Introduction to Communication Networks Spring Unit 15 Internetworking (cont) Routing
|
|
- Gwenda Stokes
- 6 years ago
- Views:
Transcription
1 Introduction to Communication Networks Spring 007 Unit 5 Internetworking (cont) Routing EECS SPRING 007
2 Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Several slides from the earlier issues of the EECS taught by Prof Jean Walrand, A series of slides from lectures by Peter Steenkiste (CMU), also Anja Feldmann(TUBerlin), Nick McKeown (Stanford), and D.Peterson (Princeton) EECS SPRING 007 of 5
3 Remember the picture? Layers and : Ethernet Switch Router Ethernet Switch p Destination Address B Next Hop C Local address C Layer address y Application Transport Destination Address B Local to port p Local address B Layer address w Application Transport Network A Link x Phy Phy Link Phy Phy Network C D Link y Phy Link v Phy Phy Link Phy Phy Network B Link w Phy TOC IP Addressing Examples EECS Layers SPRING / 007 of 5
4 Now: I do have the IP address so what? How to reach another host on the same (sub)network? Consider a IEEE 80. based LAN: Hosts are characterized by their unique MAC address if a host wants to send a packet to another host (or router) within its network it must know the destination host s hardware address. How to find the appropriate MAC address from the IP address? example organization IP address topological MAC address 00:50:56:0:ab: Flat, unique, permanent IP address (ARP) -to- MAC address Answer the ARP service!! EECS SPRING 007 of 5
5 Principles of ARP The ARP exploits the broadcast support. Distributed operation per host. (A special server only if no broadcast!) All hosts can send ARP requests and ARP replies Request: Searched IP, MAC of the sender; Reply: to requestor only. Already resolved addresses are stored in an ARP cache Using soft state principle ) EECS SPRING 007 5of 5
6 IP packet delivery in a subnet [Walrand, ] IP IP on on same subnet IP H e e e IP IP X e H all e e: Who is IP? IP H e IP e R R e5 e e e: I am IP Address Resolution Protocol = Layer Layer Address Layer Layer Address TOC IP Addressing CIDR EECS SPRING 007 6of 5
7 IP Packet delivery not on the same subnet [Walrand, ] Note: IP has explicitly specified thé MAC address e Unlike in bridging the router has to be known to IP (default?) IP H H IP e e e e IP IP X e SH R IP IP X IP IP not on on same subnet e5 e R e5 all e5 I am IP e e5 Note: Fragmentation may be required at R e H IP IP IP X Who is IP? TOC IP Addressing CIDR EECS SPRING 007 7of 5
8 Example: Internet Interconnection How to report errors? AS- AS- AS- Interior router BGP router AS: Autonomous System EECS SPRING 007 8of 5
9 ICMP Internet Control Message Protocol Network-layer above IP: ICMP Used by hosts, routers, gateways to communication network-level information error reporting: unreachable host, network, port, protocol echo request/reply (used by ping) Other functions associated with ICMP are: Reachability testing Congestion Control Route change information Performance measuring Subnet addressing EECS SPRING 007 9of 5
10 ICMP Internet Control Message Protocol ICMP messages are carried in IP datagrams ICMP error message: type, code plus first 8 bytes of IP datagram causing error EECS SPRING of 5
11 ICMP - messages Type ICMP Message Type 0 Echo Reply Destination Unreachable Source Quench 5 Redirect (change a route) 8 Echo Request Time Exceeded for a Datagram Parameter problem on datagram Timestamp Request Timestamp Reply 5 Information request (obsolete) 6 Information reply (obsolete) 7 Address mask Request 8 Address Mask Reply EECS SPRING 007 of 5
12 ICMP destination unreachable Code Value Meaning 0 Network unreachable Host unreachable Protocol unreachable Port unreachable Fragmentation needed and DF set 5 Source route failed 6 Destination network unknown 7 Destination host unknown 8 Source host isolated 9 Communication with destination network administratively prohibited 0 Communication with destination host administratively prohibited Network unreachable for type of service Host unreachable for type of service EECS SPRING 007 of 5
13 An Example Ping Used to detect a hosts reachability by exchanging a requestresponse pair of ICMP packets Type is 8 for request/0 for reply Code is 0 (not used) Identifier allows to differentiate different sessions Sequence number Supports matching the answer to the request. EECS SPRING 007 of 5
14 Traceroute and ICMP Source sends series of UDP segments to dest. (UDP just IP plus something ) First has TTL = Second has TTL =, etc. Unlikely port number When n th datagram arrives to nth router: Router discards datagram And sends to source an ICMP message (type, code 0) Message includes name of router & IP address When ICMP message arrives, source calculates RTT Traceroute does this times Stopping criterion UDP segment eventually arrives at destination host Destination returns ICMP host unreachable packet (type, code ) When source gets this ICMP, stops. EECS SPRING 007 of 5
15 Example: Internet Interconnection How to support mobility? AS- AS- AS- Interior router BGP router AS: Autonomous System EECS SPRING of 5
16 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 9..) determines physical subnet change of physical subnet implies change of IP address to have a topological correct address (standard IP) or needs special entries in the routing tables Specific routes to end-systems? change of all routing table entries to forward packets to the right destination does not scale with the number of mobile hosts and frequent changes in the location, security problems Changing the IP-address? adjust the host IP address depending on the current location almost impossible to find a mobile system, DNS updates take to long time TCP connections break, security problems EECS SPRING of 5
17 Requirements to Mobile IP (RFC 00) Transparency mobile end-systems keep their IP address continuation of communication after interruption of link possible point of connection to the fixed network can be changed Compatibility usage of the same layer protocols as IP no changes to current end-systems and routers required mobile end-systems can communicate with fixed systems Security authentication of all registration messages Efficiency and scalability only little additional messages to the mobile system required (connection typically via a low bandwidth radio link) world-wide support of a large number of mobile systems in the whole Internet EECS SPRING of 5
18 Terminology Mobile Node (MN) system (node) that can change the point of connection to the network without changing its IP address Home Agent (HA) system in the home network of the MN, typically a router registers MN s location, tunnels IP datagrams to the COA Foreign Agent (FA) system in the foreign network of the MN, typically a router forwards the tunneled datagrams to the MN, typically also the default router for the MN Care-of Address (COA) address of the current tunnel end-point for the MN (at FA or MN) actual location of the MN from an IP point of view can be chosen, e.g., via DHCP Correspondent Node (CN) communication partner EECS SPRING of 5
19 How does it work Agent Advertisement HA and FA periodically send advertisement messages into their physical subnets MN listens to these messages and memorizes the HA MN moves MN detects the Advertisement of the FA MN reads a COA from the FA advertisement messages Registration MN registers within the FA (soft state) MN registers his move at the HA, disclosing the COA of the FA HA acknowledges via FA to MN Advertisement of the MN IP address by HA Within the home network HA handles the ARP requests for IP address of MN answering with the own MAC adddress To all others HA advertises the IP Adrress of the MN in the home network. EECS SPRING of 5
20 Data transfer from the mobile system HA MN home network Internet FA sender foreign network CN receiver Sender sends using his usual IP address from the home Network using FA as default router. EECS SPRING of 5
21 Reverse tunneling (RFC ) HA MN home network Internet sender FA foreign network CN receiver. MN sends to FA. FA tunnels packets to HA by encapsulation. HA forwards the packet to the receiver (standard case) EECS SPRING of 5
22 Mobile IP with reverse tunneling Sending packet with his old IP address MN behaves topologically incorrect. Some firewalls might block this Reverse tunneling solves the problem! a packet from the MN with his IP address and the IP Address of the corresponding host is posted to the FA Using it MAC address. FA encapsulates it with its IP Address and destination address HA - Tunnel (IP packet in IP Packet!!!) Side effects: multicast and TTL problems solved (TTL in the home network correct, but MN is to far away from the receiver) Reverse tunneling does not solve Security considerations completely, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing) EECS SPRING 007 of 5
23 Data Transfer to the mobile system COA:Careof Address home network router HA Tunnel router FA MN Internet foreign network CN router home network router HA. router FA.. MN Internet foreign network. CN router EECS SPRING of 5
24 More about tunneling... IMPORTANT Network R Internetwork R Network IP header, Destination =.x IP payload IP header, Destination = IP header, Destination =.x IP header, Destination =.x IP payload IP payload The complete (original header end payload) are now considered new payload!. The new payload can be completly encrypted, and hidden from any kind of observation. Router R can consider Network as directly connected. It might be a subnetwork of location. Virtual private networks use tunnels to connect locations... EECS SPRING 007 of 5
25 ROUTING _ THE THEORY Remember: In general, routing is about finding the way from the source to a given address. In which layer?: While this task is typical for the Network Layer it can also appear in other Layers (remember learning bidges?) The general problem is a graph problem: nodes are components - verges are links Forwarding: Is the processing of the packet in the node, assuming that the routing information is known. EECS SPRING of 5
26 Source Routing vs. Hop by hop routing Source routing: the source node defines the whole route.. Features: No state information is needed in the individual nodes Adapting to link breakdowns causes global consequences... EECS SPRING of 5
27 Hot potato (deflection) routing vs. Targeted routing Targeted routing: This is what we have used so far: there have been tables full of useful information and forwarding used this tables... Reminder for the datagram case... There has always be the port defined for each destination address... Reminder : Using this tables forwarding. Getting these tables prepared Routing Hot potato routing Assume a packet arrives, and there is NO entry for the destination in the tables... Instead of dropping the packet, one might decide to forward it SOMWHERE _ select ANY available port. (Funny the same can be done if the output queue is full!!!) Intuition: If I do not know the way (or cannot accomodate) possibly some other element might know... Just for those curiose ones: Used, e.g. In all optical netowrks with no buffers... EECS SPRING of 5
28 Flooding Packet broadcasting from node A to all other nodes by (a) pure flooding and (b) a spanning tree. Arrows indicate packet transmissions at the times shown (each packet transmission time is assumed to be one unit long). In general, flooding is an approach to achieve quickest possible distribution of information, independent of the topology. It is also nice in the case of unreliable links... In general more packets are send than really needed... EECS SPRING of 5
29 Constrains for flooding Simple flooding implies multiple arrival of a packet... Flooding should not go on infinitely...some limitation is needed Different approaches to constrain the flooding: Lifetime of a packet can be limited (say to N traversed nodes) Nodes could store some parameters of the packet, and deny transmissions which are obviously repetitions. Candidate parameters: Source address, and packet id. Problem: In each case looking into the packet is necessary!!! EECS SPRING of 5
30 Addendum: Broadcast Tree Construction E Flooding is used to construct the tree rooted at A (shortest path). Each node sends the packet to all its neighbors (besides the origin) All nodes should mark the transmitter of the first packet they receive as their parent on the tree. Nodes should relay the packet to their neighbors only once all subsequent receptions of the same packet should be ignored Now the node know where to send the packet addressed to the root. How should the root reach the node? Source routing...or tables... EECS SPRING of 5
31 Beyond trees Trees are not the best way to travel between any pair of nodes. Compare the way from E to A in the previous slide... We are looking for solutions assuring the shortest route between any to nodes There are numerous solutions... EECS SPRING 007 of 5
32 Classes of routing algorithms [steenkiste] Fully distributed porcessingseparately in each node but full graph structure needed in each node!. Fully distributed processing- no whole structure of The graph per node Bellmann-Ford EECS SPRING 007 of 5
33 Dijkstra Every node knows the graph All link weights are >= 0 Goal at node : Find the shortest paths from to all the other nodes. Each node computes the same shortest paths so they all agree on the routes 6 5 Strategy at node : Find the shortest paths in order of increasing path length EECS SPRING 007 of 5
34 Dijkstra intuition [steenkiste] EECS SPRING 007 of 5
35 Dijkstra Notation c(i,j) >=0 :cost of link from (i,j) D(,i): Shortest path from to i. D(,x,i): Shortest path from to i via x Let P(k) be the set of nodes k-closest to D(,5)= D(,6,5)=5 P()={,} 6 5 IDEA: Given P(k) we can find P(k+) efficiently: To get P(k+), observe that. This node cannot be in P(k). It must be one hop away from some node in P(k) Suppose were false. We picked i Node i has no edge into P(k) There must be a node x, not in P(k) such that x is one hop away from P(k) and D(,i)=D(,x)+D(x,i) But then, D(,x) < D(,i) and we would have picked x instead. Pick node(s) that is one hop away from P(k) that is closest to. Keep iterating until all nodes are in P EECS SPRING of 5
36 Dijkstra P()={,} D(,)= P()={,,5} D(,5)= P()={,,,5,6} D(,)= D(,6)= EECS SPRING of 5
37 Dijkstra - Forwarding Table At node 5 Outgoing Cost EECS SPRING of 5
38 Bellman-Ford Principle EECS SPRING of 5
39 Bellman-Ford Communicate current distance estimates of node to every other node This is called its distance vector: D i = (D(i,),D(i,),,D(i,n)) Initially, assume that all distance estimates are c(i,j) The nodes do not need to learn the entire topology Just the distance estimates (vectors) of their neighbors Periodically each node sends its distance vector to all of its neighbors At node : D : (0,,,,,) Neighbor estimates : (,0,,,, ) 6: (,,,,,0) 6 5 At node 6: D 6 : (,,,,,0) Neighbor estimates : (0,,,,,) 5: (,,,,0,) EECS SPRING of 5
40 Bellman-Ford Upon receiving a more recent distance vector from its neighbors, a node, i, stores it and revises D i : New D(i,d): The total cost to send it via neighbor j is the sum of The link cost c(i,j) The stored estimate to reach d from j Pick the lowest sum over all the neighbors D(i,d) = min jεn(i) {c(i,j) + D(j,d)} Old Info: DV: (,,,,,0) Neighbor estimates: : (0,,,,,) 5: (,,,,0,) 6 5 Node 6 receives (0,,,,,,) from (,,,,0,) from 5 Revised: DV: (,,,5,,0) Neighbor estimates: : (0,,,,,) 5: (,,,,0,) Send all packets to via. EECS SPRING of 5
41 Bellman-Ford Forwarding Table at 6 Estimates DV: (,,,,,0) Neighbor estimates: : (0,,,5,,) 5: (,,,,0,) 6 5 Node Cost EECS SPRING 007 of 5
42 Why does this compute shortest paths? Suppose in every tick each node sends its distance vector. Assume that initial distances are At time h, node i has as an estimate of the shortest path to node j that has <= h+ hops! D h+ (i,j) = min kεn(i) {D h (k) + c(i,k)} EECS SPRING 007 of 5
43 Asynchronous Bellman Ford In general, nodes are using different and possibly inconsistent estimates If no link changes after some time t, the algorithm will eventually converge to the shortest path No synchronization required at all TOC IP Routing Types DV EECS Asynchronous SPRING 007 of 5
44 Bellman-Ford Algorithm () EECS SPRING 007 of 5
45 Bad News Travels Slowly M D(,)=, D(,)=, D(,)= EECS SPRING of 5
46 Bad News Travels Slowly Node takes about M Iterations to figure out that D(,)=M M Fundamental Cause: After a network change, think of the network protocol running from time 0. The initial conditions are arbitrary Tricks exist to get around these problems but not fool proof EECS SPRING of 5
47 Oscillations Link costs must reflect link speed AND congestion Under both LSP and DV routing occurs over a tree The costs of the links of this tree will increase The other links will not be congested Their costs will drop Routing protocol will shift traffic and create a new tree This process of shifting and re-shifting can be severe Way out: Change congestion costs slowly (exponential averaging) Route dampening EECS SPRING of 5
48 Comparison: No clear winner Dijkstra: is robust since it each node computes its own routes independently Suffers from the weaknesses of the topology update protocol. Inconsistency etc. Excellent choice for a well engineered network within one administrative domain Bellman-Ford works well when the network is large since it requires no synchronization and has a trivial topology update algorithm Suffers from convergence delays Very simple to implement at each node Excellent choice for large networks EECS SPRING of 5
Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.
Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationMobile IP. Mobile IP 1
Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address
More informationCSE 4215/5431: Mobile Communications Winter Suprakash Datta
CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationMobile Communications Chapter 8: Network Protocols/Mobile IP
Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama
More informationOutline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting
Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer
More informationMobile Communications Chapter 9: Network Protocols/Mobile IP
Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on
More informationMobile Communications Mobility Support in Network Layer
Motivation Mobility support needed to be able to use mobile devices in the Mobile devices need IP address for their communication Applications would like to communicate while being on the move Mobile Communications
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationChapter 4 Network Layer. Network Layer 4-1
Chapter 4 Network Layer Network Layer 4- Chapter 4: Network Layer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing
More informationLecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationChapter 8 LOCATION SERVICES
Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location
More informationLecture 19: Network Layer Routing in the Internet
Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F
More informationCSC 4900 Computer Networks: Routing Protocols
CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do
More informationMobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]
192620010 Mobile & Wireless Networking Lecture 9: Mobile IP [Schiller, Section 8.1] Geert Heijenk Outline of Lecture 11 q Mobile IP Basics q 3 parts of Mobile IP: q Advertising Care-of Addresses q Registration
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13
CMPE 50/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3 Lab3 online Due March 4 th. Introduction -2 IP addresses: how to get one? Q: how does network
More informationIPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local
1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationIPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land
IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit
More informationInter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...
1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol
More informationIntroduction to routing in the Internet
Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by
More informationNetwork layer: Overview. Network Layer Functions
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationChapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP
Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state
More informationAnnouncements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms
Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce
More informationCSCE 463/612 Networks and Distributed Processing Spring 2017
CSCE 46/6 Networks and Distributed Processing Spring 07 Network Layer III Dmitri Loguinov Texas A&M University April, 07 Original slides copyright 996-004 J.F Kurose and K.W. Ross Homework #4 Grading Default
More informationSubnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction
The Network layer Host, network layer functions: Network layer Routing protocols path selection R, OSPF, BGP Transport layer: TCP, forwarding table Link layer physical layer protocol addressing conventions
More informationLecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining
More informationNetwork Layer (4): ICMP
1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet
More informationLecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen
Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network
More informationLECTURE 8. Mobile IP
1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet
More informationInternetworking Part 2
CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning
More informationMobility Management - Basics
Mobility Management - Basics Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationOutline. Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits
Lecture 2 Outline Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits TCP/IP protocol suite Good name for our book! User application, e.g., http with Mozilla Communication
More informationIntroduction to routing in the Internet
Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More informationInternet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationLink layer: introduction
Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,
More informationICMP (Internet Control Message Protocol)
Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005
More informationIntroduction to Communication Networks Spring Unit 14 Internetworking
Introduction to Communication Networks Spring 2007 Unit 14 Internetworking Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Several slides from the earlier issues
More informationCPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer
1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer
More informationIntroduction to Internetworking
Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationAdministrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)
Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2
More informationcs/ee 143 Communication Networks
cs/ee 143 Communication Networks Chapter 4 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationCIS 632 / EEC 687 Mobile Computing
CIS 63 / EEC 687 Mobile Computing IP Software: Routing Prof. Chansu Yu Network Protocols for Wired Network: Ethernet Ethernet address 48-bit, also called hardware/physical/mac/layer address Globally unique:
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationLast time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm
Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationNetwork Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.
Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationUNIT III THE NETWORK LAYER
UNIT III THE NETWORK LAYER Introduction-Virtual Circuit and Datagram Networks- Inside a Router- The Internet Protocol (IP): Forwarding and Addressing in the Internet-Routing Algorithms Routing in the Internet-Broadcast
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationLecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model
Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.
More informationNetwork Layer: Internet Protocol
Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram
More informationTSIN02 - Internetworking
Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4
More information(ICMP), RFC
Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to
More informationInternetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)
Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Goal is to use this opportunity (and not to find the lowest common denominator
More informationRouting. Information Networks p.1/35
Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual
More informationLecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1
Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2
More informationRouting Outline. EECS 122, Lecture 15
Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationMobility Management Basics
Mobility Management Basics Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Content Motivation Problem and possible solutions IP-based mobility management Conclusions
More informationChapter 4: Network Layer
Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint
More informationInternet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC
Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary
More informationDate: June 4 th a t 1 4:00 1 7:00
Kommunika tionssyste m FK, Examina tion G 5 0 7 Date: June 4 th 0 0 3 a t 4:00 7:00 KTH/IMIT/LCN No help material is allowed. You may answer questions in English or Swedish. Please answer each question
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 01 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #4 Due Thursday, Nov 1 st Project # Due Tuesday, Nov 6 th Later this semester: Homework #5 Due Thursday,
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More information5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet
Chapter 5: outline 5.1 introduction 5.5 The SDN control 5.2 routing protocols plane link state 5.6 ICMP: The Internet distance vector Control Message 5.3 intra-as routing in Protocol the Internet t 5.7
More informationDepartment of Computer Science and Engineering. COSC 4213: Computer Networks II (Fall 2005) Instructor: N. Vlajic Date: November 3, 2005
Department of Computer Science and Engineering COSC 4213: Computer Networks II (Fall 2005) Instructor: N. Vlajic Date: November 3, 2005 Midterm Examination Instructions: Examination time: 75 min. Print
More informationMidterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122
Topics Midterm Review EECS University of California Berkeley Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:
More informationMidterm Review EECS 122. University of California Berkeley
Midterm Review EECS University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:
More informationIntroduction to IPv6. IPv6 addresses
Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A
More informationTCP/IP Protocol Suite
TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationWireless Transmission and Mobility
Mobile and Ubiquitous Computing Wireless Transmission and Mobility Modulation, MAC and IPv6" George Roussos! g.roussos@dcs.bbk.ac.uk! Modulation" Digital modulation! digital data is translated into an
More informationModule 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas
More informationICMP (Internet Control Message Protocol)
ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations
More informationIntegrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.
Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks
More informationSEN366 (SEN374) (Introduction to) Computer Networks
SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol
More information