MULTICAST ROUTING PROTOCOL COMMUNICATION NETWORKS 2. Draft Document version 0.3

Size: px
Start display at page:

Download "MULTICAST ROUTING PROTOCOL COMMUNICATION NETWORKS 2. Draft Document version 0.3"

Transcription

1 MULTICAST ROUTING PROTOCOL COMMUNICATION NETWORKS 2 Draft Document version 0.3

2 Table of Contents 1 INTRODUCTION: Overview Terms and Definitions Conventions Assumptions Layer 1 and Layer Topology Addressing Scheme Example NEIGHBOR DISCOVERY Procedure Packet Format TYPE field Node ID Example Reliability ROUTING AND FORWARDING Routing Table Construction Discovery Routing Update Packet Format Periodic Routing Updates Reliability Forwarding Data message Format Type Field Sequence Number Destination Addresses Example Algorithm for multicast routing Algorithm for message forwarding Reliability State Diagram RELIABILITY SCHEME Reliability Time-out Procedure Packet Format of ACK TYPE field Sequence Number Example APPENDIX A EXAMPLES OF MULTICAST ROUTING

3 1 INTRODUCTION: 1.1 Overview The purpose of this document is to provide a standard for the implementation of small multicast routing in a small to medium sized network. This document includes a description of the procedures, packet formats and algorithms to support the following functions and features: 1. Neighbor Discovery by all nodes upon bootstrapping and periodically thereafter. 2. Routing protocol to exchange end-node information among routers and build a routing table. 3. Algorithm for forwarding uni-cast and multi-cast packets toward the destination using the routing table. 4. Reliable Message Delivery. 1.2 Terms and Definitions Duplex: A type of connection between two nodes whereby both of them can communicate with each other at the same. Host: Machine used by the user to send/receive messages. Also referred to as end-node in the document. Multi-casting: Sending data packets to multiple destinations. Neighbor node: A node directly connected to the node under consideration. Node: Host or Router Packet: Similar to message. Packet and message can be used inter-changeably. Port: A connection identifier Reliability: Ensuring that the message sent has been received by the receiver. Router: Machine that serves to route packets between hosts. Routing Table: A table maintained to keep track of all hosts in the network. Uni-casting: Sending data packet to a single destination 3

4 1.3 Conventions In this document SHALL, SHALL NOT, MUST and MUST NOT express a mandatory requirement while MAY expresses an optional feature. 1.4 Assumptions Layer 1 and 2 1. All links in the network are unreliable with a packet loss probability of Packets may get lost but cannot get corrupted. Hence error detection is not required. 3. Packet size will always be with in the Maximum Transmission Unit (MTU) size and hence fragmentation and re-assembly of packets is not required. 4. Links failure will not occur. 5. Link delay will be 100ms. 6. All nodes have a Duplex connection between them Layer 3 1. There is no separate control port used by routers. Control signaling and data packets share the same one duplex port. 2. Multi-cast packet is sent from sender to 1-3 recipients. 3. Data packets do not need to be delivered in order Topology 1. Routers have 2-4 ports through which they connect to other routers and endnodes. 2. It is possible that network entities may join the network. But the network entities already existing in the network do not fail. 3. Each end-node has a single direct connection to the router. 4. Direct links are not present between end-nodes. 5. Topology establishment is pre-specified by designating the ports and their connection relationships. The protocol may not need to support dynamic topology setup. However, this global topology information is not known by any network entities a priori. 6. There will be at least 5 hosts and 5 routers in the network. 4

5 1.5 Addressing Scheme Routers and Hosts share the same fixed addressing scheme. 1 byte MUST be reserved for the Router/Host ID. ASCII values less than or equal to 127 SHALL be reserved for hosts whereas those greater than 127 SHALL be reserved for routers Example In the above example, hosts, denoted by squares, have IDs <=127 and routers, denoted by circles, have IDs > NEIGHBOR DISCOVERY 2.1 Procedure 1. When the node (router/host) boots up, Discovery routine is called. 2. Discovery packet, described in section 2.2, SHALL be transmitted on all outgoing ports every 400ms. 3. At the router receiving port : a. If the received packet is TYPE 1, then packet type is hello message b. Following 8 bits SHALL then be taken to be the ID of the node connected at the other end. c. ID <= 127 implies that a host is connected at the other end. In this case routing table is updated to contain that host entry, if that host is not already present in the routing table. d. If ID>127, hello message is ignored. 4. Continue Discovery phase until the node is off. 5

6 Both hosts and routers run this protocol at their end. Hosts discard hello messages received from routers. 2.2 Packet Format The general packet format is shown below: TYPE NODE ID 1 byte 1 byte TYPE field Type field SHALL be used to differentiate between different kinds of packets used in the network. ACSII value 1 MUST be used in the type field of Hello messages used for neighbor discovery Node ID Node ID MUST follow the addressing scheme mentioned in section Example 1. Hello Message from Router byte 1 byte Here the node ID is greater than 127 identifying the node as a router. 2. Hello Message from Host byte 1 byte Here the node ID is less than or equal to 127 identifying the node as an endnode/ Host. 6

7 2.3 Reliability The neighbor discovery procedure SHALL be unreliable which means that a hello message with TYPE field set to 1 does not need to be acknowledged by the receiver. 3 ROUTING AND FORWARDING Routing in the router network corresponds to selecting the ports out of which an incoming message will be forwarded for each of the destinations included in the message. If the same port is selected for more than one destination, then the message MUST be sent as a single packet for these destinations; in other words, one packet MUST be forwarded for each distinct port selected and the packet header MUST be appropriately modified to contain only those destinations which should be reached by that particular port. Port selection is based on minimizing the maximum possible total number of hops for forwarded packets on the path(s) starting on the selected port(s), where the total number of hops is calculated as the sum of single-packet transmissions over each link in the network until each packet is delivered to its destination. In order to do this, each router MUST keep a record of the shortest distance to every possible destination (end-node) out of every one of its ports. This information MAY be kept in a matrix or similar data structure, referred to as a routing table, indexed by destination and port number. 3.1 Routing Table Construction Routers SHALL populate their routing tables by listening for updates from their neighbors. These updates SHALL be of two types Discovery The first type corresponds to discovery messages received by routers from neighboring end hosts, which will contain the host name. When a discovery message from a neighboring end host is received, the update to the routing table MUST assign a distance of 0 to the host name received in the discovery message at the port through which the discovery message was received. Details of discovery including the packet format are discussed in section 2 of this document. 7

8 3.1.2 Routing Update The second type corresponds to routing table updates received from neighboring routers, which have the format shown in section When this type of message is received on a port port_in, the router MUST execute the following procedure: Algorithm UpdateRT (in: INT port_in, in: SET update) Preconditions: SET PORTS: Ids of routers ports (e.g. {1, 2, 3, 4}) MATRIX RT[n PORTS ]: Routing table that contains the distances of the shortest paths to every host out of every port (n is the number of hosts, and x denotes the number of elements in data structure x) SET update contains (host, distance) pairs received in a routing update Postconditions: RT is updated with the minimum distances to the hosts in the update, if the distances received are less than the existing ones. BEGIN for each (host, distance) update do if (RT[host, port_in]=nil OR distance < RT[host, port_in]) RT[host, port_in] = distance + 1 end if end for END 8

9 Packet Format TYPE # of hosts HOST1 DIST1 HOST2 DIST2 HOSTn DISTn Figure 1. Packet format for routing table updates. Packets contain variable number of hosts specified in the # of hosts field and distances that correspond to the distances of the shortest paths to those hosts from the updating router Type Field For Routing Update messages, Type field MUST be set to ASCII value Example In the example topology of section 1.4.1, Router 134 might send the following message to router 133. (This would be the case when router 134 has received information about Hosts 2, 3 and 4 but not about host 1) Periodic Routing Updates After a router has received its first update (of either type), it MUST send periodical routing table updates out of all ports connected to other routers. Updates MUST be sent at an interval of 2 seconds using the packet format shown in section A router 9

10 MUST NOT send updates if it has no information in its routing table. A host receiving a routing update will discard it. The content of a particular update to be sent from a particular port update_port is given by the following algorithm: Algorithm CreateUpdate (in: INT update_port, out: SET min_distances) Preconditions: SET PORTS: Ids of routers ports (e.g. {1, 2, 3, 4}) MATRIX RT[n PORTS ]: Routing table that contains the distances of the shortest paths to every host out of every port (n is the number of hosts, and x denotes the number of elements in data structure x) Postconditions: min_distances contains the minimum distances in RT to each host over all ports, excluding the port on which the update will be sent. BEGIN min_distances = for each host RT INT distance = min port PORTS {update_port} (RT[host, port]) min_distances = min_distances {(host, distance)} end for END Once the set of minimum distances is determined, the router constructs a message using the format shown in section , with # of hosts field set to min_distances and Host data (Host ID and Distance) set to each one of the entries in this set, and sends the message from update_port. The router MUST repeat the above procedure for each port to which a neighboring router is connected Reliability The routing updates SHALL be unreliable which means that a node receiving a packet with TYPE field set to 2 does not need to acknowledge it. 10

11 3.2 Forwarding Data message Format DATA Messages exchanged between hosts through the router network MUST follow the format shown in Figure 2. TYPE SEQ NUM # OF DEST DEST1 DEST2 DEST3 LENGTH PAYLOAD 1 byte 1 byte 1 byte 1 byte 1 byte 1 byte 2 bytes variable (max 1000 bytes) Figure 2. Packet format for end host messages. The message may include 1 to 3 destination ids (DESTi), indicated by the #DEST field. These destinations are followed by a variable length (in Bytes) payload, indicated by LENGTH. The maximum length of a packet is 1000 bytes Type Field For Data messages, Type field MUST be set to ASCII value Sequence Number The Sequence number is used in the data packet to avoid reception of duplicate packets at the receiver due to the reliability scheme implemented at the link layer. Any node receiving the data packet SHALL send back an ACK (described in section 4.4) with sequence number set to next expected sequence number at that port. Any node forwarding a data packet at a port SHALL set the sequence number to that received in last ACK at that port. If no ACK has been received at that port since boot-up, the sequence number shall be set to zero. The sequence number SHALL go from 0 to 255 before wrapping around. NOTE: Sequence numbers are specific to links. Thus a router having four active links would need to keep a track of four separate sequence numbers, one at each link Destination Addresses The DEST2 and DEST3 fields are optional depending on the number of destinations in the # OF DEST field. Hence, we would have a variable length header. 11

12 Example TYPE =3 Seq # =12 # of DEST = 2 DEST1 = 2 DEST2 = 4 LENGTH = 800 PAYLOAD 1 byte 1 byte 1 byte 1 byte 1 byte 2 bytes 800 bytes Algorithm for multicast routing With the routing information, each router SHALL implement the RouteMessage algorithm and execute it to select the port(s) upon reception of a message on an incoming port. The interpretation of the local variables used in this algorithm is as follows: P: Set of all possible combinations of i ports, where i is the number of destinations to which the message is addressed. The number of destinations supported by the algorithm MUST be at least 3. maxhops: Holds the maximum number of hops on the paths that may result from sending messages out of a particular port combination. distinct_ports: Holds the number of distinct port identifiers in a particular port combination for a number of destinations (e.g. for these port combinations (1,2,3), (1,2,1), and (3,3,3), the value of distinct_ports is 3, 2, and 1, respectively). shared: Holds the number of destinations that can share the port of some other destination in a particular combination of ports, obtained from the number of destinations and distinct ports for them. minmax: Holds the minimum of all maxhops values explored by the algorithm for the different combinations of ports up to a certain point. Upon termination, it will hold the overall minimum value. ports_shared: Holds the maximum value of shared variable for the port combinations whose maxhops value is minimum. Algorithm RouteMessage (in: LIST destinations, in: INT port_in, out: LIST ports_out) Preconditions: SET PORTS: Ids of routers ports (e.g. {1, 2, 3, 4}) MATRIX RT[n PORTS ]: Routing table that contains the distances of the shortest paths to every host out of every port (n is the number of hosts, and x denotes the number of elements in data structure x) Postconditions: ports_out contains an ordered list of port identifiers, one for each destination 12

13 BEGIN SET P = {(x 1,,x i ) i = destinations x i PORTS-{port_in}} INT minmax = INT ports_shared = 0 for each (p 1,,p i ) P do INT maxhops = RT[destinations i, x i ] SET distinct_ports = {x i i {1,, destinations }} INT shared = destinations - distinct_ports maxhops = maxhops shared if (maxhops < minmax (maxhops == minmax shared > ports_shared)) minmax = maxhops ports_shared = shared ports_out = (p 1,,p i ) end if end for END Exceptions: If the routing table contains no entry for a particular destination i, then entry i must be eliminated from destination and ports_out lists Algorithm for message forwarding The output list ports_out MUST have the same order as the list of destinations, so that the packet addressed to destinations i will be sent out of ports_out i. The following procedure is used for forwarding messages given the result of the RouteMessage algorithm: Algorithm ForwardMessage (in: LIST destinations, in: LIST ports_out, in: message) Preconditions: ports_out has been obtained using the RouteMessage algorithm for the given destination list. Postconditions: The message has been sent to the given destinations from the correct ports 13

14 BEGIN SET distinct_ports = {ports_out i i {1,, ports_out }} for each p distinct_ports do SET port_destinations = for each i {1,, ports_out } do if (ports_out i == p) port_destinations = port_destinations destination i end if end for Create packet (Figure 2) with: #DEST = port_destinations for each d port_destinations do Add destination d end for LENGTH = message Add message end Create Send packet out of port p end for END In the above procedure, distinct_ports has the same interpretation as in the RouteMessage algorithm. Set port_destinations is used to aggregate all destinations to be sent out of a particular port, and will be used to address the packet to be forwarded from that port only with those destinations. A router MUST NOT forward any packet corresponding to a message on the port at which this message was received (port_in above). Correct implementation of the routing algorithm will ensure that this does not happen Reliability Data messages SHALL be reliable which means if a receiver receives a packet of type 3, it MUST send back an acknowledgement. 3.3 State Diagram Figure 3 shows the state diagram for routers. Rectangles denote states while ovals denote procedures, some of which correspond to the algorithms described above. Bracketed transition labels indicate an input to a procedure or state; otherwise, labels indicate the actions that trigger state changes. 14

15 Startup Update Arrives Update RT Message Arrives Update Arrives [RT] Ready Clock Trigger Message Arrives Create Updates Route Message [min_distances] [ports_out] Send Updates Forward Message Figure 3. Routing State Diagram. 4 RELIABILITY SCHEME Stop-and-Wait ARQ SHALL be used for reliability. 4.1 Reliability Acknowledgement (ACK) packet will be sent by the receiver after receiving the packet. 4.2 Time-out The Stop and wait retransmission time-out is set to 250 ms. 4.3 Procedure 1. Whenever a node (Router or Host) receives a packet with TYPE field set to 3 (data packet), it MUST send back an acknowledgement (ACK) packet described in section 4.4 with TYPE set to If the sender does not get the ACK packet with-in 250 ms, sender will time-out and will retransmit the Data packet. It will keep on doing so until it gets the ACK packet. 3. If the receiver receives a duplicate packet, it will discard the packet and retransmit the ACK. 15

16 4.4 Packet Format of ACK TYPE SEQ NUM 1 Byte 1 Byte TYPE field For the acknowledgements, the TYPE field MUST be set to ASCII value Sequence Number The sequence number of the ACK SHALL be set to next expected sequence number at that port Example Following ACK would be sent in response to the data packet described in section TYPE = 4 Seq Num = 13 1 Byte 1Byte 16

17 APPENDIX A EXAMPLES OF MULTICAST ROUTING Host Port When sending a message received from 1 to ['2', '3', '4'] the steps below show how the ports or the minmax value change. Set minmax to 10 from ports 1, 1, and 1. Set minmax to 9 from ports 1, 1, and 3. minmax is 9 going out of ports 1, 1, and 3. Sending to [ 2, 3 ] on port 1 and [ 4 ] on port 3. 17

18 Example of application of the routing algorithm with a given routing table and different message destinations: Host Port 0 1 Inf Inf Inf Inf Inf 4 5 Inf Inf Inf These show the intermediate steps where minmax is set or the ports are changed and which port are selected for which messages in the end: minimax('4', '5', '6') Setting minmax to 10 from 0, 0, and 0. Setting minmax to 9 from 0, 0, and 2. minmax is 9 going out of ports 0, 0, and 2. Sending to [ 4, 5 ] on port 0 and [ 6 ] on port 2 minimax('1', '2', '3'); Setting minmax to 11 from 0, 1, and 1. Setting minmax to 9 from 0, 1, and 2. Changing ports to 0, 3, and 3. minmax is 9 going out of ports 0, 3, and 3. minimax('5', '6'); Setting minmax to 9 from 1, and 0. Setting minmax to 8 from 1, and 1. Setting minmax to 7 from 1, and 2. minmax is 7 going out of ports 1 and 2. Sending to [ 5 ] on port 1 and [ 6 ] on port 2. 18

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

ECE 544 Project 3 Content-based Routing

ECE 544 Project 3 Content-based Routing ECE 544 Project 3 Content-based Routing Aishwarya Babu Rakesh Ravuru Sudarshan Kandi Assumptions and Address Scheme Assumptions End hosts can only connect to routers Each host is directly connected to

More information

CSE 1 23: Computer Networks

CSE 1 23: Computer Networks CSE 1 23: Computer Networks Total Points: 47.5 Homework 2 Out: 10/18, Due: 10/25 1. The Sliding Window Protocol Assume that the sender s window size is 3. If we have to send 10 frames in total, and the

More information

THE HONG KONG POLYTECHNIC UNIVERSITY. Department of Computing. This is an open-book examination.

THE HONG KONG POLYTECHNIC UNIVERSITY. Department of Computing. This is an open-book examination. THE HONG KONG POLYTECHNIC UNIVERSITY Department of Computing This is an open-book examination. () Internetworking Protocols and Software 7 January 2013 3 hours [Answer all ten questions.] 2 Please answer

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Internetworking Protocols and Software (COMP416)

Internetworking Protocols and Software (COMP416) Internetworking Protocols and Software (COMP416) Assignment Three (due on 2 Dec. 2013) Rocky K. C. Chang 1) [10 MARKS] (TCP congestion control I) In this question, we revisit the congestion control problem

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

ECE 544 Protocol Design Project Team Member Names Aneesh Abhyankar Satakshi Tiwari Vishalsingh Hajeri

ECE 544 Protocol Design Project Team Member Names Aneesh Abhyankar Satakshi Tiwari Vishalsingh Hajeri ECE 544 Protocol Design Project 2016 Team Member Names Aneesh Abhyankar Satakshi Tiwari Vishalsingh Hajeri Network Architecture & Topology Assumptions Service Objective: k-out-of-n packet datagram multicast

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 18 th class; 7 th Oct 2011 Instructor: Sridhar Iyer IIT Bombay Reliable Transport We have already designed a reliable communication protocol for an analogy

More information

Alcatel-Lucent 4A Alcatel-Lucent Scalable IP Networks. Download Full Version :

Alcatel-Lucent 4A Alcatel-Lucent Scalable IP Networks. Download Full Version : Alcatel-Lucent 4A0-100 Alcatel-Lucent Scalable IP Networks Download Full Version : https://killexams.com/pass4sure/exam-detail/4a0-100 Answer: B QUESTION: 216 Which of the following statements best characterize

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

ES623 Networked Embedded Systems

ES623 Networked Embedded Systems ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection

More information

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H...

file:///c:/users/hpguo/dropbox/website/teaching/fall 2017/CS4470/H... 1 of 9 11/26/2017, 11:28 AM Homework 3 solutions 1. A window holds bytes 2001 to 5000. The next byte to be sent is 3001. Draw a figure to show the situation of the window after the following two events:

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

THE TRANSPORT LAYER UNIT IV

THE TRANSPORT LAYER UNIT IV THE TRANSPORT LAYER UNIT IV The Transport Layer: The Transport Service, Elements of Transport Protocols, Congestion Control,The internet transport protocols: UDP, TCP, Performance problems in computer

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2961 Category: Standards Track L. Berger LabN Consulting, LLC D. Gan Juniper Networks, Inc. G. Swallow Cisco Systems, Inc. P. Pan Juniper Networks, Inc. F. Tommasi

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Winter 2004 Lecture 18 Announcements Fourth quiz on Monday, March 1 st. Third HTML discussion session today by Kiran (before class). Summary posted on

More information

Unit 2.

Unit 2. Unit 2 Unit 2 Topics Covered: 1. PROCESS-TO-PROCESS DELIVERY 1. Client-Server 2. Addressing 2. IANA Ranges 3. Socket Addresses 4. Multiplexing and Demultiplexing 5. Connectionless Versus Connection-Oriented

More information

TCP/IP Protocol Suite 1

TCP/IP Protocol Suite 1 TCP/IP Protocol Suite 1 Stream Control Transmission Protocol (SCTP) TCP/IP Protocol Suite 2 OBJECTIVES: To introduce SCTP as a new transport-layer protocol. To discuss SCTP services and compare them with

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information

Review. Some slides are in courtesy of J. Kurose and K. Ross

Review. Some slides are in courtesy of J. Kurose and K. Ross Review The Internet (IP) Protocol Datagram format IP fragmentation ICMP: Internet Control Message Protocol NAT: Network Address Translation Routing in the Internet Intra-AS routing: RIP and OSPF Inter-AS

More information

Lecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage

Lecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage Lecture 11: Fragmentation & Addressing CSE 123: Computer Networks Stefan Savage So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes, how to

More information

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes: Overview Protocol Independent Multicast for IPv6 () provides IPv6 multicast forwarding by leveraging static routes or IPv6 unicast routing tables generated by any IPv6 unicast routing protocol, such as

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Multicast Communications

Multicast Communications Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Table of Contents Chapter 1 Multicast Routing and Forwarding Configuration

Table of Contents Chapter 1 Multicast Routing and Forwarding Configuration Table of Contents Table of Contents... 1-1 1.1 Multicast Routing and Forwarding Overview... 1-1 1.1.1 Introduction to Multicast Routing and Forwarding... 1-1 1.1.2 RPF Mechanism... 1-2 1.1.3 Multicast

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage

More information

Ch. 5 Maintaining and Troubleshooting Routing Solutions. Net412- Network troubleshooting

Ch. 5 Maintaining and Troubleshooting Routing Solutions. Net412- Network troubleshooting Ch. 5 Maintaining and Troubleshooting Routing Solutions Net412- Network troubleshooting Troubleshooting Routing Network Layer Connectivity EIGRP OSPF 2 Network Connectivity Just like we did when we looked

More information

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University Chapter 7 Internet Protocol Version 4 (IPv4) 1 7.1 Introduction The transmission mechanism used by the TCP/IP Unreliable and connectionless datagram protocol Best-effort delivery service IP packets can

More information

IPv6 is Internet protocol version 6. Following are its distinctive features as compared to IPv4. Header format simplification Expanded routing and

IPv6 is Internet protocol version 6. Following are its distinctive features as compared to IPv4. Header format simplification Expanded routing and INTERNET PROTOCOL VERSION 6 (IPv6) Introduction IPv6 is Internet protocol version 6. Following are its distinctive features as compared to IPv4. Header format simplification Expanded routing and addressing

More information

CRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors

CRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#3 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

The History and the layers of the OSI Model 30 - October

The History and the layers of the OSI Model 30 - October THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects

More information

Chapter -4 OSI Reference Model

Chapter -4 OSI Reference Model Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

Data Link Layer, Part 5 Sliding Window Protocols. Preface

Data Link Layer, Part 5 Sliding Window Protocols. Preface Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Chapter 20 Network Layer: Internet Protocol 20.1

Chapter 20 Network Layer: Internet Protocol 20.1 Chapter 20 Network Layer: Internet Protocol 20.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 20-1 INTERNETWORKING In this section, we discuss internetworking,

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis Introduction to Internet Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis What about inter-networks communications? Between LANs? Ethernet?? Ethernet Example Similarities and Differences between

More information

Reliable Transmission

Reliable Transmission Reliable Transmission How to fix corrupted frames. Error correcting codes too expensive Should discard frames (retransmission) Recover from Corrupt s should be done in the Link Level Data Link Networks

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT Transport Protocols UDP User Datagram Protocol TCP Transport Control Protocol and many others UDP One of the core transport protocols Used

More information

CS-461 Internetworking. Dr. Mohamed Aboutabl

CS-461 Internetworking. Dr. Mohamed Aboutabl CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network

More information

ECE/CSC 570 Section 001. Final test. December 11, 2006

ECE/CSC 570 Section 001. Final test. December 11, 2006 ECE/CSC 570 Section 001 Final test December 11, 2006 Questions 1 10 each carry 2 marks. Answer only by placing a check mark to indicate whether the statement is true of false in the appropriate box, and

More information

SC250 Computer Networking I. Review Exercises. Prof. Matthias Grossglauser. School of Computer and Communication Sciences EPFL.

SC250 Computer Networking I. Review Exercises. Prof. Matthias Grossglauser. School of Computer and Communication Sciences EPFL. SC250 Computer Networking I Review Exercises Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Reliable transport: rdt3.0 ACK packets receiver->sender

More information

Lecture - 14 Transport Layer IV (Reliability)

Lecture - 14 Transport Layer IV (Reliability) Computer Networks and Internet Protocol Prof. Sandip Chakraborthy Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Transport Layer IV (Reliability)

More information

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011 Department of Computer Science and Engineering CSE 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Date: April 15, 2011 Instructions: Examination time: 180 min.

More information

NT1210 Introduction to Networking. Unit 10

NT1210 Introduction to Networking. Unit 10 NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

CS 349/449 Internet Protocols Midterm Exam Winter /21/2003

CS 349/449 Internet Protocols Midterm Exam Winter /21/2003 CS 349/449 Internet Protocols Midterm Exam Winter 2003 10/21/2003 Question 349 Points 449 Points Score 1 10 10 2 20 10 3 20 20 4 20 20 5 30 20 6 (449 only) - 20 Total: 100 100 Name: Instructions: 1. You

More information

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3.

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3. Introduction to Multicast listener discovery protocol () is used by an IPv6 router to discover the presence of multicast listeners on directly-attached subnets. Multicast listeners are nodes wishing to

More information

Configuring EIGRP. 2001, Cisco Systems, Inc.

Configuring EIGRP. 2001, Cisco Systems, Inc. Configuring EIGRP 4-1 EIGRP Overview 4-2 What Is EIGRP? IPX Routing Protocols IP Routing Protocols AppleTalk Routing Protocol Enhanced IGRP IP Routing Protocols AppleTalk Routing Protocol IPX Routing Protocols

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 1b: The Transport Layer in the Internet January 17, 2006 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu 01/17/06

More information

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS 15.1 Computer room networks require very high data rates and usually are concerned with transfer of large blocks of data. 15.2 Backend LAN: Backend networks

More information

Network Working Group Request for Comments: 2236 Updates: 1112 November 1997 Category: Standards Track

Network Working Group Request for Comments: 2236 Updates: 1112 November 1997 Category: Standards Track Network Working Group W. Fenner Request for Comments: 2236 Xerox PARC Updates: 1112 November 1997 Category: Standards Track Internet Group Management Protocol, Version 2 Status of this Memo This document

More information

The Internet Protocol

The Internet Protocol The Internet Protocol Stefan D. Bruda Winter 2018 THE INTERNET PROTOCOL A (connectionless) network layer protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

Routing Strategies. Fixed Routing. Fixed Flooding Random Adaptive

Routing Strategies. Fixed Routing. Fixed Flooding Random Adaptive Routing Strategies Fixed Flooding Random Adaptive Fixed Routing Single permanent route for each source to destination pair Determine routes using a least cost algorithm Route fixed, at least until a change

More information

CPE 448 Exam #2 (50 pts) April Name Class: 448

CPE 448 Exam #2 (50 pts) April Name Class: 448 Name Class: 448 1) (5 pts) Draw the three way handshake used to establish a TCP connection. Show all SYN and ACK packets. Also show all sequence and acknowledgement numbers associated with the SYN and

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Configuring MLD. Overview. MLD versions. How MLDv1 operates. MLD querier election

Configuring MLD. Overview. MLD versions. How MLDv1 operates. MLD querier election Contents Configuring MLD 1 Overview 1 MLD versions 1 How MLDv1 operates 1 How MLDv2 operates 3 MLD message types 4 MLD SSM mapping 7 MLD proxying 8 Protocols and standards 9 MLD configuration task list

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

Flow control: Ensuring the source sending frames does not overflow the receiver

Flow control: Ensuring the source sending frames does not overflow the receiver Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis

More information

c. If the sum contains a zero, the receiver knows there has been an error.

c. If the sum contains a zero, the receiver knows there has been an error. ENSC-37 Fall 27 Assignment#3 Due Date 6 Oct. 27 Problem-:[4] UDP and TCP use s complement for their checksums. Suppose you have the following three 8-bit bytes:,, and. a. [6] What is the s complement of

More information

HY 335 Φροντιστήριο 8 ο

HY 335 Φροντιστήριο 8 ο HY 335 Φροντιστήριο 8 ο Χειμερινό Εξάμηνο 2009-2010 Παπακωνσταντίνου Άρτεμις artpap@csd.uoc.gr 4/12/2009 Roadmap IP: The Internet Protocol IPv4 Addressing Datagram Format Transporting a datagram from source

More information

Lecture 9: Internetworking

Lecture 9: Internetworking Lecture 9: Internetworking CSE 123: Computer Networks Alex C. Snoeren HW 2 due WEDNESDAY So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes,

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

A Previous Final Examination

A Previous Final Examination A Previous Final Examination December 1, 2003 Print Your Name: Read the following now. Write your name on all pages. You have 120 minutes to earn up to 180 points. For problems involving calculation, show

More information

CSCD 330 Network Programming

CSCD 330 Network Programming CSCD 330 Network Programming Lecture 10 Transport Layer Continued Spring 2018 Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Last Time.

More information

CSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS

CSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS CSE 47 Introduction to Computer Networks Roch Guérin Final Exam Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS 1. [10 points] Bob has been provided with the following pair of

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

Internet Group Management Protocol, Version 3 <draft-ietf-idmr-igmp-v3-07.txt> STATUS OF THIS MEMO

Internet Group Management Protocol, Version 3 <draft-ietf-idmr-igmp-v3-07.txt> STATUS OF THIS MEMO INTERNET-DRAFT Brad Cain, Mirror Image Internet Steve Deering, Cisco Systems Bill Fenner, AT&T Labs - Research Isidor Kouvelas, Cisco Systems Ajit Thyagarajan, Ericsson Expires September 2001 March 2001

More information

ECE 428 Internet Protocols (Network Layer: Layer 3)

ECE 428 Internet Protocols (Network Layer: Layer 3) ECE 428 Internet Protocols (Network Layer: Layer 3) 1 Done so far MAC protocols (with PHYsical layer) Transport bits from one node to another. Key element: Determine WHEN to transmit DLC protocol (running

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

Layered Network Architecture. CSC358 - Introduction to Computer Networks

Layered Network Architecture. CSC358 - Introduction to Computer Networks Layered Network Architecture Layered Network Architecture Question: How can we provide a reliable service on the top of a unreliable service? ARQ: Automatic Repeat Request Can be used in every layer TCP

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Chapter 3 Review Questions

Chapter 3 Review Questions Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications

More information

CS 421: Computer Networks SPRING MIDTERM I April 7, minutes

CS 421: Computer Networks SPRING MIDTERM I April 7, minutes CS 421: Computer Networks SPRING 24 MIDTERM I April 7, 24 12 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 1 msec one-way propagation delay. We want to transfer a file of size 8

More information

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class

COMPUTER NETWORK. Homework #2. Due Date: April 12, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #2 Due Date: April 12, 2017 in class Question 1 Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

CSE 473 Introduction to Computer Networks. Midterm Exam Review

CSE 473 Introduction to Computer Networks. Midterm Exam Review CSE 473 Introduction to Computer Networks Midterm Exam Review John DeHart 10/12/2015 1. (10 points). A user in Chicago, connected to the internet via a 100 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes)

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Congestion / Flow Control in TCP

Congestion / Flow Control in TCP Congestion and Flow Control in 1 Flow Control and Congestion Control Flow control Sender avoids overflow of receiver buffer Congestion control All senders avoid overflow of intermediate network buffers

More information

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer:

Comparison of ISO-OSI and TCP/IP Suit. Functions of Data Link Layer: Comparison of ISO-OSI and TCP/IP Suit Functions of Data Link Layer: 1. Frame generation ( Character Count, Character Stuffing, Bit Stuffing) 2. Error Processing (Parity(EVEN or ODD), Block Parity, Hamming

More information

Network Working Group. Category: Standards Track Juniper Networks J. Moy Sycamore Networks December 1999

Network Working Group. Category: Standards Track Juniper Networks J. Moy Sycamore Networks December 1999 Network Working Group Requests for Comments: 2740 Category: Standards Track R. Coltun Siara Systems D. Ferguson Juniper Networks J. Moy Sycamore Networks December 1999 OSPF for IPv6 Status of this Memo

More information

Last Lecture. Network Architecture: Layers. This Lecture. In the sending host (2) In the sending host

Last Lecture. Network Architecture: Layers. This Lecture. In the sending host (2) In the sending host Chapter 7.B and 7.C Architecture: Layers Prof. Dina Katabi Last Lecture We learned how to share the network infrastructure between many connections/flows We also learned about the implications of the sharing

More information

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging) Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2

More information

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the

More information