Network Layer Protocols

Size: px
Start display at page:

Download "Network Layer Protocols"

Transcription

1 internetwork n. &v. Network Layer Protocols CSCI 363 Computer Networks Department of Computer Science 1 logical network built out of a collection of physical networks. 2 tr. to interconnect physical networks into a single logical networks; to build an internet. CSCI 363 Computer Networks 2 Simple internetwork (example) Service model Question: What are the challenges in connecting two physical networks into a single logical network? Host-to-host service Philosophy: Define a model that is so undemanding that almost any network technology is able to provide the required service. (IP) Addressing scheme Datagram Best-effort Questions: What does best-effort mean? How does it simplify internetworking? CSCI 363 Computer Networks 3 CSCI 363 Computer Networks 4 Data delivery model Data delivery model Every datagram contains enough information for the network to forward it from source to destination. Question: Why is Version at the start of the packet? Aligned on 32-bit boundaries. HLen: length of header. TOS: type of service. Length: length of datagram. Questions: What is the maximum length of a datagram? Will the underlying physical network support it? Aligned on 32-bit boundaries. CSCI 363 Computer Networks 5 CSCI 363 Computer Networks 6

2 TTL: time to live (hop count). Protocol: identity of upperlevel protocol to which IP passes this packet. Checksum: applies to header. SourceAddr: to allow filtering based on source. DestinationAddr: used for data delivery. Options: header length determines if any are set. Data delivery model Aligned on 32-bit boundaries. CSCI 363 Computer Networks 7 Fragmentation and Reassembly Ethernet: max. frame length = 1500 B. MTU: The largest IP datagram that a network can carry in a single frame. Question: How does the underlying network technology affect IP? How does one choose the maximum datagram size for IP? Design options: (1) Choose IP datagram max. length to be compatible with MTU. (2) Fragment IP datagram into multiple MTUs. CSCI 363 Computer Networks 8 MTU Fragmentation and Reassembly Fragmentation and Reassembly Gotcha: MTU header Payload: IP datagram trailer 1. Each fragment is itself a self-contained IP datagram that is transmitted over a sequence of physical networks, independent of other fragments. 2. Each IP datagram is reencapsulated for each physical network over which it travels. CSCI 363 Computer Networks 9 CSCI 363 Computer Networks 10 Fragmentation and Reassembly (a) (b) Ident = x Ident = x Ident = x Ident = x Start of header 0 Rest of header 1400 data bytes Start of header 1 Rest of header 512 data bytes Start of header 1 Rest of header 512 data bytes Start of header 0 Rest of header 376 data bytes Offset = 0 Offset = 0 Offset = 64 Offset = 128 Some nitty-gritty details If a fragment is lost, the receiver still tries to assemble the datagram When this fails, it has to clean up the memory that was used in the attempt. If hosts can do path MTU discovery, then IP fragmentation can be avoided altogether. CSCI 363 Computer Networks 11 Global addresses Question: What are the challenges? Wish List: Addresses are unique. Address structure makes routing/forwarding as easy as possible. CLASS A CLASS B CLASS C CSCI 363 Computer Networks 12

3 Virtual Private Networks Implementing a VPN Reality: Two private corporate networks. Traffic from one network is invisible to the other network (ideal privacy). Leased lines, however, may be too expensive to keep. Virtual: Two corporate networks sharing some of the same physical links. Want to give the functionality and the privacy of private networks for each corporation. Question: What are the challenges to making this happen? Encapsulate traffic from R1 to R2 inside IP packets addressed to R2. Together with encryption, this tunneling of packets is an effective way to implement a VPN. Question: Can you think of other uses for tunneling? Routing table NetworkNum NextHop 1 Interface 0 2 Virtual Interface 0 Default Interface 1 CSCI 363 Computer Networks 13 CSCI 363 Computer Networks 14 Routing vs. Forwarding Definition: forwarding consists of taking a packet, identifying its destination, looking up in a table the interface that leads to the destination, and sending it off in that direction. Definition: routing is the process by which forwarding tables are built. Network as a Graph Routing is a problem of graph theory. You are given a set of nodes V and a set of edges E such that e= (v i,v j ) in E for v i and v j in V. These two sets define a graph G= (V,E). You are also given a weight function w(.), which maps each e in E to some real valued weight. Routing table NetworkNum NextHop vs. Forwading table NetworkNum Iface MAC addr 10 eth0 8:0:2:e4:b:1:2 The problem is to find the lowest-cost path between any two nodes, where the cost of a path equals the sum of the weights of all edges in the path. This can be re-stated as the all-pairs shortest path problem. CSCI 363 Computer Networks 15 CSCI 363 Computer Networks 16 CSCI 311 Flashback: Single-Source Shortest Paths In a single-source shortest paths problem we are given a weighted, directed graph G=(V,E), with a weight function on E that maps edges to real valued weights. The weight of a path is defined as the sum of its constituent edges: Proposal Each node discovers its neighbors and tells one specific node (the leader) what they find. The leader runs an algorithm to solve the all-pairs shortest path problem, computing routing tables for each node. The leader communicates the routing table to each node, which stores it in nonvolatile memory in each of the nodes. A shortest path from vertex u to vertex v is defined as any path p with weight: Question: What are the problems with this method? We will consider this problem only for non-negative weights. CSCI 363 Computer Networks 17 CSCI 363 Computer Networks 18

4 Distance Vector Routing Distance Vector Routing A s view: vector Dest Cost NextHop B 1 B C 1 C D - E 1 E F 1 F G - Global view Info Distance to node at node A B C D E F G A B C D E 1 0 F G CSCI 363 Computer Networks 19 Every node starts by building it s own local view of what nodes are 1 hop away. Next, every node sends its vector to its directly connected neighbors. F tells A that it can reach G at cost 1. A knows it can reach F at cost 1, so it updated its own vector to indicate that it can reach G at cost 2. If A were to discover another route to G at a cost higher than 2, it would ignore it and leave its vector as it is. After a few iterations of these exchanges, the routing table converges to a consistent state. Question: How would this method deal with link failures? CSCI 363 Computer Networks 20 Distance Vector Routing The Count-to-infinity Problem Question: How can you detect that a node has failed? Periodic updates: Every t seconds, send your local info to your neighbors. This allows other nodes to know that you are running. Triggered updates: Every time you learn new information from a neighbor that leads you to update your local vector, you send the recomputed vector to all your neighbors. The routing table doesn t converge or stabilize. Link (A,E) goes down. A periodic update kicks in and A advertises that its distance to E is infinity. At about the same time, B and C tell each other that they can reach E in 2 hops. B knows now that it can t communicate with E via A, but concludes that it can send traffic to C which says it can reach A in 2 hops. Now, B is thinking that its distance to E is 3 hops and it lets A know about that. Argh, now A is going to think it can reach E in 4 hops and it will tell C of this fact Where does this end? CSCI 363 Computer Networks 21 CSCI 363 Computer Networks 22 Solutions for 2-node loops Count-to-infinity: Cap infinity at some maximum number of hops that allow a packet to go all the way across the network. Reduce time to convergence: Split-horizon when a node sends a routing update to its neighbors, it does not send the routes it learned from a neighbor back to that neighbor. Reduce time to convergence: Split-horizon with poison reverse communicate back to the sending neighbor but poison the route with negative information (infinity) so that it doesn t end up used as intermediate node in a route. CSCI 363 Computer Networks 23 Link State Routing Assumptions: Each node can discover the state of the link to its neighbors and the cost of each link. Basic principle: If every node knows how to reach its directly connected neighbors, one can spread the local knowledge of each node to all other nodes in the network so that every node can construct a the network weighted graph. With this knowledge, a node can always determine the shortest path to any other node in the network. CSCI 363 Computer Networks 24

5 Link State Routing Mechanisms Reliable dissemination of link-state information! flooding. Calculation of routes from the sum of all the accumulated link-state knowledge. Reliable Flooding Question: If you are a node and you want to tell your neighbors the state of the links incident to you, what should be contained in the information packets that you pass to them?! Underlying Problems: A packet should reflect the state of your links at a given point in time. You need to ensure that old link-state information eventually stops circulating around the network. CSCI 363 Computer Networks 25 CSCI 363 Computer Networks 26 Reliable Flooding Question: How can one guarantee that the linkstate packets sent from a node will definitely arrive at its neighbors? Question: How does one deal with the possibility of having multiple, contradictory copies of a node s link-state packets circulate the network at the same time? CSCI 363 Computer Networks 27 Link-State Packet (LSP) CreatorID: identity of the packet creator. NeighborsList: a list of tuples like <NeighborId, link cost>. SequenceNumber: a counter value that places this packet in the context of all LSPs sent out by the creator of this packet. TTL: time to live in number of hops. Question: When should a node send out an LSP? CSCI 363 Computer Networks 28 Dealing with LSPs An LSP is sent out when: A periodic time expires. A topology change is detected.! Important: Routing messages, that is LSPs, are overhead in the network and they should be kept to a minimum. CSCI 363 Computer Networks 29 Assumptions: Route Calculation (based on Dijkstra s shortest-path algorithm) A node constructs a graph to represent the network to the best of its knowledge (received LSPs). N: V, number of nodes. l(i,j): Non-negative weight of edge (i,j). M: nodes set of nodes incorporated so far for some node s. C(n): cost of the path from node s to node n. Algorithm for a node s: M = {s} for each n in N-{s} do: C(n)=l(s,n) while (N not equal M) M=M U{w} such that C(w)=min{for all w in (N-M)} for each n in (N-M) do: C(n)=min{C(n), C(w)+l(w,n)} CSCI 363 Computer Networks 30

6 Properties of Link-State Routing Stabilizes quickly. Keeps routing control traffic low. Responds rapidly to topology changes. Doesn t scale well: the amoung of information stored in each node is large. Comparison of routing algorithms: Link state vs. Distance Vector CSCI 363 Computer Networks 31 CSCI 363 Computer Networks 32 Distance Vector Routing Every node starts by building it s own local view of what nodes are 1 hop away. Next, every node sends its vector to its directly connected neighbors. F tells A that it can reach G at cost 1. A knows it can reach F at cost 1, so it updated its own vector to indicate that it can reach G at cost 2. If A were to discover another route to G at a cost higher than 2, it would ignore it and leave its vector as it is. After a few iterations of these exchanges, the routing table converges to a consistent state. Link State Routing Assumptions: Each node can discover the state of the link to its neighbors and the cost of each link. Basic principle: If every node knows how to reach its directly connected neighbors, one can spread the local knowledge of each node to all other nodes in the network so that every node can construct a the network weighted graph. With this knowledge, a node can always determine the shortest path to any other node in the network. CSCI 363 Computer Networks 33 CSCI 363 Computer Networks 34 Properties of Link-State Routing Stabilizes quickly. Keeps routing control traffic low. Responds rapidly to topology changes. Doesn t scale well: the amount of information stored in each node is large. Subnetting Question: What makes it stabilize quickly? Question: What can be done to improve scalability? Question: What does it take to mess up routing for everyone? CSCI 363 Computer Networks 35 CSCI 363 Computer Networks 36

7 Global addresses Scenario: Organization X builds local area network with 27 hosts. After 29 days of operation in isolation from the global Internet, Organization X decides that it needs to be on the Internet. Question: How can Organization X join the Internet? CLASS A CLASS B CLASS C Dealing with a network Question: So, Organization X received a network identifier What class of network should it be given to minimize the waste of global IP addresses? What if it has 257 hosts? CLASS A CLASS B CLASS C Question: How would Network Address Translation help? CSCI 363 Computer Networks 37 CSCI 363 Computer Networks 38 Network Address Translation (NAT) local addresses global addresses Subnetting Take a network address and break it up into subnets that can be assigned to individual physical networks globally unique NAT Box Question: What does NAT do to IPs service model? Question: What happens to application messages that contain IP addresses? CSCI 363 Computer Networks 39 Define a subnet mask to help create a new level of hierarchy in the addressing scheme. The bitwise AND of the subnet mask with the full address gives the subnet number. Example: Take host address and subnet mask and compute the subnet number. CSCI 363 Computer Networks 40 Example of Subnetting All hosts in a subnet are configured with the same subnet mask. Question: What does subnetting do to routing as we know it? What happens to the format of forwarding tables? Question: What does subnetting do to ARP? SubnetNumber SubnetMask NextHop eth eth R2 CSCI 363 Computer Networks 41 Datagram Forwarding Algorithm D = destination IP address for each forwarding table entry <SubnetNumber,SubnetMask,NextHop> D1 = SubnetMask & D if (NextHop is an interface) deliver datagram directly to destination else deliver datagram to NextHop (a router) CSCI 363 Computer Networks 42

8 Fine Points on Subnetting The subnet mask does not need to align on byte boundaries. (You don t even have to have contiguous 1 s, although that is not recommended.) It is possible to put multiple subnets on the same physical network, but hosts on the same physical network may then have to go through a router to talk to each other. From outside the subnetted domain, the whole thing is viewed as a single network. For this reason, subnets should be kept geographically close. CSCI 363 Computer Networks 43 Global addresses Scenario: Organization X builds local area network with 27 hosts. After 29 days of operation in isolation from the global Internet, Organization X decides that it needs to be on the Internet. Question: How can Organization X join the Internet? CLASS A CLASS B CLASS C CSCI 363 Computer Networks 44 Dealing with a network Question: So, Organization X received a network identifier What class of network should it be given to minimize the waste of global IP addresses? What if it has 257 hosts? CLASS A Network Address Translation (NAT) local addresses global addresses globally unique NAT Box CLASS B CLASS C Question: How would Network Address Translation help? CSCI 363 Computer Networks Question: What does NAT do to IPs service model? Question: What happens to application messages that contain IP addresses? CSCI 363 Computer Networks 46 Address Assignment Efficiency Organization X requests IP addresses for its physical network with 10 hosts. It receives a class C address. Question: What is the address assignment efficiency? CLASS A CLASS B CLASS C What if you could create a virtual network to contain only as many addresses as the hosts in Organization X? Address Assignment Efficiency 2-host network: assigned a Class C address! Efficiency: 2/254 = 0.78% 256-host network: assigned a Class B address! Efficiency: 256/65,534 = 0.039% How efficiently is the IP address space being used? CSCI 363 Computer Networks 47 CSCI 363 Computer Networks 48

9 Subnetting Example of Subnetting Take a network address and break it up into subnets that can be assigned to individual physical networks. Define a subnet mask to help create a new level of hierarchy in the addressing scheme. The bitwise AND of the subnet mask with the full address gives the subnet number. Example: Take host address and subnet mask and compute the subnet number. eth0 eth1 All hosts in a subnet are configured with the same subnet mask. Question: What does subnetting do to routing as we know it? What happens to the format of forwarding tables? R1 SubnetNumber SubnetMask NextHop eth eth R2 CSCI 363 Computer Networks 49 CSCI 363 Computer Networks 50 Datagram Forwarding Algorithm D = destination IP address for each forwarding table entry <SubnetNumber,SubnetMask,NextHop>! D1 = SubnetMask & D! if (NextHop is an interface)!! deliver datagram directly to destination! else!! deliver datagram to NextHop (a router) Fine Points on Subnetting The subnet mask does not need to align on byte boundaries. (You don t even have to have contiguous 1 s, although that is not recommended.) It is possible to put multiple subnets on the same physical network, but hosts on the same physical network may then have to go through a router to talk to each other. From outside the subnetted domain, the whole thing is viewed as a single network. For this reason, subnets should be kept geographically close. CSCI 363 Computer Networks 51 CSCI 363 Computer Networks 52 Autonomous Systems and Interdomain Routing Classless Routing In order to provide network scalability, we approach the problem of routing using a hierarchical view of the system. We define domains or autonomous systems as interconnected collections of physical networks. Inside an AS, routers use protocols like RIP or OSPF. Once we interconnect ASs, we need to define another level of routing. CSCI 363 Computer Networks 53 CSCI 363 Computer Networks 54

10 Possible Policies on Class B Address Assignment Scenario: An Autonomous System (AS) requests a Class B address. 1) If number of hosts is close to 64K, grant request, otherwise deny it. 2) Instead of giving one Class B address, give multiple Class C addresses to cover all the hosts. CSCI 363 Computer Networks 55 The Multiple Class C Addresses Solution Scenario: One AS called X! 16 Class C network numbers. Question: How many entries for AS X will appear in an Internet backbone router? Question: What if we had given it only one Class B network? What would the address assignment efficiency be? Question: How could we reduce the impact of multiple Class C addresses on routing table size? CSCI 363 Computer Networks 56 Classless Interdomain Routing (CIDR) Goal: Minimize the number of routes that a router needs to know while keeping address assignment efficiency high by giving out contiguous blocks of Class C addresses. Example: top 20 bits remain constant CLASS B: 16 bits Host 20 bits 12 bits Network CLASS C: 8 bits Host Host CIDR In order to make this work, we need to: Assign contiguous blocks of Class C addresses. Each block must contain a number of class C networks that is a power of 2. Use interdomain routing that understands classless addresses (network number can be of any length in number of bits). Routing protocols see network numbers as: <length, value> This is analogous to subnetting: <mask, value> CSCI 363 Computer Networks 57 CSCI 363 Computer Networks 58 CIDR vs. Subnetting Enhanced Route Aggregation Multiple network numbers Multiple physical networks Physical Network One address Physical Network 1 Physical Network One network number Route aggregation, or supernetting. Physical Network 3 Both X and Y are accessible via the same provider network, the ISP advertises a single route for both using the 19-bit prefix they share. If addresses are assigned carefully, better route aggregation becomes possible. CSCI 363 Computer Networks 59 CSCI 363 Computer Networks 60

11 Interdomain Routing: The Border Gateway Protocol domain domain Autonomous Systems Goal: To hierarchically aggregate routing information in a large internetwork to improve scalability. Border routers: this is the default destination of all packets bound to hosts outside the AS. The AS model decouples the intradomain routing that happens within one AS from what is done in another AS. Prefix: as in classless routing, this is expressed as IP/length, i.e /20. CSCI 363 Computer Networks 61 CSCI 363 Computer Networks 62 The BGP Model of the Internet BGP Routing Peering point Consumer ISP Small corporation Large corporation Backbone service provider Large corporation Stub AS: Only one connection to another AS. Consumer ISP Consumer ISP Peering point Multihomed AS: An AS with connections to multiple ASs, which refuses to carry external traffic. Transit AS: An AS with connections to multiple Ass, which carries internal and external traffic. CSCI 363 Computer Networks 63 Challenges: Scale (over 140,000 prefixes), Domains are autonomous and can assign arbitrary metrics to its internal paths, ASs can only cooperate if they can trust one another to publicize accurate routing information and to carry out their promises, Policies should be flexible to allow ASs freedom of action. This choice may override optimal paths and determine the use of paths that are good enough. CSCI 363 Computer Networks 64 AS1 TCP AS2 TCP TCP BGP Routing AS3 Each domain determines at least one node to be it s BGP speaker (border gateways need not be the same nodes). BGP advertises complete paths (enumerated lists of ASs) to reach a certain network. This enables policies to be tailored to the AS wishes and also makes it easy to detect routing loops. AS identifications are unique 16- bit values assigned by a central authority. An AS advertises routes that are good for itself: the speaker picks a favorite. A speaker is under no obligation to advertise routes that it doesn t want used. Speakers can withdraw routes. Integrating Interdomain and Intradomain Routing Stub AS: The border router injects a default route into the intradomain routing protocol. Multihomed and Transit ASs: The border routers inject routes that they have learned from outside the AS. Transit ASs: The information learned from BGP may be too much to inject into the intradomain protocol: if a large number of prefixes in inserted, large link-state packets will be circulated and path calculations will get very complex. CSCI 363 Computer Networks 65 CSCI 363 Computer Networks 66

12 Addresses and Routing 128-bit addresses (IPv4: 32-bit addresses). IPv6 1,500 IPv6 addresses per square foot for the whole planet! CSCI 363 Computer Networks 67 CSCI 363 Computer Networks 68 Address Space Allocation Prefix Use Reserved Unassigned Reserved for NSAP allocation Reserved for IPX allocation , , 0001 Unassigned 1 Aggregatable Global Unicast Classes A, B, and C 010, 011, 100, 101, 110, 1110, Unassigned , , , Link local use May not be unique Site local use May not be unique Multicast Class D CSCI 363 Computer Networks 69 Address Notation X:X:X:X:X:X:X:X where X is a 16-bit value When there are many consecutive 0s, omit them: 47CD:0000:0000:0000:0000:0000:0000:A456:0124 becomes 47CD::A456:0124 (double colon means a group of 0s) Two types of IPv6 address can contain embedded IPv4 addresses. For example, an IPv4 host address becomes ::FFFF: (the last 32 bits are an IPv4 address) This notation facilitates the extraction of an IPv4 address from an IPv6 address. CSCI 363 Computer Networks 70 Aggregatable Global Unicast Addresses 001 prefix: How are these addresses assigned to ISPs, autonomous systems, networks, hosts, and routers? Subscriber: non-transit AS (stub and multihomed) Provider: transit AS Direct: connected directly to subscribers Indirect or Backbone network: connected to other providers Plan: Aggregate routing information to reduce the burden on intradomain routers. Assign a prefix to a direct provider; within the provider assign longer prefixes that reach its subscribers. Aggregatable Global Unicast Addresses Plan: Aggregate routing information to reduce the burden on intradomain routers. Assign a prefix to a direct provider; within the provider assign longer prefixes that reach its subscribers. Question: What is the drawback in this plan? Question: How can this drawback be addressed? CSCI 363 Computer Networks 71 CSCI 363 Computer Networks 72

13 Packet Format IPv4 IPv6 CSCI 363 Computer Networks 73

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

Overview 4.2: Routing

Overview 4.2: Routing Overview 4.2: Routing Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph A 6 1

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 16/08/2018 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

Chapter 4: Advanced Internetworking. Networking CS 3470, Section 1

Chapter 4: Advanced Internetworking. Networking CS 3470, Section 1 Chapter 4: Advanced Internetworking Networking CS 3470, Section 1 Intra-AS and Inter-AS Routing a C C.b b d A A.a a b A.c c B.a a B c Gateways: perform inter-as routing amongst themselves b perform intra-as

More information

Routing in Internet. Problem. Given set of nodes, how do routers acquire info about neighbors to construct the routing tables?

Routing in Internet. Problem. Given set of nodes, how do routers acquire info about neighbors to construct the routing tables? Routing in Internet 88lecture4.ppt Pasi Lassila Problem Given set of nodes, how do routers acquire info about neighbors to construct the routing tables? Requirements: distributed algorithms surviving link

More information

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:

More information

Chapter 3 Internetworking

Chapter 3 Internetworking Chapter 3 Internetworking Basic Internetworking (IP) (cont d) Datagram forwarding in IP Every datagram contains the IP address of the destination host If directly connected to destination network, then

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

Routing. Outline. Algorithms Scalability

Routing. Outline. Algorithms Scalability Routing Outline Algorithms Scalability 1 Internetworking What is internetwork An arbitrary collection of networks interconnected to provide some sort of host-host to packet delivery service A simple internetwork

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

HY 335 Φροντιστήριο 8 ο

HY 335 Φροντιστήριο 8 ο HY 335 Φροντιστήριο 8 ο Χειμερινό Εξάμηνο 2009-2010 Παπακωνσταντίνου Άρτεμις artpap@csd.uoc.gr 4/12/2009 Roadmap IP: The Internet Protocol IPv4 Addressing Datagram Format Transporting a datagram from source

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Unit 3: Dynamic Routing

Unit 3: Dynamic Routing Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about

More information

Basic Idea. Routing. Example. Routing by the Network

Basic Idea. Routing. Example. Routing by the Network Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

Routing by the Network

Routing by the Network Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

Routing Unicast routing protocols

Routing Unicast routing protocols Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type

More information

Lecture 3: Packet Forwarding

Lecture 3: Packet Forwarding Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR

More information

Chapter 19 Network Layer: Logical Addressing

Chapter 19 Network Layer: Logical Addressing Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Routing. Routing. Overview. Overview. Routing vs. Forwarding. Why Routing

Routing. Routing. Overview. Overview. Routing vs. Forwarding. Why Routing Routing Dr. Arjan Durresi Department of Computer Science Louisiana State University Overview Routing vs. Forwarding Routing Algorithms, Distance Vector, Link State Dijkstra s Algorithm ARPAnet Routing

More information

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

Routing. Jens A Andersson Communication Systems

Routing. Jens A Andersson Communication Systems Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

COMP 631: NETWORKED & DISTRIBUTED SYSTEMS 9/6/16 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS. IP Addressing. Jasleen Kaur. Fall 2016

COMP 631: NETWORKED & DISTRIBUTED SYSTEMS 9/6/16 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS. IP Addressing. Jasleen Kaur. Fall 2016 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS IP Addressing Jasleen Kaur Fall 2016 1 How to Deal With Heterogeneity & Scale? Requirements from IP addressing: Should be globally unique Should facilitate easy

More information

TDC 363 Introduction to LANs

TDC 363 Introduction to LANs TDC 363 Introduction to LANs Routing Protocols and RIP Greg Brewster DePaul University TDC 363 1 Dynamic Routing Routing Protocols Distance Vector vs. Link State Protocols RIPv1 & RIPv2 RIP Problems Slow

More information

IP Addresses. IP Addresses

IP Addresses. IP Addresses IP Addresses Introductory material. IP Addressing Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses ting CIDR IP Version 6 addresses An entire module

More information

Address Translation. Map IP addresses into physical addresses destination host next hop router

Address Translation. Map IP addresses into physical addresses destination host next hop router Address Translation Map IP addresses into physical addresses destination host next hop router Techniques encode physical address in host part of IP address table-based ARP table of IP to physical address

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the

More information

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address Outline IP The Internet Protocol o IP Address IP subnetting CIDR o ARP Protocol o IP Function o Fragmentation o NAT o IPv6 2 IP Address o Hostname & IP Address IP Address o The Address ping www.nu.ac.th

More information

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

Unicast Routing. TCP/IP class

Unicast Routing. TCP/IP class Unicast Routing TCP/IP class Routing Protocols intro RIP and son of RIP OSPF BGP odd bodkins NAT TCP/IP Internetworking Protocols 2 divide routing world into 3 parts topology IETF ISO/OSI same link or

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

Internetworking. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork

Internetworking. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork UNIT - II Internetworking An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. different kinds of network technologies

More information

Copyright 2010, Elsevier Inc. All rights Reserved

Copyright 2010, Elsevier Inc. All rights Reserved Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie C 3 Internetworking Copyright 2010, Elsevier Inc. All rights Reserved Switching and Forwarding Store-and-Forward Switches

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

Routing in the Internet

Routing in the Internet Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways) Exercise Sheet 4 Exercise 1 (Routers, Layer-3-Switches, Gateways) 1. What is the purpose of Routers in computer networks? (Also explain the difference to Layer-3-Switches.) 2. What is the purpose of Layer-3-Switches

More information

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting Quiz v 10/30/2013 (Wednesday), 20 mins v Midterm question (available on website) v TCP basics Segment structure and fields Flow control (rwnd) Timeout interval v TCP Congestion control Phases transition

More information

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking. Outline 5-44 Computer Networking Lecture 9 Protocol Traditional addressing CIDR addressing Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Forwarding examples 5-44

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16 CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 16 Announcements Midterm II March 21st (One week from today) In class Same format as last time Will cover all material since Midterm

More information

To contain/reduce broadcast traffic, we need to reduce the size of the network (i.e., LAN).

To contain/reduce broadcast traffic, we need to reduce the size of the network (i.e., LAN). 2.3.3 Routers 2.3.3.1 Motivation Bridges do not stop broadcast traffic. This can lead to broadcast storms (e.g., more than 100 nonunicast frames/sec) which can be catastrophic. This can bring the network

More information

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Goal is to use this opportunity (and not to find the lowest common denominator

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

CS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray

CS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray CS 457 Networking and the Internet Fall 2016 Indrajit Ray Problems Earlier we saw how to connect one node to another, or to an existing network. How do we build networks of global scale? How do we interconnect

More information

ECE 428 Internet Protocols (Network Layer: Layer 3)

ECE 428 Internet Protocols (Network Layer: Layer 3) ECE 428 Internet Protocols (Network Layer: Layer 3) 1 Done so far MAC protocols (with PHYsical layer) Transport bits from one node to another. Key element: Determine WHEN to transmit DLC protocol (running

More information

Chapter 7: Routing Dynamically. Routing & Switching

Chapter 7: Routing Dynamically. Routing & Switching Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

IP Addressing & Interdomain Routing. Next Topic

IP Addressing & Interdomain Routing. Next Topic IP Addressing & Interdomain Routing Next Topic IP Addressing Hierarchy (prefixes, class A, B, C, subnets) Interdomain routing Application Presentation Session Transport Network Data Link Physical Scalability

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways) Solution of Exercise Sheet 4 Exercise 1 (Routers, Layer-3-Switches, Gateways) 1. What is the purpose of Routers in computer networks? (Also explain the difference to Layer-3-Switches.) They forward packets

More information

Network Protocols. Routing. TDC375 Winter 2002 John Kristoff - DePaul University 1

Network Protocols. Routing. TDC375 Winter 2002 John Kristoff - DePaul University 1 Network Protocols Routing TDC375 Winter 2002 John Kristoff - DePaul University 1 IP routing Performed by routers Table (information base) driven Forwarding decision on a hop-by-hop basis Route determined

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Lecture 12. Introduction to IP Routing. Why introduction? Routing

Lecture 12. Introduction to IP Routing. Why introduction? Routing Lecture. Introduction to IP Routing Why introduction? Routing: very complex issue need in-depth study entire books on routing our scope: give a flavour of basic routing structure and messaging give an

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Review of Internet Architecture and Protocols

Review of Internet Architecture and Protocols Review of Internet Architecture and Protocols Professor Guevara Noubir Northeastern University noubir@ccs.neu.edu Lecture Reference Textbook: (source of some diagrams) Computer Networks: A Systems Approach,

More information

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How

More information

Computer Networks ICS 651. IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery

Computer Networks ICS 651. IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery Computer Networks ICS 651 IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery Routing Information Protocol DV modified with split horizon and poisoned reverse distance

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene

More information

Computer Networks CS 552

Computer Networks CS 552 Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu 1. Link Layer, Multiple access 2. IP addressing, CIDR, NAT 3. IP/L3 routing, OSPF (link state), RIP(DV), Issues 4. L2 routing

More information

Internet Protocol (IP)

Internet Protocol (IP) (IP) Guevara Noubir Textbook: Chapter 4. Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Lecture Outline Addressing IP over LAN Rou;ng IPv6 IP Internet Concatena;on of Networks

More information

CS118 Discussion Week 7. Taqi

CS118 Discussion Week 7. Taqi CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.15 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Administrivia Homework: #2 due today #3 out today, due in two weeks (same date as midterm) No lecture next week Reading Week Midterm in two weeks 60

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

CompSci 356: Computer Network Architectures. Lecture 13: Dynamic routing protocols: Link State Chapter 3.3.3, Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 13: Dynamic routing protocols: Link State Chapter 3.3.3, Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 13: Dynamic routing protocols: Link State Chapter 3.3.3, 3.2.9 Xiaowei Yang xwy@cs.duke.edu Today Clarification on RIP Link-state routing Algorithm Protocol:

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

CS4/MSc Computer Networking. Lecture 4 The network layer: Forwarding, Routing, IP and Internet routing protocols

CS4/MSc Computer Networking. Lecture 4 The network layer: Forwarding, Routing, IP and Internet routing protocols CS4/MSc Computer Networking Lecture 4 The network layer: Forwarding, Routing, IP and Internet routing protocols Computer Networking, Copyright University of Edinburgh 2005 Network layer services External

More information