5 THE NETWORK LAYER 1

Size: px
Start display at page:

Download "5 THE NETWORK LAYER 1"

Transcription

1 5 THE NETWORK LAYER 1

2 FTP... TCP IP ATM Data link Physical Fig Running TCP/IP over an ATM subnet.

3 Issue Datagram subnet VC subnet Circuit setup Not needed Required Addressing Each packet contains Each packet contains a the full source and short VC number destination address State information Subnet does not hold Each VC requires subnet state information table space Routing Each packet is Route chosen when VC routed independently is set up; all packets follow this route Effect of router failures None, except for packets All VCs that passed lost during the crash through the failed router are terminated Congestion control Difficult Easy if enough buffers can be allocated in advance for each VC Fig Comparison of datagram and virtual circuit subnets.

4 Upper layer Connectionless Datagram UDP over IP Type of subnet Virtual circuit UDP over IP over ATM Connection-oriented TCP over IP ATM AAL1 over ATM Fig Examples of different combinations of service and subne structure.

5 A B C X X A' B' C' Fig Conflict between fairness and optimality.

6 B B F A G L D H E I J N C F A G L D H E I J N C K K M O M O (a) (b) Fig (a) A subnet. (b) A sink tree for router B.

7 B 7 C B (2, A) C (, ) A E 2 F D A E (, ) F (, ) D (, ) G (a) H G (6, A) (b) H (, ) B (2, A) C (9, B) B (2, A) C (9, B) A E (4, B) F (, ) D (, ) A E (4, B) F (6, E) D (,1) G (6, A) (c) H (, ) G (5, E) (d) H (, ) B (2, A) C (9, B) B (2, A) C (9, B) A E (4, B) F (6, E) D (, ) A E (4, B) F (6,E) D (, ) G (5, E) (e) H (9, G) G (5, E) (f) H (8, F) Fig The first five steps used in computing the shortest path from A to D. The arrows indicate the working node.

8 define MAX NODES 1024 / * maximum number of nodes * / define INFINITY / * a number larger than every maximum path * / int n, dist[max NODES][MAX NODES]; / * dist[i][j] is the distance from i to j * / void shortest path(int s, int t, int path[]) { struct state { / * the path being worked on * / int predecessor; / * previous node * / int length; / * length from source to this node * / enum {permanent, tentative} label; / * label state * / } state[max NODES]; int i, k, min; struct state * p; for (p = &state[0]; p < &state[n]; p++) { / * initialize state * / p->predecessor = 1; p->length = INFINITY; p->label = tentative; } state[t].length = 0; state[t].label = permanent; k = t; / * k is the initial working node * / do { / * Is there a better path from k? * / for (i = 0; i < n; i++) / * this graph has n nodes * / if (dist[k][i]!= 0 && state[i].label == tentative) { if (state[k].length + dist[k][i] < state[i].length) { state[i].predecessor = k; state[i].length = state[k].length + dist[k][i]; } } / * Find the tentatively labeled node with the smallest label. * / k = 0; min = INFINITY; for (i = 0; i < n; i++) if (state[i].label == tentative && state[i].length < min) { min = state[i].length; k = i; } state[k].label = permanent; } while (k!= s); / * Copy the path into the output array. * / i = 0; k = s; } do {path[i++] = k; k = state[k].predecessor; } while (k >= 0); Fig Dijkstra s algorithm to compute the shortest path through a graph.

9 Destination A B C D E F A 9 AB 4 ABC 1 ABFD 7 AE 4 AEF A B 20 C E 50 F (a) D Source B C D E F 9 BA 4 CBA 1 DFBA 7 EA 4 FEA 8 CB 3 DFB 2 EFB 4 FB 8 BC 3 DC 3 EC 2 FEC 3 BFD 3 CD 3 ECD 4 FD 2 BFE 3 CE 3 DCE 5 FE 4 BF 2 CEF 4 DF 5 EF (b) Fig (a) A subnet with line capacities shown in kbps. (b) The traffic in packets/sec and the routing matrix.

10 i Line λ i (pkts/sec) C i (kbps) µc i (pkts/sec) T i (msec) Weight 1 AB BC CD AE EF FD BF EC Fig Analysis of the subnet of Fig. 5-8 using a mean packet size of 800 bits. The reverse traffic (BA, CB, etc.) is the same as the forward traffic.

11 I H H I I I H A A Router A B C D F G E H I J K L (a) New estimated delay from J To A I H K Line A B C D E F G H I J K L JA delay JI delay JH delay JK delay is is is is Vectors received from J's four neighbors (b) K K New routing table for J Fig (a) A subnet. (b) Input from A, I, H, K, and the new routing table for J.

12 A B C D E (a) Initially After 1 exchange After 2 exchanges After 3 exchanges After 4 exchanges A B C D E (b) Initially After 1 exchange After 2 exchanges After 3 exchanges After 4 exchanges After 5 exchanges After 6 exchanges Fig The count-to-infinity problem.

13 A B C Router D Fig An example where split horizon fails.

14 H Router B D E D E G I G H B A C F A C F I LAN (a) N (b) Fig (a) Nine routers and a LAN. (b) A graph model of (a).

15 West East G B C F A H E I D J Fig A subnet in which the East and West parts are connected by two lines.

16 A B 2 C E 8 F D A Seq. Age B 4 E 5 Link State Packets B C D E F Seq. Seq. Seq. Seq. Seq. Age Age Age Age Age A 4 B 2 C 3 A 5 B 6 C 2 D 3 F 7 C 1 D 7 F 6 E 1 F 8 E 8 (a) (b) Fig (a) A subnet. (b) The link state packets for this subnet.

17 Send flags ACK flags Source Seq. Age A C F A C F Data A F E C D Fig The packet buffer for router B in Fig.5-15.

18 Full table for 1A Hierarchical table for 1A Dest. Line Hops Region 1 Region 2 1A 1B 1A 1C 2A 2B 1B 1B 1 1C 1C 1 2C 2D 2A 2B 2C 2D 3A 4A 5B 5C 3A 5A 3B 4B 3B 4C 5D 4A 5E 4B Region 3 Region 4 Region 5 4C 5A 5B 5C 5D 5E 1B 2 1B 3 1B 3 1B 4 1C 3 1C 2 1C 3 1C 4 1C 4 1C 4 1C 5 1B 5 1C 6 1C 5 Dest. Line Hops 1A 1B 1B 1 1C C 1B 1C 1C 1C (a) (b) (c) Fig Hierarchical routing.

19 Wireless cell Home agent Mobile host Home LAN Foreign agent Foreign LAN WAN MAN Fig A WAN to which LANs, MANs, and wireless cells are attached.

20 1. Packet is sent to the mobile host's home address 4. Subsequent packets are tunneled to the foreign agent 3. Sender is given foreign agent's address 2. Packet is tunneled to the foreign agent Fig Packet routing for mobile users.

21 I F H J N A D G K E O M O G C D N B H L L B A E H B C D F J G O M K L N I (a) A B C D G J O F I E H K L M N (b) (c) K E Fig Reverse path forwarding. (a) A subnet. (b) A spanning tree. (c) The tree built by reverse path forwarding.

22 , 2 1, , 2 1, (a) (b) (c) (d) Fig (a) A subnet. (b) A spanning tree for the leftmost router. (c) A multicast tree for group 1. (d) A multicast tree for group 2.

23 Perfect Packets delivered Maximum carrying capacity of subnet Desirable Congested Packets sent Fig When too much traffic is offered, congestion sets in and performance degrades sharply.

24 Layer Policies Transport Retransmission policy Out-of-order caching policy Acknowledgement policy Flow control policy Timeout determination Network Virtual circuits versus datagram inside the subnet Packet queueing and service policy Packet discard policy Routing algorithm Packet lifetime management Data link Retransmission policy Out-of-order caching policy Acknowledgement policy Flow control policy Fig Policies that affect congestion.

25 Faucet Host computer Packet Unregulated flow Leaky bucket Water Interface containing a leaky bucket The bucket holds packets Water drips out of the hole at a constant rate Regulated flow Network (a) (b) Fig (a) A leaky bucket with water. (b) A leaky bucket with packets.

26 (a) 25 MB/sec for 40 msec 0 Time (msec) 500 (b) 2 MB/sec for 500 msec 0 Time (msec) MB/sec for 11 msec (c) 2 MB/sec for 364 msec 0 Time (msec) 500 (d) 25 MB/sec for 22 msec 2 MB/sec for 228 msec 0 Time (msec) MB/sec for 33 msec (e) 2 MB/sec for 92 msec 0 Time (msec) MB/sec for 62 msec (f) 2 MB/sec for 190 msec 0 Time (msec) 500 Fig (a) Input to a leaky bucket. (b) Output from a leaky bucket. (c) - (e) Output from a token bucket with capacities of 250KB, 500KB, and 750KB. (f) Output from a 500KB token bucket feeding a 10 MB/sec leaky bucket.

27 Host computer Host computer One token is added to the bucket every T The bucket holds tokens Networks (a) Networks (b) Fig The token bucket algorithm. (a) Before. (b) After.

28 Characteristics of the Input Service Desired Maximum packet size (bytes) Loss sensitivity (bytes) Token bucket rate (bytes/sec) Loss interval (µsec) Token bucket size (bytes) Burst loss sensitivity (packets) Maximum transmission rate (bytes/sec) Minimum delay noticed (µsec) Maximum delay variation (µsec) Quality of guarantee Fig An example flow specification.

29 A Congestion A B B Virtual circuit Congestion (a) (b) Fig (a) A congested subnet. (b) A redrawn subnet that eliminates the congestion and a virtual circuit from A to B.

30 A Packet C Finishing time 8 B B 16 C 3 8 O D 17 D E 18 E A 20 (a) (b) Fig (a) A router with five packets queued for line O. (b) Finishing times for the five packets.

31 B C B C A D A D E F E F Heavy flow Choke Choke Choke Choke Reduced flow Choke Choke Reduced flow Flow is still at maximum rate Flow is reduced (a) (b) Fig (a) A choke packet that affects only the source. (b) A choke packet that affects each hop it passes through.

32 Senders A B C A B C A B C D E F D E F D E F G H I G H I G H I J K L J K L J K L Receivers (a) (b) (c) Fig (a) A network. (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2.

33 A D B E C F A D B E C Bandwidth reserved for source 2 F A D B E C F Bandwidth reserved for source 1 G H I G H I G H I J K L J K L J K L (a) (b) (c) Fig (a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1.

34 Host LAN Multiprotocol router WAN-WAN LAN Bridge B LAN M M X.25 WAN M M SNA WAN LAN LAN-LAN LAN-WAN LAN-WAN-LAN Fig Network interconnection.

35 Network 1 packets here Network 2 packets here Full gateway Network 2 packets here Network 1 G Network 2 G Network 2 Network 1 Network 1 packets here (a) (b) Half-gateway Neutral packets here Network 1 Network 2 (c) Fig (a) A full gateway between two WANs. (b) A full gateway between a LAN and a WAN. (c) Two half-gateways.

36 Item Some Possibilities Service offered Connection-oriented versus connectionless Protocols IP, IPX, CLNP, AppleTalk, DECnet, etc. Addressing Flat (802) versus hierarchical (IP) Multicasting Present or absent (also broadcasting) Packet size Every network has its own maximum Quality of service May be present or absent; many different kinds Error handling Reliable, ordered, and unordered delivery Flow control Sliding window, rate control, other, or none Congestion control Leaky bucket, choke packets, etc. Security Privacy rules, encryption, etc. Parameters Different timeouts, flow specifications, etc. Accounting By connect time, by packet, by byte, or not at all Fig Some of the many ways networks can differ.

37 SNA Multiprotocol router 1 X. 25 M M ATM Router M OSI M End-to-end concatenated virtual circuits 2 Host Fig Internetworking using concatenated virtual circuits.

38 1 M M Packets travel individually and can take different routes Router M M Multiprotocol router 2 Host Fig A connectionless internet.

39 Ethernet in Paris Multiprotocol router Acts like a serial line WAN Tunnel 1 2 Ethernet in London Header IP Ethernet frame IP IP packet inside payload field of the WAN packet IP Ethernet frame Fig Tunneling a packet from Paris to London.

40 Car English channel Paris Railroad carriage London Railroad track Fig Tunneling a car from France to England.

41 2 B 3 A B A 1 C Gateway D C D E Network 4 F 5 E F (a) (b) Fig (a) An internetwork. (b) A graph of the internetwork.

42 Packet Network 1 Network 2 G 1 G 2 G 3 G 4 G 1 fragments a large packet G 2 reassembles the fragments G 3 fragments again G 4 reassembles again (a) Packet G 1 G 2 G 3 G 4 G 1 fragments a large packet The fragments are not reassembled until the final destination (a host) is reached (b) Fig (a) Transparent fragmentation. (b) Nontransparent fragmentation.

43 Number of the first elementary fragment in this packet Packet number End of packet bit 1 byte A B C D E F G H I J Header (a) A B C D E F G H I J Header (b) Header A B C D E F G H I J Header Header Header (c) Fig Fragmentation when the elementary data size is 1 byte. (a) Original packet, containing 10 data bytes. (b) Fragments after passing through a network with maximum packet size of 8 bytes. (c) Fragments after passing through a size 5 gateway.

44 Packet filtering router Application gateway Packet filtering router Backbone Connections to outside networks Corporate network Security perimeter Inside LAN Outside LAN Firewall Fig A firewall consisting of two packet filters and an application gateway.

45 Leased lines to Asia US backbone Leased transatlantic line European backbone Regional network C SNA network IP Router National network A Tunnel D B Host 1 2 IP token bus LAN IP token ring LAN IP Ethernet LAN Fig The Internet is an interconnected collection of many networks.

46 32 Bits Version IHL Type of service Total length Time to live Identification Protocol D F Source address M F Destination address Fragment offset Header checksum Options (0 or more words) Fig The IP (Internet Protocol) header.

47 Option Description Security Specifies how secret the datagram is Strict source routing Gives the complete path to be followed Loose source routing Gives a list of routers not to be missed Record route Makes each router append its IP address Timestamp Makes each router append its address and timestamp Fig IP options.

48 32 Bits Class A B C D E 0 Network Host 10 Network Host 110 Network Host 1110 Multicast address Reserved for future use Range of host addresses to to to to to Fig IP address formats.

49 Host Network 127 (Anything) This host A host on this network Broadcast on the local network Broadcast on a distant network Loopback Fig Special IP addresses.

50 32 Bits Subnet mask 10 Network Subnet Host Fig One of the ways to subnet a class B network.

51 Message type Description Destination unreachable Packet could not be delivered Time exceeded Time to live field hit 0 Parameter problem Invalid header field Source quench Choke packet Redirect Teach a router about geography Echo request Ask a machine if it is alive Echo reply Yes, I am alive Timestamp request Same as Echo request, but with timestamp Timestamp reply Same as Echo reply, but with timestamp Fig The principal ICMP message types.

52 Router has 2 IP addresses To WAN Router has 2 IP addresses F2 1 2 F1 F3 3 4 E1 CS Ethernet E2 E3 E4 E5 E6 Campus FDDI ring EE Ethernet Ethernet addresses Fig Three interconnected class C networks: two Ethernets and an FDDI ring.

53 WAN 1 A B C D E WAN 2 F LAN 1 H I J LAN 2 G (a) WAN 3 W A B C 4 D 6 8 W2 F H L2 2 J G L1 W3 (b) Fig (a) An autonomous system. (b) A graph representation of (a).

54 AS 1 AS 2 Backbone Backbone router Area Internal router BGP protocol connects the ASes AS 3 AS 4 Area border router AS boundary router Fig The relation between ASes, backbones, and areas in OSPF.

55 Message type Description Hello Used to discover who the neighbors are Link state update Provides the sender s costs to its neighbors Link state ack Acknowledges link state update Database description Announces which updates the sender has Link state request Requests information from the partner Fig The five types of OSPF messages.

56 B C A E F G D H Information F receives from its neighbors about D From B: "I use BCD" From G: "I use GCD" From I: "I use IFGCD" From E: "I use EFGCD" I J (a) (b) Fig (a) A set of BGP routers. (b) Information sent to F.

57 32 Bits Version Priority Flow label Payload length Next header Hop limit Source address (16 bytes) Destination address (16 bytes) Fig The IPv6 fixed header (required).

58 Prefix (binary) Usage Fraction Reserved (including IPv4) 1/ Unassigned 1/ OSI NSAP addresses 1/ Novell NetWare IPX addresses 1/ Unassigned 1/ Unassigned 1/ Unassigned 1/ Unassigned 1/8 010 Provider-based addresses 1/8 011 Unassigned 1/8 100 Geographic-based addresses 1/8 101 Unassigned 1/8 110 Unassigned 1/ Unassigned 1/ Unassigned 1/ Unassigned 1/ Unassigned 1/ Unassigned 1/ Link local use addresses 1/ Site local use addresses 1/ Multicast 1/256 Fig IPv6 addresses

59 Extension header Description Hop-by-hop options Miscellaneous information for routers Routing Full or partial route to follow Fragmentation Management of datagram fragments Authentication Verification of the sender s identity Encrypted security payload Information about the encrypted contents Destination options Additional information for the destination Fig IPv6 extension headers.

60 Next header Jumbo payload length Fig The hop-by-hop extension header for large datagrams (jumbograms).

61 Next header 0 Number of addresses Next address Bit map 1 24 Adresses Fig The extension header for routing.

62 Virtual! circuit Virtual path Transmission path Fig A transmission path can hold multiple virtual paths, each of which can hold multiple virtual circuits.

63 40 Bits C GFC VP I VC I PTI L HEC P (a) C VP I VC I PTI L HEC P GFC: General Flow Control VPI: Virtual Path Identifier VCI: Virtual Channel Identification PTI: Payload Type CLP: Cell Loss Priority HEC: Header Error Check (b) Fig (a) The ATM layer header at the UNI. (b) The ATM layer header at the NNI.

64 "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Payload type Meaning "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " 000 User data cell, no congestion, cell type 0 "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " 001 User data cell, no congestion, cell type 1 "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " 010 User data cell, congestion experienced, cell type 0 "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " 011 User data cell, congestion experienced, cell type 1 "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " 100 Maintenance information between adjacent switches "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " 101 Maintenance information between source and destination switches "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " 110 Resource Management cell (used for ABR congestion control) "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " 111 Reserved for future function "" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Fig Values of the PTI field.

65 " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Message Meaning when sent by host Meaning when sent by network " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " SETUP Please establish a circuit Incoming call " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " CALL PROCEEDING I saw the incoming call Your call request will be attempted " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " CONNECT I accept the incoming call Your call request was accepted " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " CONNECT ACK Thanks for accepting Thanks for making the call " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " RELEASE Please terminate the call The other side has had enough " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " RELEASE COMPLETE Ack for RELEASE Ack for RELEASE " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Fig Messages used for connection establishment and release.

66 $ % ) & ( ' + * Source host Time Setup Call proceeding Connect Switch 1 Switch 2 Setup Call proceeding Connect Connect ack Setup Connect Connect ack Destination host Connect ack (a) Release Release complete Release Release complete Release Release complete (b ) Fig (a) Connection setup in an ATM network. (b) Connection release.

67 SF Original path New path Minneapolis 0 Denver 4 Omaha Virtual path DC NY LA Dallas Fig Rerouting a virtual path reroutes all of its virtual circuits.

68 " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Incoming Incoming Outgoing Outgoing Source line VPI Destination line VPI Path: " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " NY 1 1 SF 4 1 New " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " NY 1 2 Denver 4 2 New " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " LA 3 1 Minneapolis 0 1 New " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " DC 1 3 LA 3 2 New " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " NY 1 1 SF 4 1 Old " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " SF 4 3 DC 1 4 New " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " DC 1 5 SF 4 4 New " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " NY 1 2 Denver 4 2 Old " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " SF 4 5 Minneapolis 0 2 New " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " NY 1 1 SF 4 1 Old " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Fig Some routes through the Omaha switch.

69 VPI_table for Minn. VPI_table for DC VPI_table for Dallas VPI_table for LA VPI_table for Denver Incoming VPI 0 Outgoing Line VPI Outgoing Line VPI Outgoing Line VPI Outgoing Line VPI Outgoing Line VPI Line 0 Line 1 Line 2 Line 3 Line 4 Fig The table entries for the routes of Fig

70 Class Description Example CBR Constant bit rate T1 circuit RT-VBR Variable bit rate: real time Real-time videoconferencing NRT-VBR Variable bit rate: non-real time Multimedia ABR Available bit rate Browsing the Web UBR Unspecified bit rate Background file transfer Fig The ATM service categories.

71 Service characteristic CBR RT-VBR NRT-VBR ABR UBR Bandwidth guarantee Yes Yes Yes Optional No Suitable for real-time traffic Yes Yes No No No Suitable for bursty traffic No No Yes Yes Yes Feedback about congestion No No No Yes No Fig Characteristics of the ATM service categories.

72 " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Parameter Acronym Meaning " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Peak cell rate PCR Maximum rate at which cells will be sent " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Sustained cell rate SCR The long-term average cell rate " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Minimum cell rate MCR The minimum acceptable cell rate " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Cell delay variation tolerance CDVT The maximum acceptable cell jitter " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Cell loss ratio CLR Fraction of cells lost or delivered too late " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Cell transfer delay CTD How long delivery takes (mean and maximum) " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Cell delay variation CDV The variance in cell delivery times " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Cell error rate CER Fraction of cells delivered without error " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Severely-errored cell block ratio SECBR Fraction of blocks garbled " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Cell misinsertion rate CMR Fraction of cells delivered to wrong destination " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Fig Some of the quality of service parameters.

73 Probability 1-α α Minimum CTD CDV Transfer time Cells lost or delivered too late Fig The probability density function for cell arrival times.

74 , Time T L (a) t 1 Cell 1 2 t 2 Maximal case. Cell 2 arrives T sec after Cell 1 cell 3 expected T at t 2 + T (b) 1 2 Slow sender. Cell 2 arrives > T sec after cell 1 t 1 t 2 T Cell 3 expected at t 2 + T (c) 1 2 Fast sender. Cell 2 arrives up to L sec early t 1, t2 T Cell 3 expected at t 1 + 2T (d) 1 2 Very fast sender. Cell 2 arrives prior to t 1 + T L. Cell is nonconforming. t 1 Cell 3 expected at t 1 + T Fig The generic cell rate algorithm.

75 Time 0 T 2T 3T 4T 5T T-ε 1 T-ε 2 T-ε T-ε 3 T-ε ε 2ε 3ε (a) 4 5 4ε Non- conforming cell 6 5ε Bucket limit Fluid level T 0 (b) Fig (a) A sender trying to cheat. (b) The same cell arrival pattern, but now viewed in terms of a leaky bucket.

76 Direction of data flow Sender Receiver Path taken by RM cells ATM Switch Fig The path taken by RM cells.

77 -. 1 Host 1 2 LES does address lookup LES / BUS does 0 broadcasting / BUS 2 3 Fig ATM LAN emulation.

THE NETWORK LAYER. From: Computer Networks, 3rd ed. by Andrew S. Tanenbaum, 1996 Prentice Hall

THE NETWORK LAYER. From: Computer Networks, 3rd ed. by Andrew S. Tanenbaum, 1996 Prentice Hall 5 THE NETWORK LAYER Email FTP... TCP IP ATM Data link Physical Fig. 5-1. Running TCP/IP over an ATM subnet. Issue Datagram subnet VC subnet Circuit setup Not needed Required Addressing Each packet contains

More information

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service Network Layer Design Isues Chapter 5 The Network Layer Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Chapter 5. The Network Layer

Chapter 5. The Network Layer Chapter 5 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Chapter 5. The Network Layer. CEN Chapter 5 1

Chapter 5. The Network Layer. CEN Chapter 5 1 Chapter 5 The Network Layer CEN 445 - Chapter 5 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation

More information

Chapter 5. The Network Layer

Chapter 5. The Network Layer Chapter 5 The Network Layer Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies Congestion Control in Virtual-Circuit Subnets Congestion Control in Datagram

More information

Chapter 6. The Network Layer

Chapter 6. The Network Layer Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Chapter 5. The Network Layer FATİH ŞAHİN Network Layer Design Isues. Store-and-Forward Packet Switching

Chapter 5. The Network Layer FATİH ŞAHİN Network Layer Design Isues. Store-and-Forward Packet Switching Chapter 5 The Network Layer FATİH ŞAHİN 2007513806 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS ATM SERVICE CATEGORIES Service Categories : represent particular combinations of traffic parameters and QoS parameters. These parameters are determined by users for a

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Chapter 6. The Network Layer

Chapter 6. The Network Layer Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

ATM Quality of Service (QoS)

ATM Quality of Service (QoS) ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 5: Network Layer (cont ) Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. 2

More information

Asynchronous Transfer Mode

Asynchronous Transfer Mode ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy) ATM Asynchronous Transfer Mode (and some SDH) (Synchronous Digital Hierarchy) Why use ATM? Circuit switched connections: After initial setup no processing in network nodes Fixed bit rates, fixed time delay

More information

ATM Logical Connections: VCC. ATM Logical Connections: VPC

ATM Logical Connections: VCC. ATM Logical Connections: VPC ATM Logical Connections: VCC Logical Connections in ATM are referred to as virtual channel connections (VCCs). Virtual channel (VC) is a generic term used to describe unidirectional transport of ATM cells

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP

Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 397-480 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL

More information

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers CHAPTER 1 Introduction to ATM Traffic Management on the Cisco 7200 Series Routers In the latest generation of IP networks, with the growing implementation of Voice over IP (VoIP) and multimedia applications,

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

UNIT-IV INTERNETWORKING

UNIT-IV INTERNETWORKING Computer Networks Unit - IV Internetworking UNIT-IV INTERNETWORKING INTERNETWORKING First of all, the installed base of different networks is large. Nearly all personal computers run TCP/IP. Many large

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

Protocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections

Protocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections 168 430 Computer Networks Chapter 11 Asynchronous Transfer Mode Protocol Architecture Similarities between ATM and packet switching Transfer of data in discrete chunks Multiple logical connections over

More information

Network Layer Chapter 5

Network Layer Chapter 5 Design Issues Routing Algorithms Congestion Control Quality of Service Internetworking Network Layer Chapter 5 Network Layer of the Internet Revised: August 2011 and February 2018 The Network Layer Responsible

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008 CEN445 Network Protocols & Algorithms Network Layer Prepared by Dr. Mohammed Amer Arafah Summer 2008 1 Internetworking Two or more networks can be connected together to form an Internet. A variety of different

More information

Chapter 4: network layer

Chapter 4: network layer Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,

More information

William Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode

William Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode William Stallings Data and Computer Communications 7 th Edition Chapter 11 Asynchronous Transfer Mode Protocol Architecture Similarities between ATM and packet switching Transfer of data in discrete chunks

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

NAME: (Exam :SECTION A) Notes: Any script without a name will receive no points. You must show the calculations for the descriptive questions.

NAME: (Exam :SECTION A) Notes: Any script without a name will receive no points. You must show the calculations for the descriptive questions. SAMPLE TEST from past EXAMS Exam3 Chapters: 14, 19, 21, 23, 24. Type of questions: multiple choices, Fill in the gaps, short answer questions YOU MUST BRING SCANTRON sheets for the multiple choices (4.5

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical

More information

RSVP 1. Resource Control and Reservation

RSVP 1. Resource Control and Reservation RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows

More information

Resource Control and Reservation

Resource Control and Reservation 1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

The Internet. The Internet is an interconnected collection of netw orks.

The Internet. The Internet is an interconnected collection of netw orks. The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Network Layer 4-1 Chapter 4: Network Layer Chapter

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

ICMP, ARP, RARP, IGMP

ICMP, ARP, RARP, IGMP Internet Layer Lehrstuhl für Informatik 4 Raw division into three tasks: Data transfer over a global network Route decision at the sub-nodes Control of the network or transmission status Routing Protocols

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Internet Multicast Routing

Internet Multicast Routing Internet Multicast Routing. group addressing class D IP addresses 1110 Multicast Group ID. link layer multicast 28 bits. two protocol functions group management IGMP route establishment DVMRP, MOSPF, CBT,

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

The Network Layer and Routers

The Network Layer and Routers The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in

More information

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 MODELING TRAFFIC MANAGEMENT IN ATM NETWORKS WITH OPNET Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 1. The Ohio State University, Department of Computer and Information Science, 2015

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Intermediate Traffic Management

Intermediate Traffic Management Intermediate Traffic Management This presentation has been generated by the ATM Forum for the purpose of educating the public on ATM Technology and the ATM Forum s activities. This presentation is the

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

TDTS06: computer Networks

TDTS06: computer Networks TDTS06: computer Networks Lecturer: Johannes Schmidt The slides are taken from the book s companion Web site with few modifications: Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith

More information

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 MODELING TRAFFIC MANAGEMENT IN ATM NETWORKS WITH OPNET Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 1. The Ohio State University, Department of Computer and Information Science, 2015

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

Outline. Vorlesung Telematik. Higher Layer Protocols: TCP/IP and ATM. Packet Switching. Higher Layers. Network Layer and Internetworking

Outline. Vorlesung Telematik. Higher Layer Protocols: TCP/IP and ATM. Packet Switching. Higher Layers. Network Layer and Internetworking Outline Network Layer and Internetworking Vorlesung Telematik Higher Layer Protocols: TCP/IP and ATM The TCP/IP protocol suit ATM MPLS Xiaoming Fu Telematics Group University of Goettingen Most slides

More information

Outline EEC-682/782 Computer Networks I. Midterm 1 Statistics. Midterm 1 Statistics. High 99, Low 34, Average 66

Outline EEC-682/782 Computer Networks I. Midterm 1 Statistics. Midterm 1 Statistics. High 99, Low 34, Average 66 Outline EEC-682/782 Computer Networks I Lecture 12 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Reti degli Elaboratori Canale AL Prof.ssa Chiara Petrioli a.a. 2014/2015 We thank for the support material Prof. Kurose-Ross All material copyright 1996-2012 J.F Kurose and K.W.

More information

ATM Asynchronous Transfer Mode revisited

ATM Asynchronous Transfer Mode revisited ATM Asynchronous Transfer Mode revisited ACN 2007 1 ATM GOAL To establish connections between an arbitrary number of hosts...... over channels that fulfills a certain QoS level. -> ATM networks make it

More information

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Code No: RR Set No. 1

Code No: RR Set No. 1 Code No: RR320503 Set No. 1 III B.Tech II Semester Regular Examinations, Apr/May 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Lecture 16: Network Layer Overview, Internet Protocol

Lecture 16: Network Layer Overview, Internet Protocol Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge. Code No: RR320503 Set No. 1 III B.Tech II Semester Supplimentary Examinations, Aug/Sep 2007 COMPUTER NETWORKS ( Common to Computer Science & Engineering, Information Technology, Electronics & Control Engineering,

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Telecommunication Protocols Laboratory Course. Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 3 Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02 TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION ATM stands for Asynchronous Transfer Mode ATM is a flexible high bandwidth, low delay network technology that is: Capable of handling voice, video and data

More information

Asynchronous Transfer Mode (ATM) ATM concepts

Asynchronous Transfer Mode (ATM) ATM concepts Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall: Network Layer The Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 1 2 Contents 4.1.1 Connection-Oriented and Connectionless

More information

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control The Network Layer 1 Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 2 Contents Connection-Oriented (virtual circuit)

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

Computer Networks. Andrew S. Tanenbaum

Computer Networks. Andrew S. Tanenbaum Computer Networks Third Edition Andrew S. Tanenbaum 1 ; l Vrije Universiteit Amsterdam, The Netherlands For book and bookstore information Prentice Hall PTR Upper Saddle River, New Jersey 07458 CONTENTS

More information

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline ATM Asynchronous Transfer Mode these slides are based on USP ATM slides from Tereza Carvalho 1 ATM Networks Outline ATM technology designed as a support for ISDN Definitions: STM and ATM Standardization

More information

(Chapters 2 3 in Huitema) E7310/Internet basics/comnet 1

(Chapters 2 3 in Huitema) E7310/Internet basics/comnet 1 Introduction to routing in the Internet Ethernet, switching vs. routing Internet architecture IPv4 Addressing Routing principles Protocols: IPv4, ICMP, ARP (Chapters 2 3 in Huitema) E7310/Internet basics/comnet

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

Internet Technology 3/23/2016

Internet Technology 3/23/2016 Internet Technology // Network Layer Transport Layer (Layer ) Application-to-application communication Internet Technology Network Layer (Layer ) Host-to-host communication. Network Layer Route Router

More information

EC1009 HIGH SPEED NETWORKS (ELECTIVE) (2 marks Questions and answers)

EC1009 HIGH SPEED NETWORKS (ELECTIVE) (2 marks Questions and answers) DEPARTMENT OF ECE EC1009 HIGH SPEED NETWORKS (ELECTIVE) (2 marks Questions and answers) FINAL YEAR 7 th SEMESTER UNIT I HIGH SPEED NETWORKS 1) What is common channel signaling? The data s and control signals

More information

Example questions for the Final Exam, part A

Example questions for the Final Exam, part A ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of

More information

IPv6. IPv6, MPLS. IPv6. IPv6 Addresses. IPv4 Packet Format. IPv6. History

IPv6. IPv6, MPLS. IPv6. IPv6 Addresses. IPv4 Packet Format. IPv6. History , MPLS History Next generation IP (AKA IPng) Intended to extend address space and routing limitations of IPv4 Requires header change Attempted to include everything new in one change IETF moderated Based

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane Chapter 4: outline 4.1 Overview of Network layer data plane control plane 4.2 What s inside a router 4.3 IP: Internet Protocol datagram format fragmentation IPv4

More information

Table of Contents. Cisco TCP/IP

Table of Contents. Cisco TCP/IP Table of Contents TCP/IP Overview...1 TCP/IP Technology...1 TCP...1 IP...2 Routing in IP Environments...4 Interior Routing Protocols...5 RIP...5 IGRP...6 OSPF...6 Integrated IS IS...6 Exterior Routing

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information