Information Network Systems The network layer. Stephan Sigg
|
|
- Homer Marshall
- 5 years ago
- Views:
Transcription
1 Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012
2 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order Reed-Muller code is formed by using as a basis the vectors v0, v 1,..., v m and all vector products of r or fewer of these vectors The 11 information symbols are denoted by a 0, a 4, a 3, a 2, a 1, a 43, a 42, a 41, a 32, a 31, a 21 The codevector is then Example for m = 4, r = 2: v0 = v4 = v3 = v2 = v1 = v4 v3 = v4 v2 = v4 v1 = v3 v2 = a 0 v0 + a 4 v4 + a 3 v3 + a 2 v2 + a 1 v1 + a 43 v4 v3 + a 42 v4 v2 + a 41 v4 v1 + a 32 v3 v2 + a 31 v3 v1 + a 21 v2 v1 = (b 1, b 2,..., b n) v3 v1 = v2 v1 = Stephan Sigg Information Network Systems 2
3 Error-detection and correction Decoding of Reed-Muller codes Assume a second Task order Error (16, 11) correction code for m = 4. Demonstrate the encoding, error correction and The r-th order decoding Reed-Muller withcode Reed-Muller is formed codes Example for m = 4, r = 2: by using as a basis the vectors v0, v 1,..., Encode a data sequence and specify the v m and all vector products of r or fewer of theseencoded vectors sequence The 11 information Induce symbols an are error denoted into the by encoded sequence Show how the error can be detected and a 0, a 4, a 3, a 2, a 1, a 43, a 42, a 41, a 32, a 31, a 21 corrected while decoding the information The codevector is then a 0 v0 + a 4 v4 + a 3 v3 + a 2 v2 + a 1 v1 + a 43 v4 v3 + a 42 v4 v2 + a 41 v4 v1 + a 32 v3 v2 + a 31 v3 v1 + a 21 v2 v1 = (b 1, b 2,..., b n) v0 = v4 = v3 = v2 = v1 = v4 v3 = v4 v2 = v4 v1 = v3 v2 = v3 v1 = v2 v1 = Stephan Sigg Information Network Systems 2
4 Introduction Introduction to the internet The link layer (1) The link layer (2) The network layer The transport layer The application layer Network management Security and cryptography Wireless and Mobile Networks (1) Wireless and Mobile Networks (2) Multimedia networking (1) Multimedia networking (2) Security in computer networks Content centric networking Stephan Sigg Information Network Systems 3
5 The network layer The Internet Protocol (IP) Introduction Application Transport Network Link Physical Stephan Sigg Information Network Systems 4 Routing Algorithms
6 Introduction Stephan Sigg Information Network Systems 5
7 Outline The network layer The Internet Protocol (IP) Routing Algorithms Stephan Sigg Information Network Systems 6
8 The network layer The role of the network layer is to move packets from a sending host to a receiving host The two important network functions to achieve this are Forwarding Every router has a forwarding table. The router moves an arriving packet to the appropriate output link as specified by the forwarding table. Routing The network layer must determine the route a packet shall take from source to destination. Such path is determined by a routing algorithm and impacts the contents of forwarding tables. Stephan Sigg Information Network Systems 7
9 The network layer Forwarding and Routing Stephan Sigg Information Network Systems 8
10 The network layer Link-layer switches and Routers We distinguish link-layer switches and Routers Link-layer switch Bases its decision on values in the fields of the link-layer frame Routers Base their forwarding decision on the value in the network-layer field. Stephan Sigg Information Network Systems 9
11 The network layer Network layer services The network service model defines the characteristics of end-to-end packet transport Possible services the network layer could provide: Guaranteed delivery Packets will eventually arrive at destination In-order packet delivery Packets will arrive in order sent Guaranteed minimal bandwidth Data arrives at least at a minimal bandwidth Guaranteed maximum jitter The time offset between packets should be similar at the transmitter and receiver Security services For instance, encryption of data between source and destination Stephan Sigg Information Network Systems 10
12 The network layer Network layer services Network architecture Service model Bandwidth Guarantee No-Loss Guarantee Internet Best Effort None None Ordering Any order possible Timing Not maintained Congestion indication None ATM CBR Guaranteed constant rate Yes In order Maintained Congestion will not occur ATM ABR Guaranteed minimum None In order Not maintained Congestion indication provided Stephan Sigg Information Network Systems 11
13 The network layer Network layer services Constant bit rate (CBR) ATM network service Anticipated for its capability to carry real-time, constant bit-rate audio and video traffic Guaranteed threshold for end-to-end delay jitter fraction of lost packets These thresholds are defined between the sending host and the ATM network when the CBR connection is first established Stephan Sigg Information Network Systems 12
14 The network layer Network layer services Available bit rate (ABR) ATM network service Slightly better than best-effort service Packets may be lost under ABR service Unlike in the Internet, packets can not be reordered Minimum packet transmission rate is guaranteed Can provide feedback to the sender (e.g. congestion notification bit or explicit rate at which to send) to help the sender to adapt its transmission rate Stephan Sigg Information Network Systems 13
15 Outline The network layer The Internet Protocol (IP) Routing Algorithms Stephan Sigg Information Network Systems 14
16 Routing in the network layer is conducted by the Internet Protocol (IP) Currently, we are within the process of traversing from the previous IP protocol (IPv4) to the new standard (IPv6) The IP protocol defines Addressing conventions Datagram format Packet handling Stephan Sigg Information Network Systems 15
17 The IPv4 protocol The IPv4 datagram contains 13 key fields Stephan Sigg Information Network Systems 16
18 The IPv4 protocol Version number (4 bits) Specify IP protocol version Helps the router to correctly interpret a received datagram Stephan Sigg Information Network Systems 17
19 The IPv4 protocol Header length (4 bits) Since datagram can contain variable number of options, this field specifies when the data begins Without options (most common) an IPv4 datagram header is 20 bytes long Stephan Sigg Information Network Systems 18
20 The IPv4 protocol Type of service (8 bits) specifies different types of IP datagrams (low delay, high throughput, reliability) Stephan Sigg Information Network Systems 19
21 The IPv4 protocol Datagram length (16 bits) Total length of the IP datagram (header plus data) measured in bytes Theoretical maximum size of IP datagram is bytes but datagrams are rarely larger than 1500 bytes Stephan Sigg Information Network Systems 20
22 The IPv4 protocol Identifier, flags, fragmentation offset ( bits) Information for IP fragmentation No longer included in IPv6 Stephan Sigg Information Network Systems 21
23 The IPv4 protocol Time-to-live (TTL) (8 bits) Ensures that datagrams do not circulate forever Decremented by one each time the datagram is processed by a router If the TTL field reaches 0, the datagram is dropped Stephan Sigg Information Network Systems 22
24 The IPv4 protocol Protocol (8 bits) Used only when datagram reaches its final destination Indicates the specific transport-layer protocol to which it should be passed Stephan Sigg Information Network Systems 23
25 The IPv4 protocol Header checksum (16 bits) Checksum to detect bit errors in a received datagram header (only the header! TCP/UDP checksum for entire segment) Computed by treating each 2 bytes in the header as a number and summing these numbers using 1s complement If an error is detected, the datagram is typically discarded Stephan Sigg Information Network Systems 24
26 The IPv4 protocol Source and destination IP addresses (32 bits each) Addresses of source and destination hosts Utilised for forwarding and routing through a network Stephan Sigg Information Network Systems 25
27 The IPv4 protocol options (variable length) Enable the specification of specific options Rarely used and merely add overhead to the processing of an IP packet Not included in IPv6 Stephan Sigg Information Network Systems 26
28 The IPv4 protocol Data (payload) (variable length) Contains the data to be transmitted Most often this field contains the transport-layer segment (TCP or UDP) Can also carry other kinds of messages such as ICMP Stephan Sigg Information Network Systems 27
29 IP datagram fragmentation The size of datagrams that can be carried (Maximum Transmission Unit (MTU)) by link-layer protocols differs larger datagrams are therefore fragmented into smaller ones Stephan Sigg Information Network Systems 28
30 IP datagram fragmentation In IPv4 datagrams are splitted at routers when necessary but reassembly is done at the receiving end Identification, Flag and fragmentation offset filds in the IP datagram to reassemble datagrams in the correct order All fragmented datagram share the identification number with the original datagram The offset field specifies the position in the set of fragments The binary flag field is 1 for all fragments short of the last Stephan Sigg Information Network Systems 29
31 IP datagram fragmentation Stephan Sigg Information Network Systems 30
32 IPv4 addressing IPv4 are 32 bits (4 bytes) long billion possible IP addresses Dotted-decimal notion (each byte written in decimal form separated by period (dot): Binary notation: Stephan Sigg Information Network Systems 31
33 Classless Interdomain Routing (CIDR) Router interfaces may form a subnet as e.g /24 The term /24 is the subnet mask Defines the leftmost 24 bits to be the subnet address All nodes in this subnet share this subnet address Used since Before: Classful addressing with Class A (/8), B (/16) and C (/24) networks only Stephan Sigg Information Network Systems 32
34 Classless Interdomain Routing (CIDR) Notation Addresses Subnetmask decimal Subnetmask binary / / / / / / / / / / / / / / / / / / / / / / / / / Stephan Sigg Information Network Systems 33
35 Obtaining IP addresses IP addresses are managed by the Internet Corporation for Assigned Names and Numbers (ICANN) Allocates IP addresses to Internet Service Providers (ISP) Nonprofit organisation Also manages the DNS root servers Stephan Sigg Information Network Systems 34
36 Dynamic Host Configuration Protocol (DHCP) IP addresses are most often assigned automatically in a network DHCP provides IP address, subnet mask, address of first-hop router (default gateway) and address of local DNS server Stephan Sigg Information Network Systems 35
37 Dynamic Host Configuration Protocol (DHCP) Stephan Sigg Information Network Systems 36
38 Dynamic Host Configuration Protocol (DHCP) Four steps to obtain an IP address 1. DHCP server discovery 2. DHCP server offer 3. DHCP request 4. DHCP ACK Stephan Sigg Information Network Systems 37
39 DHCP server discovery DHCP discover message sent as UDP packet to port 67 Encapsulated in IP datagram to the broadcast address Source IP address set to Stephan Sigg Information Network Systems 38
40 DHCP server offer DHCP server responds with a DHCP offer message Broadcast to all nodes ( ) in an IP datagram Contains transaction ID, received discover message, proposed IP address, network mask and a lease time Lease time specifies the amount of time for which the IP address is valid Stephan Sigg Information Network Systems 39
41 DHCP request Client chooses among one or more server offers and responds to the selected offer with a DHCP request message Message contains the proposed configuration parameters Stephan Sigg Information Network Systems 40
42 DHCP ACK Server responds and confirms parameter by sending a DHCP ACK message Stephan Sigg Information Network Systems 41
43 Support of mobility In increasingly mobile networks, the approach of DHCP does have shortcomings In particular, a mobile node traversing among several subnets would have to request a new IP each time it enters a subnet At this occasion, ongoing transport layer connections typically have to be dropped. A possible solution can be provided by mobileip (considered later in the lecture) Stephan Sigg Information Network Systems 42
44 Network Address Translation (NAT) A local network behind a router does not have to request an IP address for each computer from the ISP or ICANN The network address translation (NAT) approach provides a solution that separates the local network from the internet Distinction between local computers via ports (>60000 available) Stephan Sigg Information Network Systems 43
45 Network Address Translation (NAT) Stephan Sigg Information Network Systems 44
46 Problems of NAT In the first place, NAT is a hack that is not fully compatible with the IP address structure NAT interferes with P2P applications (VoIP, file sharing) P2P applications require all hosts to become servers, effectively establishing TCP connections among each other Applications that send IP addresses or port numbers hidden within their data packets do not work with NAT Stephan Sigg Information Network Systems 45
47 Solution to NAT related problems As a solution, the application could use an address server which is not behind any NAT Hosts connect to this server first, sending the IP address they think they have The server notes the actual address received and the address the host believes to have The server then sends both addresses all peers to inform them of the mapping between actual and NAT address Stephan Sigg Information Network Systems 46
48 The Internet Control Message Protocol (ICMP) ICMP is used to communicate network-layer information Encapsulated in an IP packet Also utilised by some application programs (ping, traceroute) Stephan Sigg Information Network Systems 47
49 The Internet Control Message Protocol (ICMP) ICMP type Code Description 0 0 echo reply (to ping) 3 0 destination network unreachable 3 1 destination host unreachable 3 2 destination protocol unreachable 3 3 destination port unreachable 3 4 destination network unknown 4 0 source quench (congestion control) 8 0 echo request 9 0 router advertisement 10 0 router discovery 11 0 TTL expired 12 0 IP header bad Stephan Sigg Information Network Systems 48
50 Traceroute and its utilisation of the ICMP Sends a series of ordinary IP datagrams to the destination Each carries a UDP segment with an unlikely UDP port number TTL of these datagrams is increased from 1 Source starts timer for each datagram n-th router replies ICMP message (TTL expired); Incl. name and IP With this, source records round-trip time of the n-th packet Destination replies port unreachable ICMP message (unlikely port) Stephan Sigg Information Network Systems 49
51 IPv6 Development started in early 1990s by the Internet Engineering Task Force Reason: IP address space was beginning to be used up Also, some improvements above IPv4 Europe s Third Generation Partnership Program (3GPP) has specified IPv6 as the standard addressing scheme for mobile multimedia Estimates in 1996 predicted that addresses would become exhausted between 2008 and 2018 Stephan Sigg Information Network Systems 50
52 IPv6 IP address space is managed by the Internet Assigned Numbers Authority (IANA) globally Additinally, five regional Internet registries (RIR) are responsible for this management Stephan Sigg Information Network Systems 51
53 IPv IANA unallocated address pool exhaustion APNIC unallocated address pool exhaustion Stephan Sigg Information Network Systems 52
54 IPv6 datagram format IPv6 header simpler, more streamlined Stephan Sigg Information Network Systems 53
55 IPv6 datagram Most important changes Expanded addressing capabilities 128 bit addresses (every grain of sand could obtain an IP address) Streamlined 40 byte header Possible since some IPv4 fields have been dropped Flow labelling and priority Sender may request specific handling (QoS) for packets belonging to a specific flow Stephan Sigg Information Network Systems 54
56 IPv6 datagram fields Version (4 bit) Describes the IP version Traffic class (8 bit) Similar to Type of service field in IPv4 Stephan Sigg Information Network Systems 55
57 IPv6 datagram fields Flow label (20 bit) Identify flow of datagrams and their QoS and handling IPv6 can label packets as belonging to a particular flow Special handling of flows For instance, audio and video transmission Stephan Sigg Information Network Systems 56
58 IPv6 datagram fields Payload length (16 bit) Number of bytes in the datagram following the fixed-length 40 byte header Stephan Sigg Information Network Systems 57
59 IPv6 datagram fields Next header (8 bit) Identifies the protocol to deliver the data contents to in the transport layer (cf. protocol field in IPv4) Hop limit (8 bit) Similar to TTL in IPv4 Stephan Sigg Information Network Systems 58
60 IPv6 datagram fields Source and destination addresses (128 bit each) 128 bit source and destination addresses data (variable length) Payload Stephan Sigg Information Network Systems 59
61 IPv6 datagram removed fields Fragmentation/Reassembly IPv6 does not allow fragmentation at routers. Fragmentation only at source nodes. Retransmission if packet too big (new ICMP error message Packet too big ) Header checksum Removed for redundancy. Checksum already in transport layer and link layer Options Now one of the possible next headers pointed to from within the IPv6 header Stephan Sigg Information Network Systems 60
62 Transition from IPv4 to IPv6 Dual-stack Might force IPv6 nodes to use IPv4 Stephan Sigg Information Network Systems 61
63 Transition from IPv4 to IPv6 Tunneling Stephan Sigg Information Network Systems 62
64 Outline The network layer The Internet Protocol (IP) Routing Algorithms Stephan Sigg Information Network Systems 63
65 Routing algorithms To generate forwarding tables in routers, routing algorithms are applied Today, there are two basic algorithms applied in the internet Centralised Link state algorithms (e.g. Dijkstra) Distributed Distance Vector algorithms Routing problem defined by edge-weighted graph G = (N, E) Stephan Sigg Information Network Systems 64
66 Routing algorithms Dijkstra a centralised link state algorithm 1. Assign a distance cost D( ) = to all nodes short of a source node u with D(u) = As long as nodes v with D(v) = exist, choose from these the node v with minimum edge cost c(x, v) to any node x with D(x) <, set D(v) = D(x) + c(x, v) and update for all neighbours w of v the value D(w) = min (D(w), D(v) + c(v, w)) Stephan Sigg Information Network Systems 65
67 Routing algorithms Dijkstra a centralised link state algorithm The Dijkstra algorithm solves the problem of finding shortest paths between a source node u and all other nodes in time O(n 2 ) The algorithm is centralised in a sense that it requires the cost of all edges in the network Stephan Sigg Information Network Systems 66
68 Routing algorithms Distance vector routing a decentralised algorithm Observe that for any least-cost path d x (y) from x to y, the least cost can be described by d x (y) = min v (c(x, v) + d v (y)) (1) 1. Each node u assigns a distance cost D( ) = to all nodes short of itself with D(u) = 0. These costs are maintained in a distance vector DV u by each node. 2. For each of its neighbours w, a node u sets D(w) = c(u, w) 3. From time to time, each node u sends DV u to all its neighbours w 4. At receiving DV w, a node u updates its DV u according to equation (1) Stephan Sigg Information Network Systems 67
69 Routing algorithms Distance vector routing a decentralised algorithm Distance vector routing is a decentralised approach since only local information is required It is robust against unavailable links and dying nodes The algorithm is slower than Dijkstra Stephan Sigg Information Network Systems 68
70 Routing algorithms Task Routing algorithms For the given network, calculate the shortest paths with the Dijkstra and the distant vector algorithm and report your results. Stephan Sigg Information Network Systems 69
71 Outline The network layer The Internet Protocol (IP) Routing Algorithms Stephan Sigg Information Network Systems 70
72 The network layer The Internet Protocol (IP) Conclusion Comoputer Networking A Top-Down Approach J.F. Kurose and K.W. Ross 6th edition, 2012 Pearson study Addison-Wesley ISBN: Stephan Sigg Information Network Systems 71 Routing Algorithms
73 Conclusion Do you have any questions? Stephan Sigg Stephan Sigg Information Network Systems 72
CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer
1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationInternet Technology 3/23/2016
Internet Technology // Network Layer Transport Layer (Layer ) Application-to-application communication Internet Technology Network Layer (Layer ) Host-to-host communication. Network Layer Route Router
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationLecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen
Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network
More informationIPv4. Christian Grothoff.
IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving
More informationEC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane
EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:
More informationNetwork Layer: Internet Protocol
Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by
More informationCSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough
CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationCS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018
CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing
More informationIPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationComputer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage
More informationSubnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction
The Network layer Host, network layer functions: Network layer Routing protocols path selection R, OSPF, BGP Transport layer: TCP, forwarding table Link layer physical layer protocol addressing conventions
More informationChapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach
Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,
More informationChapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP
Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state
More informationHY 335 Φροντιστήριο 8 ο
HY 335 Φροντιστήριο 8 ο Χειμερινό Εξάμηνο 2009-2010 Παπακωνσταντίνου Άρτεμις artpap@csd.uoc.gr 4/12/2009 Roadmap IP: The Internet Protocol IPv4 Addressing Datagram Format Transporting a datagram from source
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationIP - The Internet Protocol
IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:
More informationLecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationChapter 4 Network Layer
Chapter 4 Network Layer Computer Networking A Top-Down Approach These slides are based on the slides made available by Kurose and Ross. All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13
CMPE 50/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3 Lab3 online Due March 4 th. Introduction -2 IP addresses: how to get one? Q: how does network
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationChapter 4 Network Layer
Chapter 4 Network Layer CPSC 335 Data Communication Systems Readings: 4.4.3, 4.4.4, 4.5, 4.5.1 David Nguyen Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March
More informationTDTS06: computer Networks
TDTS06: computer Networks Lecturer: Johannes Schmidt The slides are taken from the book s companion Web site with few modifications: Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationTSIN02 - Internetworking
Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4
More informationNetwork layer: Overview. Network Layer Functions
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationLecture 16: Network Layer Overview, Internet Protocol
Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationDepartment of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri
Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions
More informationLecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model
Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.
More informationCSCE 463/612 Networks and Distributed Processing Spring 2017
CSCE 46/6 Networks and Distributed Processing Spring 07 Network Layer III Dmitri Loguinov Texas A&M University April, 07 Original slides copyright 996-004 J.F Kurose and K.W. Ross Homework #4 Grading Default
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationΔίκτυα Υπολογιστών ΙΙ. Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων
Δίκτυα Υπολογιστών ΙΙ Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων Course information introductory course in computer networking course materials: text:
More informationLecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1
Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationNetworking Potpourri: Plug-n-Play, Next Gen
Networking Potpourri: Plug-n-Play, Next Gen 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia
More informationCSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca
CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer II Dmitri Loguinov Texas A&M University April 3, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter 4:
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationData Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer
Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science
More informationTSIN02 - Internetworking
Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationHierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy
Hierarchical Routing Our routing study thus far - idealization all routers identical network flat no true in practice scale: with 50 million destinations: can t store all dest s in routing tables! routing
More informationCSEP 561 Internetworking. David Wetherall
CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationInternetworking Part 2
CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationCS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).
Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationNetwork Layer (4): ICMP
1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet
More informationCSCD 330 Network Programming Spring 2018
CSCD 330 Network Programming Spring 2018 Lecture 14 Network Layer IP Addressing Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 2017 Network
More informationCS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)
: Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationCOMP211 Chapter 4 Network Layer: The Data Plane
COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross
More informationChapter 4: network layer
Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,
More informationNetwork layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical
Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport layer network layer protocols in every
More informationRef: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on
IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the
More informationThe Network Layer Forwarding Tables and Switching Fabric
The Network Layer Forwarding Tables and Switching Fabric Smith College, CSC 249 February 27, 2018 1 Network Layer Overview q Network layer services v v Desired services and tasks Actual services and tasks
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationECE 158A: Lecture 7. Fall 2015
ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers
More informationQuiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting
Quiz v 10/30/2013 (Wednesday), 20 mins v Midterm question (available on website) v TCP basics Segment structure and fields Flow control (rwnd) Timeout interval v TCP Congestion control Phases transition
More informationCSCD 330 Network Programming Spring 2017
CSCD 330 Network Programming Spring 2017 Lecture 14 Network Layer IP Addressing Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-2007 1
More informationChapter 4: Network Layer
Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationCSCI-1680 Network Layer: IP & Forwarding John Jannotti
CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github
More informationNetworking Theory CSCI 201 Principles of Software Development
Networking Theory CSCI 201 Principles of Software Development Jeffrey Miller, Ph.D. jeffrey.miller@usc.edu Networking Overview IP Addressing DNS Ports NAT Subnets DHCP Test Yourself Outline USC CSCI 201L
More informationETSF10 Internet Protocols Network Layer Protocols
ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4
More informationCSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca
CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today Network layer: Internet Protocol (v4) Forwarding Next 2 classes:
More informationIPv4 Lecture 10a. COMPSCI 726 Network Defence and Countermeasures. Muhammad Rizwan Asghar. August 14, 2017
IPv4 Lecture 10a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 14, 2017 Source of some slides: Princeton University Also thanks to J.F Kurose and K.W. Ross IPv4 Internet
More informationTCP/IP Protocol Suite
TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol
More informationCSCI Computer Networks Fall 2016
source: computer-s-webdesign.com CSCI 4760 - Computer Networks Fall 2016 Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu These slides are adapted from the textbook slides by J.F. Kurose and K.W.
More informationChapter 19 Network Layer: Logical Addressing
Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationEP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer
EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer Homework Assignment 1 (Solutions due 20:00, Mon., 10 Sept. 2018) (Review due 20:00, Wed., 12 Sept. 2018) 1. IPv4 Addressing
More informationChapter 4 Network Layer: The Data Plane
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationInternet Control Message Protocol
Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.
More informationNetwork Layer PREPARED BY AHMED ABDEL-RAOUF
Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport
More informationThe Internetworking Problem. Internetworking. A Translation-based Solution
Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationChapter 4 Network Layer
Chapter 4 Network Layer Reti degli Elaboratori Canale AL Prof.ssa Chiara Petrioli a.a. 2014/2015 We thank for the support material Prof. Kurose-Ross All material copyright 1996-2012 J.F Kurose and K.W.
More informationOSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More information