Chapter 4 Network Layer

Size: px
Start display at page:

Download "Chapter 4 Network Layer"

Transcription

1 Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato al libo Compute Netwoking: A Top Down Appoach, 5th edition. All mateial copyight J.F Kuose and K.W. Ross, All Rights Reseved Thanks also to Antonio Capone, Politecnico di Milano, Giuseppe Bianchi and Fancesco LoPesti, Un. di Roma To Vegata Netwok Laye 4-1

2 Pevious lectue. Summay: Distibuted Belman Fod Based on Distibuted Bellman Fod Equation Cost associated to the (X,Z) link X D (Y,Z) = = distance fom X to Y, via Z as next hop Z c(x,z) + min {D (Y,w)} w D x (Y,Z) ecomputed: Upon eception of updates fom the neighbos Upon link cost change min z D X (Y,Z) communicated to the neighbos wheneve its value changes, o peiodically Netwok Laye 4-2

3 Distance Vecto Routing: oveview Iteative, asynchonous: each local iteation caused by: local link cost change message fom neighbo: its least cost path change fom neighbo Distibuted: each node notifies neighbos only when its least cost path to any destination changes m neighbos then notify thei neighbos if necessay Each node: wait fo (change in local link cost of msg fom neighbo) ecompute distance table if least cost path to any dest has changed, notify neighbos Netwok Laye 4-3

4 Distibuted Bellman Fod coectness Completely asynchonous Stating fom abitay estimates of the cost of the best oute fom node i to the destination, if: m m m links weights ae constant fo enough time fo the potocol to convege stale info expie afte a while once in a while updated info ae sent fom a node to its neighbos the Distibuted Bellman Fod algoithm conveges, i.e. each node coectly estimates the cost of the best oute to the destination Netwok Laye 4-4

5 Bellman-Fod Given a gaph G=(N,A) and a node s finds the shotest path fom s to evey node in N. A shotest walk fom s to i subject to the constaint that the walk contains at most h acs and goes though node s only once, is denoted shotest(<=h) walk and its length is D h i. Bellman-Fod ule: Initiatilization D h s =0, fo all h; w i,k = infinity if (i,k) NOT in A; w k,k =0; D 0 i =infinity fo all i!=s. Iteation: D h+1 i =min k [w i,k + Dh k ] Assumption: non negative cycles (this is the case in a netwok!!) The Bellman-Fod algoithm fist finds the one-ac shotest walk lengths, then the two-ac shotest walk length, then the thee-ac etc. distibuted vesion used fo outing Netwok Laye 4-5

6 Pevious lectue. Summay: Distibuted Belman Fod Based on Distibuted Bellman Fod Equation X D (Y,Z) Cost associated to the (X,Z) link = = distance fom X to Y, via Z as next hop Z c(x,z) + min {D (Y,w)} w D x (Y,Z) ecomputed: Upon eception of updates fom the neighbos Upon link cost change min z D X (Y,Z) communicated to the neighbos wheneve its value changes, o peiodically How long does it take fo the algoithm to convege? good news tavel fast, bad news may not count to infinity Netwok Laye 4-6

7 Distance Vecto: link cost changes Subtitle: Distibuted Bellman Fod conveges but how fast? Link cost changes: node detects local link cost change updates distance table (line 15) if cost change in least cost path, notify neighbos (lines 23,24) 1 X 4 Y 50 1 Z good news tavels fast algoithm teminates Ydetects change infoms neighbos Z eceives update ppdates table, new least Cost infoms neighbos Y eceives new least cost; no modification in the outing table, Netwok Laye 4-7 No updates sent

8 Distance Vecto: link cost changes Link cost changes: good news tavels fast Y bad news tavels slow - count 4 1 to infinity poblem! X Z algoithm continues on! Y detects link cost Incease but think can Reach X though Z at a total cost of 6 (wong!!) The path is Y-Z-Y-X Netwok Laye 4-8

9 Count-to-infinity an eveyday life example Which is the poblem hee? the info exchanged by the potocol!! the best oute to X I have has the following cost (no additional info on the oute) A Roman example -assumption: thee is only one oute going fom Colosseo to Altae della Patia: Via dei Foi Impeiali. Let us now conside a netwok, whose nodes ae Colosseo., Altae della Patia, Piazza del Popolo Colosseo 1 Km 1 Km Altae Patia Piazza del Popolo Netwok Laye 4-9

10 Count-to-infinity eveyday life example (2/2) 1Km 1Km Colosseo Al.Patia P.Popolo The Colosseo. and Alt. Patia nodes exchange the following info Colosseo says the shotest oute fom me to P. Popolo is 2 Km Alt. Patia says the shotest path fom me to P. Popolo is 1Km Based on this exchange fom Colosseo you go to Al. Patia, and fom thee to Piazza del Popolo OK Now due to the big dig they close Via del Coso (Al. Patia P.Popolo) Al. Patia thinks I have to find anothe oute fom me to P.Popolo. Look thee is a oute fom Colosseo to P.Popolo that takes 2Km, I can be at Colosseo in 1Km I have found a 3Km oute fom me to P.Popolo!! Communicates the new cost to Colosseo that updates OK I can go to P.Popolo via Al. Patia in 4Km VERY WRONG!! Why is it so? I didn t know that the oute fom Colosseo to P.Popolo was going though Via del Coso fom Al.Patia to P.Popolo (which is closed)!! Netwok Laye 4-10

11 Distance Vecto: poisoned evese If Z outes though Y to get to X : Z tells Y its (Z s) distance to X is infinite (so Y won t oute to X via Z) will this completely solve count to infinity poblem? 60 X 4 Y 50 1 Z algoithm teminates Infinity is advetized by Y (poisoned evese) Netwok Laye 4-11

12 Split hoizon poison evese failue A C D B Line CD goes down 1) because of split hoizon ule, A and B tell C that dist(d)=inf 2) C concludes that D is uneachable and epots this to A and B 3) but A knows fom B that dist(d)=2, and sets its dist=3 4) similaly, B knows fom A distance fom D C estimates new value 4; A and B again though C estimate a value of 5.then again 1) etc until distance = infinite Regadless the hack used, thee is always a netwok topology that makes the tick fail! Netwok Laye 4-12

13 Compaison of LS and DV algoithms Message complexity LS: global exchange of infomation DV: exchange between neighbos only m convegence time vaies Speed of Convegence LS: O(n 2 ) algoithm m may have oscillations DV: convegence time vaies m may be outing loops m count-to-infinity poblem Robustness: what happens if oute malfunctions? LS: DV: m node can advetise incoect link cost m each node computes only its own table m DV node can advetise incoect path cost m each node s table used by othes eo popagate thu netwok Netwok Laye 4-13

14 Chapte 4: Netwok Laye 4. 1 Intoduction 4.5 Routing algoithms 4.2 Vitual cicuit and datagam netwoks 4.3 What s inside a oute 4.4 IP: Intenet Potocol m Datagam fomat m IPv4 addessing m ICMP m IPv6 m Link state m Distance Vecto m Hieachical outing 4.6 Routing in the Intenet m RIP m OSPF m BGP 4.7 Boadcast and multicast outing Netwok Laye 4-14

15 Hieachical Routing Ou outing study thus fa - idealization all outes identical netwok flat not tue in pactice scale: with 200 million destinations: can t stoe all dest s in outing tables! outing table exchange would swamp links! administative autonomy intenet = netwok of netwoks each netwok admin may want to contol outing in its own netwok Netwok Laye 4-15

16 Hieachical Routing aggegate outes into egions, autonomous systems (AS) outes in same AS un same outing potocol m inta-as outing potocol m outes in diffeent AS can un diffeent inta- AS outing potocol Gateway oute Diect link to oute in anothe AS Netwok Laye 4-16

17 Inteconnected ASes 3c 3a 3b AS3 1a 1c 1d 1b Inta-AS Routing algoithm AS1 Fowading table Inte-AS Routing algoithm 2a 2c AS2 2b fowading table configued by both inta- and inte-as outing algoithm m inta-as sets enties fo intenal dests m inte-as & inta-as sets enties fo extenal dests Netwok Laye 4-17

18 Inte-AS tasks suppose oute in AS1 eceives datagam destined outside of AS1: m oute should fowad packet to gateway oute, but which one? AS1 must: 1. lean which dests ae eachable though AS2, which though AS3 2. popagate this eachability info to all outes in AS1 Job of inte-as outing! 3c 3a 3b AS3 1a 1c 1d 1b AS1 2a 2c AS2 2b Netwok Laye 4-18

19 Example: Setting fowading table in oute 1d suppose AS1 leans (via inte-as potocol) that subnet x is eachable via AS3 (gateway 1c) but not via AS2. inte-as potocol popagates eachability info to all intenal outes. oute 1d detemines fom inta-as outing info that its inteface I is on the least cost path to 1c. m installs fowading table enty (x,i) 3c 3a 3b AS3 1a 1c 1d x 1b AS1 2a 2c 2b AS2 Netwok Laye 4-19

20 Example: Choosing among multiple ASes now suppose AS1 leans fom inte-as potocol that subnet x is eachable fom AS3 and fom AS2. to configue fowading table, oute 1d must detemine towads which gateway it should fowad packets fo dest x. m this is also job of inte-as outing potocol! 3c 3a 3b AS3 1a 1c 1d x 1b AS1 2a 2c AS2 2b Netwok Laye 4-20

21 Example: Choosing among multiple ASes now suppose AS1 leans fom inte-as potocol that subnet x is eachable fom AS3 and fom AS2. to configue fowading table, oute 1d must detemine towads which gateway it should fowad packets fo dest x. m this is also job of inte-as outing potocol! hot potato outing: send packet towads closest of two outes. Lean fom inte-as potocol that subnet x is eachable via multiple gateways Use outing info fom inta-as potocol to detemine costs of least-cost paths to each of the gateways Hot potato outing: Choose the gateway that has the smallest least cost Detemine fom fowading table the inteface I that leads to least-cost gateway. Ente (x,i) in fowading table Netwok Laye 4-21

22 Chapte 4: Netwok Laye 4. 1 Intoduction 4.5 Routing algoithms 4.2 Vitual cicuit and datagam netwoks 4.3 What s inside a oute 4.4 IP: Intenet Potocol m Datagam fomat m IPv4 addessing m ICMP m IPv6 m Link state m Distance Vecto m Hieachical outing 4.6 Routing in the Intenet m RIP m OSPF m BGP 4.7 Boadcast and multicast outing Netwok Laye 4-22

23 Inta-AS Routing also known as Inteio Gateway Potocols (IGP) most common Inta-AS outing potocols: m RIP: Routing Infomation Potocol m OSPF: Open Shotest Path Fist m IGRP: Inteio Gateway Routing Potocol (Cisco popietay) Netwok Laye 4-23

24 Chapte 4: Netwok Laye 4. 1 Intoduction 4.5 Routing algoithms 4.2 Vitual cicuit and datagam netwoks 4.3 What s inside a oute 4.4 IP: Intenet Potocol m Datagam fomat m IPv4 addessing m ICMP m IPv6 m Link state m Distance Vecto m Hieachical outing 4.6 Routing in the Intenet m RIP m OSPF m BGP 4.7 Boadcast and multicast outing Netwok Laye 4-24

25 RIP ( Routing Infomation Potocol) distance vecto algoithm included in BSD-UNIX Distibution in 1982 distance metic: # of hops (max = 15 hops) Fom oute A to subnets: z u A C B D v y w x destination hops u 1 v 2 w 2 x 3 y 3 z 2 Netwok Laye 4-25

26 RIP advetisements distance vectos: exchanged among neighbos evey 30 sec via Response Message (also called advetisement) each advetisement: list of up to 25 destination subnets within AS Netwok Laye 4-26

27 RIP: Example w x y A D B z Destination Netwok C Next Route Num. of hops to dest. w A 2 y B 2 z B 7 x Routing/Fowading table in D Netwok Laye 4-27

28 RIP: Example Dest Next hops w - 1 x - 1 z C Advetisement fom A to D w x y A D B z Destination Netwok C Next Route Num. of hops to dest. w A 2 y B 2 z B A 7 5 x Routing/Fowading table in D Netwok Laye 4-28

29 Diffeences wt Bellman Fod Since count to infinity not solved uppe bound on the netwok size Info on the cost of going though destination X though neighbo Z is maintained ONLY IF the path though Z is the cuent best (min cost) path m Diffeent way of updating costs Suppose cuent oute to dest has cost D and goes though G if an update aives fom X!=G then updates oute ONLY IF cost is <D if an update aives fom G always update oute cost PROBLEM: what if the oute we go though cashes? Route cost aging MUST be adopted Cost is maintained fo each subnetwok (athe than node) Peiodic exchange of messages Netwok Laye 4-29

30 The RIP algoithm (fom RFC) - Keep a table with an enty fo evey possible destination in the system. The enty contains the distance D to the destination, and the fist oute G on the oute to that netwok. Conceptually, thee should be an enty fo the entity itself, with metic 0, but this is not actually included. - Peiodically, send a outing update to evey neighbo. The update is a set of messages that contain all of the infomation fom the outing table. It contains an enty fo each destination, with the distance shown to that destination. - When a outing update aives fom a neighbo G', add the cost associated with the netwok that is shaed with G'. (This should be the netwok ove which the update aived.) Call the esulting distance D'. Compae the esulting distances with the cuent outing table enties. If the new distance D' fo N is smalle than the existing value D, adopt the new oute. That is, change the table enty fo N to have metic D' and oute G'. If G' is the oute fom which the existing oute came, i.e., G' = G, then use the new metic even if it is lage than the old one. Netwok Laye 4-30

31 RIP: Link Failue and Recovey If no advetisement head afte 180 sec --> neighbo/link declaed dead m outes via neighbo invalidated m new advetisements sent to neighbos m neighbos in tun send out new advetisements (if tables changed) m link failue info quickly (?) popagates to entie net m poison evese used to pevent ping-pong loops (infinite distance = 16 hops) Netwok Laye 4-31

32 Diffeences with Bellman Fod Split Hoizon m with Poison Revese m Simple split hoizon (omits cost of eaching destination when advetising though the oute it goes though) Clea implementation with point to point links. But conside the possibility that A and C ae connected by a boadcast netwok such as an Ethenet, and thee ae othe outes on that netwok. Is it a poblem? m If A has a oute though C, it should indicate that D is uneachable when talking to any othe oute on that netwok. The othe outes on the netwok can get to C themselves. They would neve need to get to C via A. m If A's best oute is eally though C, no othe oute on that netwok needs to know that A can each D. This is fotunate, because it means that the same update message that is used fo C can be used fo all othe outes on the same netwok. Thus, update messages can be sent by boadcast. Netwok Laye 4-32

33 An additional way to speed up convegence Tiggeed updates m Wheneve a oute changes the metic fo a oute it is equied to send update messages almost immediately must be implemented fo deleted outes Netwok Laye 4-33

34 RIP Table pocessing RIP outing tables managed by application-level pocess called oute-d (daemon) m pot numbe 520 advetisements sent in UDP packets, peiodically epeated outed outed Tanspt (UDP) netwok fowading (IP) table link physical fowading table Tanspt (UDP) netwok (IP) link physical Netwok Laye 4-34

35 Packet fomat Netwok Laye 4-35

# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapte 3 Tanspot Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Shortest Paths Algorithms and the Internet: The Distributed Bellman Ford Lecturer: Prof. Chiara Petrioli

Shortest Paths Algorithms and the Internet: The Distributed Bellman Ford Lecturer: Prof. Chiara Petrioli Shortest Paths Algorithms and the Internet: The Distributed Bellman Ford Lecturer: Prof. Chiara Petrioli Dipartimento di Informatica Rome University La Sapienza G205: Fundamentals of Computer Engineering

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Chapter IV: Network Layer

Chapter IV: Network Layer Chapter IV: Network Layer UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross Hierarchical routing our routing study thus far - idealization

More information

Chapter 4: Network Layer, partb

Chapter 4: Network Layer, partb Chapter 4: Network Layer, partb The slides are adaptations of the slides available by the main textbook authors, Kurose&Ross Network Layer 4-1 Interplay between routing, forwarding routing algorithm local

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Internet rou)ng V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Slide material copyright 1996-2013 J.F Kurose and K.W. Ross, All Rights Reserved Graph abstraction 5 graph: G

More information

Internet Protocol: Routing Algorithms. Srinidhi Varadarajan

Internet Protocol: Routing Algorithms. Srinidhi Varadarajan Internet Protocol: Routing Algorithms Srinidhi Varadarajan Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction for routing algorithms:

More information

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 14, 2013 1 Reading Quiz Hierarchical routing Our routing study thus far - idealization all routers identical network flat

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4.5 Routing algorithms

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Chapter 4: outline. Network Layer 4-1

Chapter 4: outline. Network Layer 4-1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link

More information

Chapter 4: Network Layer. Lecture 12 Internet Routing Protocols. Chapter goals: understand principles behind network layer services:

Chapter 4: Network Layer. Lecture 12 Internet Routing Protocols. Chapter goals: understand principles behind network layer services: NET 331 Computer Networks Lecture 12 Internet Routing Protocols Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth Edition by Kurose and Ross, (c) Pearson Education

More information

Agenda. distance-vector (what you invented last Friday) hierarchical routing routing in the Internet. v DNS assignment Q&A v Routing Algorithms

Agenda. distance-vector (what you invented last Friday) hierarchical routing routing in the Internet. v DNS assignment Q&A v Routing Algorithms Agenda v DNS assignment Q&A v Routing Algorithms distance-vector (what ou invented last Frida) hierarchical routing routing in the Internet Network Laer 4- Chapter 4 Network Laer A note on the use of these

More information

CSc 450/550 Computer Networks Internet Routing

CSc 450/550 Computer Networks Internet Routing CSc 450/550 Computer Networks Internet Routing Jianping Pan Summer 2007 7/12/07 CSc 450/550 1 Review Internet Protocol (IP) IP header addressing class-based, classless, hierarchical, NAT routing algorithms

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.15 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2018 CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007

More information

CSC 4900 Computer Networks: Routing Algorithms

CSC 4900 Computer Networks: Routing Algorithms CSC 4900 Computer Networks: Routing Algorithms Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Network Layer: Routing

Network Layer: Routing Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring

More information

Network Layer: Routing. Routing. Routing protocol. Graph abstraction for routing algorithms: graph nodes are routers graph edges are physical links

Network Layer: Routing. Routing. Routing protocol. Graph abstraction for routing algorithms: graph nodes are routers graph edges are physical links Network Layer: Routing A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Routing. Outline. Algorithms Scalability

Routing. Outline. Algorithms Scalability Routing Outline Algorithms Scalability 1 Internetworking What is internetwork An arbitrary collection of networks interconnected to provide some sort of host-host to packet delivery service A simple internetwork

More information

Chapter 4 Network Layer. Network Layer 4-1

Chapter 4 Network Layer. Network Layer 4-1 Chapter 4 Network Layer Network Layer 4- Chapter 4: Network Layer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016 9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:

More information

! "# $ $ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1

! # $ $ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:

More information

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP

More information

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet Chapter 5: outline 5.1 introduction 5.5 The SDN control 5.2 routing protocols plane link state 5.6 ICMP: The Internet distance vector Control Message 5.3 intra-as routing in Protocol the Internet t 5.7

More information

Inter-AS routing and BGP. Network Layer 4-1

Inter-AS routing and BGP. Network Layer 4-1 Inter-AS routing and BGP Network Layer 4-1 Review: intra-as routing v Also known as interior gateway protocols (IGP) v Most common intra-as routing protocols: RIP: Routing Information Protocol, distance

More information

In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions.

In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. In ode to lean which questions have been answeed coectly: 1. Pint these pages. 2. Answe the questions. 3. Send this assessment with the answes via: a. FAX to (212) 967-3498. O b. Mail the answes to the

More information

CMPE 80N: Introduction to Networking and the Internet. Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 20

CMPE 80N: Introduction to Networking and the Internet. Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 20 CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 0 Announcements Final exam: June 7 th at 4pm. Comprehensive. Photo id required.

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

Announcements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes.

Announcements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes. Announcements CS 6 Network Architecture and Protocols Lecture 20 Project 2B Part/ due Wed Apr 27 :9pm Part/2 due Wed Ma :9pm Current reading assignment: Chapter.6.7, Chapter Final Ma 0, 3:2pm, MCB 26 Godmar

More information

Routing Unicast routing protocols

Routing Unicast routing protocols Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in

More information

CSC 8560 Computer Networks: Control Plane

CSC 8560 Computer Networks: Control Plane CSC 8560 Computer Networks: Control Plane Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:

More information

Network layer: Overview. Network layer functions Routing IP Forwarding

Network layer: Overview. Network layer functions Routing IP Forwarding Network layer: Overview Network layer functions Routing IP Forwarding Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

Routing. Jens A Andersson Communication Systems

Routing. Jens A Andersson Communication Systems Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data

More information

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

CS555, Spring /5/2005. April 12, 2005 No classes attend Senior Design Projects conference. Chapter 4 roadmap. Internet AS Hierarchy

CS555, Spring /5/2005. April 12, 2005 No classes attend Senior Design Projects conference. Chapter 4 roadmap. Internet AS Hierarchy CS555, Spring 2005 April 12, 2005 No classes attend Senior Design Projects conference Network Layer 4-1 Chapter 4 roadmap 4.1 Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Layer Chapter goals: understand principles behind layer services: routing (path selection) dealing with scale how a router works advanced topics: IPv6, mobility instantiation and implementation

More information

Interplay between routing, forwarding

Interplay between routing, forwarding Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state

More information

Chapter 4: Network Layer: Part II

Chapter 4: Network Layer: Part II 4: Network Laer Chapter 4: Network Laer: Part II (last revision 9/04/05. v3) 4. Introduction 4. Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce

More information

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc - CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish

More information

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

COMP211 Chapter 5 Network Layer: The Control Plane

COMP211 Chapter 5 Network Layer: The Control Plane COMP211 Chapter 5 Network Layer: The Control Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith

More information

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 6 Network Architecture and Protocols Lecture 8 Godmar Back Project A due Apr 8 (toda) Project B due in parts: Apr 9 and Ma 6 See link to NY Times article on RFC Project B Project B Highlevel

More information

IS-IS Protocol Hardware Implementation for VPN Solutions

IS-IS Protocol Hardware Implementation for VPN Solutions IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box

More information

EE 122: Intra-domain routing

EE 122: Intra-domain routing EE : Intra-domain routing Ion Stoica September 0, 00 (* this presentation is based on the on-line slides of J. Kurose & K. Rose) Internet Routing Internet organized as a two level hierarchy First level

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

Lecture 9. Network Layer (cont d) Network Layer 1-1

Lecture 9. Network Layer (cont d) Network Layer 1-1 Lecture 9 Network Layer (cont d) Network Layer 1-1 Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link

More information

Routing in the Internet

Routing in the Internet Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Computer Networks. Instructor: Niklas Carlsson

Computer Networks. Instructor: Niklas Carlsson Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived Computer Networking: A Top Down Approach, b Jim Kurose and Keith Ross, Addison-Wesle. The slides are adapted and

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Computer Networks II. RIP Routing Information Protocol. Dipartimento di Informatica e Sistemistica

Computer Networks II. RIP Routing Information Protocol. Dipartimento di Informatica e Sistemistica Dipartimento di Informatica e Sistemistica Computer Networks II RIP Routing Information Protocol Luca Becchetti Luca.Becchetti@dis.uniroma1.it A.A. 2009/2010 RIP RIP is a Distance Vector Routing Protocol

More information

(Refer Slide Time: 01:08 to 01:25min)

(Refer Slide Time: 01:08 to 01:25min) COMPUTER NETWORKS Prof. Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture-27 RIP- Distance Vector Routing We have seen basic routing. Now we will

More information

Chapter 4: Network Layer. TDTS06 Computer networks. Subnets. Subnets. Subnets. IP Addressing: introduction

Chapter 4: Network Layer. TDTS06 Computer networks. Subnets. Subnets. Subnets. IP Addressing: introduction hapter 4: Network Layer TDTS06 omputer s Lecture 6: Network layer III Routing in the Internet Jose M. Peña, jospe@ida.liu.se ID/DIT, LiU 2009-09-16 4. 1 Introduction 4.2 Virtual circuit and datagram s

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Lecture 12. Introduction to IP Routing. Why introduction? Routing

Lecture 12. Introduction to IP Routing. Why introduction? Routing Lecture. Introduction to IP Routing Why introduction? Routing: very complex issue need in-depth study entire books on routing our scope: give a flavour of basic routing structure and messaging give an

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

TDC 363 Introduction to LANs

TDC 363 Introduction to LANs TDC 363 Introduction to LANs Routing Protocols and RIP Greg Brewster DePaul University TDC 363 1 Dynamic Routing Routing Protocols Distance Vector vs. Link State Protocols RIPv1 & RIPv2 RIP Problems Slow

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

Dynamic Routing. The Protocols

Dynamic Routing. The Protocols Dynamic Routing The Protocols Desirable Characteristics of Dynamic Routing Automatically detect and adapt to topology changes Provide optimal routing Scalability Robustness Simplicity Rapid convergence

More information

Lecture 4. The Network Layer (cont d)

Lecture 4. The Network Layer (cont d) Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 40 Data and Computer Communications Networks Network Layer NAT, Routing, Link State, Distance Vector Prof. Lina Battestilli Fall 07 Chapter 4 Outline Network Layer: Data Plane 4. Overview of Network

More information

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues Review: Routing in Packet Networks Shortest Path lgorithms: ijkstra s & ellman-ford Routing: Issues How are routing tables determined? Who determines table entries? What info used in determining table

More information

Introduction To Pipelining. Chapter Pipelining1 1

Introduction To Pipelining. Chapter Pipelining1 1 Intoduction To Pipelining Chapte 6.1 - Pipelining1 1 Mooe s Law Mooe s Law says that the numbe of pocessos on a chip doubles about evey 18 months. Given the data on the following two slides, is this tue?

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information