routing (a) A network. (b) A spanning tree for the eftmost router. (c) A muticast tree for group 1. (d) A muticast tree for group 2. inwei@cuc.edu.cn 67

68 Muticast Routing (a) Core-based tree for group 1. (b) Sending to group 1. 68

69 Anycast Routing (a) Anycast routes to group 1. (b) Topoogy seen by the routing protoco. 69

70 Routing for Mobie Hosts Mobie Hosts - machines that are not currenty connected to their home ocation. Must get traffic to base host. Need intermediary agents. Look at Figures Base host uses encapsuation (tunneing) to send packet to mobie host. inwei@cuc.edu.cn 70

71 Routing for Mobie Hosts Packet routing for mobie hosts 71

72 Routing in Ad Hoc Networks (a)range of A s broadcast. (b) After B and D receive it. (c) After C, F, and G receive it. (d)after E, H, and I receive it. The shaded nodes are new recipients. The dashed ines show possibe reverse routes. The soid ines show the discovered route. inwei@cuc.edu.cn 72

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

Telecommunication Protocols Laboratory Course. Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 3 Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006 ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos

More information

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading Announcements Program #2 regrades requests due by 11:00 today HW #2 was coected at the start of cass Reading Today: 6.3-6.4 Thursday: 3.1 CMSC 417 - F97 (ect 16) copyright 1997 Jeffrey K. Hoingsworth 1

More information

5.2 Routing Algorithms

5.2 Routing Algorithms CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5. Routing Algorithms Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Lecture 5: Network Layer Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. Contents The

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

C13b: Routing Problem and Algorithms

C13b: Routing Problem and Algorithms CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

UNIT 2 ROUTING ALGORITHMS

UNIT 2 ROUTING ALGORITHMS UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity

More information

Link Registry Protocol Options

Link Registry Protocol Options Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

Computer Networks. College of Computing. Copyleft 2003~2018. Prof. Lin Weiguo

Computer Networks. College of Computing.  Copyleft 2003~2018. Prof. Lin Weiguo Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://tc.cuc.edu.cn Roadmap Introduction Physica Layer Data Link Layer Medium Access Subayer

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

ECE 435 Network Engineering Lecture 11

ECE 435 Network Engineering Lecture 11 ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 5 October 2017 Announcements Back from Memsys. Related things: fast memories for network

More information

Routing in a network

Routing in a network Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007. Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

ETSF05/ETSF10 Internet Protocols. Routing on the Internet

ETSF05/ETSF10 Internet Protocols. Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet Circuit switched routing ETSF05/ETSF10 - Internet Protocols 2 Routing in Packet Switching Networks Key design issue for (packet) switched networks

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016 9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Lecture on Computer Networks

Lecture on Computer Networks Lecture on Computer Networks Historical Development Copyright (c) 28 Dr. Thomas Haenselmann (Saarland University, Germany). Permission is granted to copy, distribute and/or modify this document under the

More information

ETSF05/ETSF10 Internet Protocols Routing on the Internet

ETSF05/ETSF10 Internet Protocols Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet 2014, (ETSF05 Part 2), Lecture 1.1 Jens Andersson Circuit switched routing 2014 11 05 ETSF05/ETSF10 Internet Protocols 2 Packet switched Routing

More information

Routing, Routers, Switching Fabrics

Routing, Routers, Switching Fabrics Routing, Routers, Switching Fabrics Outline Link state routing Link weights Router Design / Switching Fabrics CS 640 1 Link State Routing Summary One of the oldest algorithm for routing Finds SP by developing

More information

ECE 435 Network Engineering Lecture 11

ECE 435 Network Engineering Lecture 11 ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 11 October 2018 Midterm on Tues Announcements 1 HW#4 Review maine.edu created? What is a

More information

Routing. Advanced Computer Networks: Routing 1

Routing. Advanced Computer Networks: Routing 1 Routing Advanced Computer Networks: Routing 1 Gateway To internet or wide area network Metropolitan Area Network (MAN) s s Organization Servers Backbone R S R R Departmental Server s R S R s S R s s s

More information

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni 3/4/04 EN44 Network Protocols and lgorithms hapter Routing lgorithms Dr. Ridha Ouni Department of omputer Engineering ollege of omputer and Information Sciences King Saud University References Some slides

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP

More information

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C

More information

How Routing Algorithms Work

How Routing Algorithms Work How Routing Algorithms Work A router is used to manage network traffic and find the best route for sending packets. But have you ever thought about how routers do this? Routers need to have some information

More information

Unit 3: Dynamic Routing

Unit 3: Dynamic Routing Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Computer Networks. Routing Algorithms

Computer Networks. Routing Algorithms Computer Networks Routing Algorithms Topics Routing Algorithms Shortest Path (Dijkstra Algorithm) Distance Vector Routing Count to infinity problem Solutions for count to infinity problem Link State Routing

More information

Routing. Routing. Overview. Overview. Routing vs. Forwarding. Why Routing

Routing. Routing. Overview. Overview. Routing vs. Forwarding. Why Routing Routing Dr. Arjan Durresi Department of Computer Science Louisiana State University Overview Routing vs. Forwarding Routing Algorithms, Distance Vector, Link State Dijkstra s Algorithm ARPAnet Routing

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks OMP/ELE 49/6 Introduction to omputer Networks Intra-domain routing Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

EE 122 Final Exam - Solution Date: December 14, 2002

EE 122 Final Exam - Solution Date: December 14, 2002 Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition MCSE TestPrep SQL Server 6.5 Design & Impementation - Data Definition Page 1 of 38 [Figures are not incuded in this sampe chapter] MCSE TestPrep SQL Server 6.5 Design & Impementation - 3- Data Definition

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of Routing Protocols MITA DUTTA The routers in an internet are responsible for receiving and forwarding IP datagrams through the interconnected set of sub-networks from source to destination. Routing protocols

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Chapter 12. Routing and Routing Protocols 12-1

Chapter 12. Routing and Routing Protocols 12-1 Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Layer Chapter goals: understand principles behind layer services: routing (path selection) dealing with scale how a router works advanced topics: IPv6, mobility instantiation and implementation

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Low Traffic Overlay Networks with Large Routing Tables

Low Traffic Overlay Networks with Large Routing Tables Low Traffic Overay Networks with Large Routing Tabes Chunqiang Tang, Meissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, and Christopher Ward ABSTRACT The routing tabes of Distributed

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using

More information

Chapter 3: Windows 2000 TCP/IP Implementation Details

Chapter 3: Windows 2000 TCP/IP Implementation Details Chapter 3: Windows 2000 TCP/IP Impementation Detais Page 1 of 34 Chapter 3: Windows 2000 TCP/IP Impementation Detais Windows 2000 uses TCP/IP as the main communication protoco for buiding enterprise networks,

More information

Internet Protocol: Routing Algorithms. Srinidhi Varadarajan

Internet Protocol: Routing Algorithms. Srinidhi Varadarajan Internet Protocol: Routing Algorithms Srinidhi Varadarajan Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction for routing algorithms:

More information

Announcement. Project 2 extended to 2/20 midnight Project 3 available this weekend Homework 3 available today, will put it online

Announcement. Project 2 extended to 2/20 midnight Project 3 available this weekend Homework 3 available today, will put it online Announcement Project 2 extended to 2/20 midnight Project 3 available this weekend Homework 3 available today, will put it online Outline Introduction and Network Service Models Routing Principles Link

More information

Link-State Routing OSPF

Link-State Routing OSPF CE Computer Networks Link-State Routing OSPF Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet

DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet DaVinci: Dynamicay Adaptive Virtua Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, Mung Chiang Princeton University {jhe, rz, yingi, chengee, jrex,

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction

More information

Inside TCP/IP, Third Edition Network Support for TCP/IP

Inside TCP/IP, Third Edition Network Support for TCP/IP Inside TCP/IP, Third Edition -- Ch 3 -- Network Support for TCP/IP Page 1 of 47 Inside TCP/IP, Third Edition - 3 - Network Support for TCP/IP One of the reasons for the popuarity of TCP/IP networks is

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

ICMP, ARP, RARP, IGMP

ICMP, ARP, RARP, IGMP Internet Layer Lehrstuhl für Informatik 4 Raw division into three tasks: Data transfer over a global network Route decision at the sub-nodes Control of the network or transmission status Routing Protocols

More information

Concurrent programming: From theory to practice. Concurrent Algorithms 2016 Tudor David

Concurrent programming: From theory to practice. Concurrent Algorithms 2016 Tudor David oncurrent programming: From theory to practice oncurrent Agorithms 2016 Tudor David From theory to practice Theoretica (design) Practica (design) Practica (impementation) 2 From theory to practice Theoretica

More information

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2018 CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network

More information

Jaringan Komputer. Network Layer. Network Layer. Network Layer. Network Layer Design Issues. Store-and-Forward Packet Switching

Jaringan Komputer. Network Layer. Network Layer. Network Layer. Network Layer Design Issues. Store-and-Forward Packet Switching Network Layer Jaringan Komputer Network Layer Concerned with getting packets from the source all the way to the destination May require making many hops at intermediate routers along the way Contrasts

More information

The Internet and the web

The Internet and the web The Internet and the web Contents Introduction 3 1 The Internet at home 4 2 Loca Area Networks sma office/home office 5 3 Loca Area Networks business 6 4 Wide Area Networks 8 5 Wireess networks 9 6 Mobie

More information

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Goal is to use this opportunity (and not to find the lowest common denominator

More information