Information Network Systems The network layer. Stephan Sigg

Size: px
Start display at page:

Download "Information Network Systems The network layer. Stephan Sigg"

Transcription

1 Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012

2 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order Reed-Muller code is formed by using as a basis the vectors v0, v 1,..., v m and all vector products of r or fewer of these vectors The 11 information symbols are denoted by a 0, a 4, a 3, a 2, a 1, a 43, a 42, a 41, a 32, a 31, a 21 The codevector is then Example for m = 4, r = 2: v0 = v4 = v3 = v2 = v1 = v4 v3 = v4 v2 = v4 v1 = v3 v2 = a 0 v0 + a 4 v4 + a 3 v3 + a 2 v2 + a 1 v1 + a 43 v4 v3 + a 42 v4 v2 + a 41 v4 v1 + a 32 v3 v2 + a 31 v3 v1 + a 21 v2 v1 = (b 1, b 2,..., b n) v3 v1 = v2 v1 = Stephan Sigg Information Network Systems 2

3 Error-detection and correction Decoding of Reed-Muller codes Assume a second Task order Error (16, 11) correction code for m = 4. Demonstrate the encoding, error correction and The r-th order decoding Reed-Muller withcode Reed-Muller is formed codes Example for m = 4, r = 2: by using as a basis the vectors v0, v 1,..., Encode a data sequence and specify the v m and all vector products of r or fewer of theseencoded vectors sequence The 11 information Induce symbols an are error denoted into the by encoded sequence Show how the error can be detected and a 0, a 4, a 3, a 2, a 1, a 43, a 42, a 41, a 32, a 31, a 21 corrected while decoding the information The codevector is then a 0 v0 + a 4 v4 + a 3 v3 + a 2 v2 + a 1 v1 + a 43 v4 v3 + a 42 v4 v2 + a 41 v4 v1 + a 32 v3 v2 + a 31 v3 v1 + a 21 v2 v1 = (b 1, b 2,..., b n) v0 = v4 = v3 = v2 = v1 = v4 v3 = v4 v2 = v4 v1 = v3 v2 = v3 v1 = v2 v1 = Stephan Sigg Information Network Systems 2

4 Introduction Introduction to the internet The link layer (1) The link layer (2) The network layer The transport layer The application layer Network management Security and cryptography Wireless and Mobile Networks (1) Wireless and Mobile Networks (2) Multimedia networking (1) Multimedia networking (2) Security in computer networks Content centric networking Stephan Sigg Information Network Systems 3

5 The network layer The Internet Protocol (IP) Introduction Application Transport Network Link Physical Stephan Sigg Information Network Systems 4 Routing Algorithms

6 Introduction Stephan Sigg Information Network Systems 5

7 Outline The network layer The Internet Protocol (IP) Routing Algorithms Stephan Sigg Information Network Systems 6

8 The network layer The role of the network layer is to move packets from a sending host to a receiving host The two important network functions to achieve this are Forwarding Every router has a forwarding table. The router moves an arriving packet to the appropriate output link as specified by the forwarding table. Routing The network layer must determine the route a packet shall take from source to destination. Such path is determined by a routing algorithm and impacts the contents of forwarding tables. Stephan Sigg Information Network Systems 7

9 The network layer Forwarding and Routing Stephan Sigg Information Network Systems 8

10 The network layer Link-layer switches and Routers We distinguish link-layer switches and Routers Link-layer switch Bases its decision on values in the fields of the link-layer frame Routers Base their forwarding decision on the value in the network-layer field. Stephan Sigg Information Network Systems 9

11 The network layer Network layer services The network service model defines the characteristics of end-to-end packet transport Possible services the network layer could provide: Guaranteed delivery Packets will eventually arrive at destination In-order packet delivery Packets will arrive in order sent Guaranteed minimal bandwidth Data arrives at least at a minimal bandwidth Guaranteed maximum jitter The time offset between packets should be similar at the transmitter and receiver Security services For instance, encryption of data between source and destination Stephan Sigg Information Network Systems 10

12 The network layer Network layer services Network architecture Service model Bandwidth Guarantee No-Loss Guarantee Internet Best Effort None None Ordering Any order possible Timing Not maintained Congestion indication None ATM CBR Guaranteed constant rate Yes In order Maintained Congestion will not occur ATM ABR Guaranteed minimum None In order Not maintained Congestion indication provided Stephan Sigg Information Network Systems 11

13 The network layer Network layer services Constant bit rate (CBR) ATM network service Anticipated for its capability to carry real-time, constant bit-rate audio and video traffic Guaranteed threshold for end-to-end delay jitter fraction of lost packets These thresholds are defined between the sending host and the ATM network when the CBR connection is first established Stephan Sigg Information Network Systems 12

14 The network layer Network layer services Available bit rate (ABR) ATM network service Slightly better than best-effort service Packets may be lost under ABR service Unlike in the Internet, packets can not be reordered Minimum packet transmission rate is guaranteed Can provide feedback to the sender (e.g. congestion notification bit or explicit rate at which to send) to help the sender to adapt its transmission rate Stephan Sigg Information Network Systems 13

15 Outline The network layer The Internet Protocol (IP) Routing Algorithms Stephan Sigg Information Network Systems 14

16 Routing in the network layer is conducted by the Internet Protocol (IP) Currently, we are within the process of traversing from the previous IP protocol (IPv4) to the new standard (IPv6) The IP protocol defines Addressing conventions Datagram format Packet handling Stephan Sigg Information Network Systems 15

17 The IPv4 protocol The IPv4 datagram contains 13 key fields Stephan Sigg Information Network Systems 16

18 The IPv4 protocol Version number (4 bits) Specify IP protocol version Helps the router to correctly interpret a received datagram Stephan Sigg Information Network Systems 17

19 The IPv4 protocol Header length (4 bits) Since datagram can contain variable number of options, this field specifies when the data begins Without options (most common) an IPv4 datagram header is 20 bytes long Stephan Sigg Information Network Systems 18

20 The IPv4 protocol Type of service (8 bits) specifies different types of IP datagrams (low delay, high throughput, reliability) Stephan Sigg Information Network Systems 19

21 The IPv4 protocol Datagram length (16 bits) Total length of the IP datagram (header plus data) measured in bytes Theoretical maximum size of IP datagram is bytes but datagrams are rarely larger than 1500 bytes Stephan Sigg Information Network Systems 20

22 The IPv4 protocol Identifier, flags, fragmentation offset ( bits) Information for IP fragmentation No longer included in IPv6 Stephan Sigg Information Network Systems 21

23 The IPv4 protocol Time-to-live (TTL) (8 bits) Ensures that datagrams do not circulate forever Decremented by one each time the datagram is processed by a router If the TTL field reaches 0, the datagram is dropped Stephan Sigg Information Network Systems 22

24 The IPv4 protocol Protocol (8 bits) Used only when datagram reaches its final destination Indicates the specific transport-layer protocol to which it should be passed Stephan Sigg Information Network Systems 23

25 The IPv4 protocol Header checksum (16 bits) Checksum to detect bit errors in a received datagram header (only the header! TCP/UDP checksum for entire segment) Computed by treating each 2 bytes in the header as a number and summing these numbers using 1s complement If an error is detected, the datagram is typically discarded Stephan Sigg Information Network Systems 24

26 The IPv4 protocol Source and destination IP addresses (32 bits each) Addresses of source and destination hosts Utilised for forwarding and routing through a network Stephan Sigg Information Network Systems 25

27 The IPv4 protocol options (variable length) Enable the specification of specific options Rarely used and merely add overhead to the processing of an IP packet Not included in IPv6 Stephan Sigg Information Network Systems 26

28 The IPv4 protocol Data (payload) (variable length) Contains the data to be transmitted Most often this field contains the transport-layer segment (TCP or UDP) Can also carry other kinds of messages such as ICMP Stephan Sigg Information Network Systems 27

29 IP datagram fragmentation The size of datagrams that can be carried (Maximum Transmission Unit (MTU)) by link-layer protocols differs larger datagrams are therefore fragmented into smaller ones Stephan Sigg Information Network Systems 28

30 IP datagram fragmentation In IPv4 datagrams are splitted at routers when necessary but reassembly is done at the receiving end Identification, Flag and fragmentation offset filds in the IP datagram to reassemble datagrams in the correct order All fragmented datagram share the identification number with the original datagram The offset field specifies the position in the set of fragments The binary flag field is 1 for all fragments short of the last Stephan Sigg Information Network Systems 29

31 IP datagram fragmentation Stephan Sigg Information Network Systems 30

32 IPv4 addressing IPv4 are 32 bits (4 bytes) long billion possible IP addresses Dotted-decimal notion (each byte written in decimal form separated by period (dot): Binary notation: Stephan Sigg Information Network Systems 31

33 Classless Interdomain Routing (CIDR) Router interfaces may form a subnet as e.g /24 The term /24 is the subnet mask Defines the leftmost 24 bits to be the subnet address All nodes in this subnet share this subnet address Used since Before: Classful addressing with Class A (/8), B (/16) and C (/24) networks only Stephan Sigg Information Network Systems 32

34 Classless Interdomain Routing (CIDR) Notation Addresses Subnetmask decimal Subnetmask binary / / / / / / / / / / / / / / / / / / / / / / / / / Stephan Sigg Information Network Systems 33

35 Obtaining IP addresses IP addresses are managed by the Internet Corporation for Assigned Names and Numbers (ICANN) Allocates IP addresses to Internet Service Providers (ISP) Nonprofit organisation Also manages the DNS root servers Stephan Sigg Information Network Systems 34

36 Dynamic Host Configuration Protocol (DHCP) IP addresses are most often assigned automatically in a network DHCP provides IP address, subnet mask, address of first-hop router (default gateway) and address of local DNS server Stephan Sigg Information Network Systems 35

37 Dynamic Host Configuration Protocol (DHCP) Stephan Sigg Information Network Systems 36

38 Dynamic Host Configuration Protocol (DHCP) Four steps to obtain an IP address 1. DHCP server discovery 2. DHCP server offer 3. DHCP request 4. DHCP ACK Stephan Sigg Information Network Systems 37

39 DHCP server discovery DHCP discover message sent as UDP packet to port 67 Encapsulated in IP datagram to the broadcast address Source IP address set to Stephan Sigg Information Network Systems 38

40 DHCP server offer DHCP server responds with a DHCP offer message Broadcast to all nodes ( ) in an IP datagram Contains transaction ID, received discover message, proposed IP address, network mask and a lease time Lease time specifies the amount of time for which the IP address is valid Stephan Sigg Information Network Systems 39

41 DHCP request Client chooses among one or more server offers and responds to the selected offer with a DHCP request message Message contains the proposed configuration parameters Stephan Sigg Information Network Systems 40

42 DHCP ACK Server responds and confirms parameter by sending a DHCP ACK message Stephan Sigg Information Network Systems 41

43 Support of mobility In increasingly mobile networks, the approach of DHCP does have shortcomings In particular, a mobile node traversing among several subnets would have to request a new IP each time it enters a subnet At this occasion, ongoing transport layer connections typically have to be dropped. A possible solution can be provided by mobileip (considered later in the lecture) Stephan Sigg Information Network Systems 42

44 Network Address Translation (NAT) A local network behind a router does not have to request an IP address for each computer from the ISP or ICANN The network address translation (NAT) approach provides a solution that separates the local network from the internet Distinction between local computers via ports (>60000 available) Stephan Sigg Information Network Systems 43

45 Network Address Translation (NAT) Stephan Sigg Information Network Systems 44

46 Problems of NAT In the first place, NAT is a hack that is not fully compatible with the IP address structure NAT interferes with P2P applications (VoIP, file sharing) P2P applications require all hosts to become servers, effectively establishing TCP connections among each other Applications that send IP addresses or port numbers hidden within their data packets do not work with NAT Stephan Sigg Information Network Systems 45

47 Solution to NAT related problems As a solution, the application could use an address server which is not behind any NAT Hosts connect to this server first, sending the IP address they think they have The server notes the actual address received and the address the host believes to have The server then sends both addresses all peers to inform them of the mapping between actual and NAT address Stephan Sigg Information Network Systems 46

48 The Internet Control Message Protocol (ICMP) ICMP is used to communicate network-layer information Encapsulated in an IP packet Also utilised by some application programs (ping, traceroute) Stephan Sigg Information Network Systems 47

49 The Internet Control Message Protocol (ICMP) ICMP type Code Description 0 0 echo reply (to ping) 3 0 destination network unreachable 3 1 destination host unreachable 3 2 destination protocol unreachable 3 3 destination port unreachable 3 4 destination network unknown 4 0 source quench (congestion control) 8 0 echo request 9 0 router advertisement 10 0 router discovery 11 0 TTL expired 12 0 IP header bad Stephan Sigg Information Network Systems 48

50 Traceroute and its utilisation of the ICMP Sends a series of ordinary IP datagrams to the destination Each carries a UDP segment with an unlikely UDP port number TTL of these datagrams is increased from 1 Source starts timer for each datagram n-th router replies ICMP message (TTL expired); Incl. name and IP With this, source records round-trip time of the n-th packet Destination replies port unreachable ICMP message (unlikely port) Stephan Sigg Information Network Systems 49

51 IPv6 Development started in early 1990s by the Internet Engineering Task Force Reason: IP address space was beginning to be used up Also, some improvements above IPv4 Europe s Third Generation Partnership Program (3GPP) has specified IPv6 as the standard addressing scheme for mobile multimedia Estimates in 1996 predicted that addresses would become exhausted between 2008 and 2018 Stephan Sigg Information Network Systems 50

52 IPv6 IP address space is managed by the Internet Assigned Numbers Authority (IANA) globally Additinally, five regional Internet registries (RIR) are responsible for this management Stephan Sigg Information Network Systems 51

53 IPv IANA unallocated address pool exhaustion APNIC unallocated address pool exhaustion Stephan Sigg Information Network Systems 52

54 IPv6 datagram format IPv6 header simpler, more streamlined Stephan Sigg Information Network Systems 53

55 IPv6 datagram Most important changes Expanded addressing capabilities 128 bit addresses (every grain of sand could obtain an IP address) Streamlined 40 byte header Possible since some IPv4 fields have been dropped Flow labelling and priority Sender may request specific handling (QoS) for packets belonging to a specific flow Stephan Sigg Information Network Systems 54

56 IPv6 datagram fields Version (4 bit) Describes the IP version Traffic class (8 bit) Similar to Type of service field in IPv4 Stephan Sigg Information Network Systems 55

57 IPv6 datagram fields Flow label (20 bit) Identify flow of datagrams and their QoS and handling IPv6 can label packets as belonging to a particular flow Special handling of flows For instance, audio and video transmission Stephan Sigg Information Network Systems 56

58 IPv6 datagram fields Payload length (16 bit) Number of bytes in the datagram following the fixed-length 40 byte header Stephan Sigg Information Network Systems 57

59 IPv6 datagram fields Next header (8 bit) Identifies the protocol to deliver the data contents to in the transport layer (cf. protocol field in IPv4) Hop limit (8 bit) Similar to TTL in IPv4 Stephan Sigg Information Network Systems 58

60 IPv6 datagram fields Source and destination addresses (128 bit each) 128 bit source and destination addresses data (variable length) Payload Stephan Sigg Information Network Systems 59

61 IPv6 datagram removed fields Fragmentation/Reassembly IPv6 does not allow fragmentation at routers. Fragmentation only at source nodes. Retransmission if packet too big (new ICMP error message Packet too big ) Header checksum Removed for redundancy. Checksum already in transport layer and link layer Options Now one of the possible next headers pointed to from within the IPv6 header Stephan Sigg Information Network Systems 60

62 Transition from IPv4 to IPv6 Dual-stack Might force IPv6 nodes to use IPv4 Stephan Sigg Information Network Systems 61

63 Transition from IPv4 to IPv6 Tunneling Stephan Sigg Information Network Systems 62

64 Outline The network layer The Internet Protocol (IP) Routing Algorithms Stephan Sigg Information Network Systems 63

65 Routing algorithms To generate forwarding tables in routers, routing algorithms are applied Today, there are two basic algorithms applied in the internet Centralised Link state algorithms (e.g. Dijkstra) Distributed Distance Vector algorithms Routing problem defined by edge-weighted graph G = (N, E) Stephan Sigg Information Network Systems 64

66 Routing algorithms Dijkstra a centralised link state algorithm 1. Assign a distance cost D( ) = to all nodes short of a source node u with D(u) = As long as nodes v with D(v) = exist, choose from these the node v with minimum edge cost c(x, v) to any node x with D(x) <, set D(v) = D(x) + c(x, v) and update for all neighbours w of v the value D(w) = min (D(w), D(v) + c(v, w)) Stephan Sigg Information Network Systems 65

67 Routing algorithms Dijkstra a centralised link state algorithm The Dijkstra algorithm solves the problem of finding shortest paths between a source node u and all other nodes in time O(n 2 ) The algorithm is centralised in a sense that it requires the cost of all edges in the network Stephan Sigg Information Network Systems 66

68 Routing algorithms Distance vector routing a decentralised algorithm Observe that for any least-cost path d x (y) from x to y, the least cost can be described by d x (y) = min v (c(x, v) + d v (y)) (1) 1. Each node u assigns a distance cost D( ) = to all nodes short of itself with D(u) = 0. These costs are maintained in a distance vector DV u by each node. 2. For each of its neighbours w, a node u sets D(w) = c(u, w) 3. From time to time, each node u sends DV u to all its neighbours w 4. At receiving DV w, a node u updates its DV u according to equation (1) Stephan Sigg Information Network Systems 67

69 Routing algorithms Distance vector routing a decentralised algorithm Distance vector routing is a decentralised approach since only local information is required It is robust against unavailable links and dying nodes The algorithm is slower than Dijkstra Stephan Sigg Information Network Systems 68

70 Routing algorithms Task Routing algorithms For the given network, calculate the shortest paths with the Dijkstra and the distant vector algorithm and report your results. Stephan Sigg Information Network Systems 69

71 Outline The network layer The Internet Protocol (IP) Routing Algorithms Stephan Sigg Information Network Systems 70

72 The network layer The Internet Protocol (IP) Conclusion Comoputer Networking A Top-Down Approach J.F. Kurose and K.W. Ross 6th edition, 2012 Pearson study Addison-Wesley ISBN: Stephan Sigg Information Network Systems 71 Routing Algorithms

73 Conclusion Do you have any questions? Stephan Sigg Stephan Sigg Information Network Systems 72

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Internet Technology 3/23/2016

Internet Technology 3/23/2016 Internet Technology // Network Layer Transport Layer (Layer ) Application-to-application communication Internet Technology Network Layer (Layer ) Host-to-host communication. Network Layer Route Router

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

IPv4. Christian Grothoff.

IPv4. Christian Grothoff. IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018 CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage

More information

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction The Network layer Host, network layer functions: Network layer Routing protocols path selection R, OSPF, BGP Transport layer: TCP, forwarding table Link layer physical layer protocol addressing conventions

More information

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state

More information

HY 335 Φροντιστήριο 8 ο

HY 335 Φροντιστήριο 8 ο HY 335 Φροντιστήριο 8 ο Χειμερινό Εξάμηνο 2009-2010 Παπακωνσταντίνου Άρτεμις artpap@csd.uoc.gr 4/12/2009 Roadmap IP: The Internet Protocol IPv4 Addressing Datagram Format Transporting a datagram from source

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Computer Networking A Top-Down Approach These slides are based on the slides made available by Kurose and Ross. All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13 CMPE 50/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3 Lab3 online Due March 4 th. Introduction -2 IP addresses: how to get one? Q: how does network

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer CPSC 335 Data Communication Systems Readings: 4.4.3, 4.4.4, 4.5, 4.5.1 David Nguyen Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March

More information

TDTS06: computer Networks

TDTS06: computer Networks TDTS06: computer Networks Lecturer: Johannes Schmidt The slides are taken from the book s companion Web site with few modifications: Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Lecture 16: Network Layer Overview, Internet Protocol

Lecture 16: Network Layer Overview, Internet Protocol Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

CSCE 463/612 Networks and Distributed Processing Spring 2017

CSCE 463/612 Networks and Distributed Processing Spring 2017 CSCE 46/6 Networks and Distributed Processing Spring 07 Network Layer III Dmitri Loguinov Texas A&M University April, 07 Original slides copyright 996-004 J.F Kurose and K.W. Ross Homework #4 Grading Default

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

Δίκτυα Υπολογιστών ΙΙ. Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων

Δίκτυα Υπολογιστών ΙΙ. Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων Δίκτυα Υπολογιστών ΙΙ Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων Course information introductory course in computer networking course materials: text:

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Networking Potpourri: Plug-n-Play, Next Gen

Networking Potpourri: Plug-n-Play, Next Gen Networking Potpourri: Plug-n-Play, Next Gen 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer II Dmitri Loguinov Texas A&M University April 3, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter 4:

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy Hierarchical Routing Our routing study thus far - idealization all routers identical network flat no true in practice scale: with 50 million destinations: can t store all dest s in routing tables! routing

More information

CSEP 561 Internetworking. David Wetherall

CSEP 561 Internetworking. David Wetherall CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Network Layer (4): ICMP

Network Layer (4): ICMP 1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet

More information

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2018 CSCD 330 Network Programming Spring 2018 Lecture 14 Network Layer IP Addressing Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 2017 Network

More information

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol) : Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

COMP211 Chapter 4 Network Layer: The Data Plane

COMP211 Chapter 4 Network Layer: The Data Plane COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross

More information

Chapter 4: network layer

Chapter 4: network layer Chapter 4: network layer chapter goals: understand principles behind network layer services: network layer service models forwarding versus routing how a router works routing (path selection) broadcast,

More information

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport layer network layer protocols in every

More information

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the

More information

The Network Layer Forwarding Tables and Switching Fabric

The Network Layer Forwarding Tables and Switching Fabric The Network Layer Forwarding Tables and Switching Fabric Smith College, CSC 249 February 27, 2018 1 Network Layer Overview q Network layer services v v Desired services and tasks Actual services and tasks

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting Quiz v 10/30/2013 (Wednesday), 20 mins v Midterm question (available on website) v TCP basics Segment structure and fields Flow control (rwnd) Timeout interval v TCP Congestion control Phases transition

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 2017 Lecture 14 Network Layer IP Addressing Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-2007 1

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

CSCI-1680 Network Layer: IP & Forwarding John Jannotti

CSCI-1680 Network Layer: IP & Forwarding John Jannotti CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github

More information

Networking Theory CSCI 201 Principles of Software Development

Networking Theory CSCI 201 Principles of Software Development Networking Theory CSCI 201 Principles of Software Development Jeffrey Miller, Ph.D. jeffrey.miller@usc.edu Networking Overview IP Addressing DNS Ports NAT Subnets DHCP Test Yourself Outline USC CSCI 201L

More information

ETSF10 Internet Protocols Network Layer Protocols

ETSF10 Internet Protocols Network Layer Protocols ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today Network layer: Internet Protocol (v4) Forwarding Next 2 classes:

More information

IPv4 Lecture 10a. COMPSCI 726 Network Defence and Countermeasures. Muhammad Rizwan Asghar. August 14, 2017

IPv4 Lecture 10a. COMPSCI 726 Network Defence and Countermeasures. Muhammad Rizwan Asghar. August 14, 2017 IPv4 Lecture 10a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 14, 2017 Source of some slides: Princeton University Also thanks to J.F Kurose and K.W. Ross IPv4 Internet

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

CSCI Computer Networks Fall 2016

CSCI Computer Networks Fall 2016 source: computer-s-webdesign.com CSCI 4760 - Computer Networks Fall 2016 Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu These slides are adapted from the textbook slides by J.F. Kurose and K.W.

More information

Chapter 19 Network Layer: Logical Addressing

Chapter 19 Network Layer: Logical Addressing Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer Homework Assignment 1 (Solutions due 20:00, Mon., 10 Sept. 2018) (Review due 20:00, Wed., 12 Sept. 2018) 1. IPv4 Addressing

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Reti degli Elaboratori Canale AL Prof.ssa Chiara Petrioli a.a. 2014/2015 We thank for the support material Prof. Kurose-Ross All material copyright 1996-2012 J.F Kurose and K.W.

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information