Telecommunication Protocols Laboratory Course. Lecture 3

Size: px
Start display at page:

Download "Telecommunication Protocols Laboratory Course. Lecture 3"

Transcription

1 Telecommunication Protocols Laboratory Course Lecture 3

2 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols Key issue: how to determine who gets to use the channel when there is competition for it MAC is a sub-layer of DLL Today: we go one layer up, to NETWORK LAYER (NL) We study routing algorithms and NL protocols Focus on NL in Internet April 5,

3 Network layer Role: to get packets from source all the way to the destination This may require many hops at intermediate routers on the way Lowest layer dealing with end-to-end transmission DLL was moving frames from one end of the wire to the other To implement its role, NL has to Know the topology of the communication subnet (all routers) Choose appropriate paths through it, perhaps to avoid congestion Dealing with possibly different networks for source and destination April 5,

4 Network Layer Design Issues Services provided to the transport layer Internal design of the subnet April 5,

5 Context in which NL protocols operate Carrier s equipment routers connected by transmission lines Customer s equipment hosts and possibly also routers Leased lines from host/customer router to carrier s equipment

6 Store-and-Forward Packet Switching Mechanism Equipment used as follows A host with a packet sends it to its nearest router Packet stored until it has fully arrived, so checksum can be verified Then forwarded to the next router along the path until destination host is reached There it is delivered Forwarding done based on some local information kept in routing tables Routing algorithms: manage the tables and make routing decisions April 5,

7 Services provided to TL NL services designed with following goals Services should be independent of the router technology TL should be shielded from the number, type, topology of present routers The network address made available to TL should use a uniform numbering plan Lots of freedom in writing detailed specifications of the services to be offered to TL battle between connectionless and connection-oriented services April 5,

8 Connectionless services Advocated by Internet community Experience: 30 years with a real, working computer network Routers job is only to move packets around Subnet inherently unreliable Hosts should accept this and do error control and flow control Network service should be connectionless, having primitives SEND PACKET and RECEIVE PACKET No packet ordering or flow control since hosts do that Each packet must carry the full destination address April 5,

9 Connectionless service implementation Packets injected into subnet individually and routed independently of the others No advance setup needed Packets datagrams (analogy with telegrams) Subnet datagram subnet April 5,

10 Implementation of Connectionless Service Routing within a diagram subnet. April 5,

11 Connection-oriented services Advocated by telephone companies Experience: 100 years success with world-wide telephone systems Subnet should provide a reliable, connection-oriented service Quality of service is the dominant factor Hard to achieve w/o connections in subnet, especially for real-time traffic such as voice and video April 5,

12 Connection-oriented service implementation Path from source S to destination D has to be established before data packets are sent Path virtual circuit (VC) (analogy with physical circuits set up in telephone systems) Subnet virtual circuit subnet Idea: avoid choosing a new route for each packet When connection established Route from S to D chosen as part of the communication setup Route stored in router tables and used for all traffic flowing in connection Each packet carries an identifier telling which VC it belongs to When connection released, VC terminated

13 Implementation of Connection-Oriented Service Routing within a virtual-circuit subnet.

14 Virtual-Circuit and Datagram Subnets 5-4

15 Routing algorithm Chooses the routes and data structures to use for routing packets from S to D Differently expressed: that part of NL software responsible for deciding which output line an incoming packet should be transmitted on Routing and forwarding processes inside router FWD handles each packet as it arrives, looking up the outgoing line to use for it in routing tables ROUT responsible for filling in and updating the routing tables April 5,

16 Desired properties of the routing algorithms Correctness Simplicity Stability Robustness Fairness Optimality April 5,

17 Conflict between fairness and optimality April 5,

18 Types of algorithms Non-adaptive (static) Do not consider measurements/estimates of current traffic or topology in their routing decisions The route from I to J ( I, J) computed in advance, off-line and downloaded when network booted Adaptive (dynamic) Routing decisions change to reflect changes in topology and traffic These algorithms differ in Where they get their information (locally, from adjacent/all routers) When they change routes (every t sec, when load/topology changes) What metric is used for optimization (distance, hops nr, transit time) April 5,

19 Optimality principle General statement about optimal routes without regard to network topology or traffic If router J is on the optimal path from I to K (routers both), then the optimal path from J to K falls along same route The set of optimal routes from all sources to a given destination form a tree routed at destination: SINK Tree Goal of all routing algorithms: find and use sink tree The principle and the sink tree benchmark against which other routing algorithms can be measured April 5,

20 The Optimality Principle (a) A subnet. (b) A sink tree for router B. April 5,

21 Routing Algorithms Shortest Path Routing Flooding Distance Vector Routing Link State Routing Hierarchical Routing Broadcast Routing April 5,

22 Shortest Path Routing Non-adaptive algorithm Idea: build a graph of the subnet, so that: router node, communication line arc Algorithm finds shortest path between S and D in the graph, with respect to Nr of hops Geographic distance Mean queuing and transmission delay Labels could also be computed as function of the above April 5,

23 Shortest Path Routing example The first 5 steps used in computing the shortest path from A to D. The arrows indicate the working node.

24 Flooding algorithm Non-adaptive algorithm Every incoming packet is sent out on every outgoing line except the one it arrived on Vast nr of duplicate packets Some damping measures needed April 5,

25 Damping measures in flooding Hop counter in packet header, decremented at every hop, packet discarded when counter=0 Counter initially has the length of path from S to D, or diameter of subnet Sequence number in packet header given by router S Each router needs a list per router to know which numbers from that source already passed If packet has the number on the list, then it is not flooded further Simplification: only a counter k kept and all numbers < k are not flooded Selective flooding: only packets going right are flooded April 5,

26 Flooding usage Military applications Large nr of routers may be blown to bits at any moment Distributed database applications All tables need to get updates concurrently Wireless networks Broadcast properties of radio range is flooding As a metric against which other routing algorithms can be measured Shortest path as every possible path is chosen in parallel => no shorter delay possible April 5,

27 Distance Vector Routing Adaptive algorithm Original ARPANET routing algorithm, used also in Internet as RIP Each router maintains a table (vector) giving The best known distance to each destination Which line to use to get there Table updated by exchanging information with neighbours April 5,

28 Example for calculating the table Assume the metric is delay Assume delay to neighbors known Can be found out with special ECHO packets Once every T msec each router Sends to all neighbors a list of its estimated delays to each destination Receives similar list from neighbors Assume neighbor X has x i delay to get to router i If our router has m delay to get to X => m+x i to get to i It compares all calculations and registers the best one in its new routing table Note: new table is not based on old table April 5,

29 Distance Vector Routing example (a) A subnet. (b) Input from A, I, H, K, and the new routing table for J.

30 Efficiency of distance vector routing It converges to the correct answer but slowly, especially for bad news Known as count-to-infinity problem Attempts to solve it do not work well in general Core of the problem When X tells Y it has a path somewhere, Y has no idea if it itself (Y) is on that path April 5,

31 The count-to-infinity problem April 5,

32 Link State Routing In 79 it replaced distance vector routing in ARPANET Variants used widely today Each router must do the following Discover its neighbors, learn their network address. Measure the delay or cost to each of its neighbors. Construct a packet telling all it has just learned. Send this packet to all other routers. Compute the shortest path to every other router. All delays and the complete topology are experimentally measured and distributed to every router April 5,

33 Learning about the Neighbors When a router is booted It sends a special HELLO packet on each p2p line Router on the other end replies with its address Addresses must be unique April 5,

34 Measuring Line Cost Special ECHO packet sent; the other side requested to reply immediately The round trip is measured and split to 2 => reliable estimate If test conducted several times, average is used This method implies delays are symmetric April 5,

35 Building Link State Packets Each packet has Identity of sender Sequential nr Age List of neighbors, with address and delay Building packets is easy When to build them? Periodically When some significant event occurs (line/neighbor goes down/ comes back or changes properties significantly) April 5,

36 Example of Link State Packets (a) A subnet. (b) The link state packets for this subnet. April 5,

37 Distributing the Link State Packets Trickiest part of algorithm distributing packets reliably Flooding used to distribute each link state packet Sequence numbers used, increased for each new packet sent Routers keep lists of all (source-router, seq-nr) seen: when a packet comes in, it is checked against the lists If new: flooded If old: discarded (already seen or not seen but obsolete) Some problems: when seq. nr. wrap around, when router crashes, when seq. nr. corrupted April 5,

38 Distributing the Link State Packets Age number used (more) Decrement it once per sec; when age=0, packet discarded Decremented also by routers during initial flooding process Refinements: holding area (h-area) When packet P arrives at router to be flooded it is stored shortly in h-area If another packet P comes from same source before P is transmitted, compare seq-nr: if equal then duplicate discarded, if distinct then older one thrown out All packets acknowledged When line is idle, h-area scanned to select packet to send April 5,

39 Computing the new routes Router has now a full set of link state packets so it can construct the subnet graph Each link represented twice, once for each direction These two values can be averaged or used separately Dijkstra s algorithm used (run locally) to construct shortest path to all possible destinations Results of algorithm installed in routing tables and normal operation resumed April 5,

40 Hierarchical Routing Networks grow in size Router routing tables grow proportionally Memory consumed by increasing tables More CPU time needed to scan them More bandwidth needed for sending status reports about them It may not be feasible for every router to have an entry for each other router in large networks Routing should be done hierarchically, like in telephone networks April 5,

41 Hierarchical Routing (more) Routers divided into regions Each router knows all details about routing packets to destinations within its own region Many levels of hierarchy might be needed Saving in table space might mean some longer paths How many levels? N routers, lnn levels, with elnn entries/router ( 79) This result also means increase in path length are ok April 5,

42 Hierarchical Routing example April 5,

43 Broadcast Routing Some applications have hosts needing to send to many/all other hosts Service distributing weather reports/stock market updates Live radio programs Broadcasting to all machines is used Those interested read the data Many methods April 5,

44 Methods of broadcast routing Point-to-point (p2p): source sends a distinct packet to all destinations No special features required from subnet Bandwidth wasteful Source has to keep complete list of all destinations Least desirable Flooding Ill-suited for p2p communications Might be considered if other methods do not work Too many packets, too much bandwidth April 5,

45 Methods of broadcast routing (more) Multi-destination routing Each packet has list of destinations/bitmap indicating desired destinations At a router, destinations checked to see which out-lines needed Router generates new copy of packet for each out-line, including in packet only those destinations that use that out-line => destinations partitioned among out-lines After a sufficient nr of hops, each packet contains only one destination, so can be treated as a normal packet Spanning tree (ST) subset of subnet with all routers and no loop Ifeach router knows which of its lines belong to ST, then it can copy an incoming packet to all ST lines except the one it arrived on Excellent use of bandwidth, optimal approach Each router has to know of some spanning tree April 5,

46 Methods of broadcast routing 3 Reverse path forwarding Attempt to approximate behaviour of previous one, with routers knowing nothing of ST When packet arrives at router, router checks to see if it s on the line normally used to send packets to that source If so, excellent chance that packet followed that route and hence is the first copy to arrive => router forwards copies to all out-lines except the one it arrived on If not, packet discarded as a likely duplicate Reasonably efficient and easy to implement April 5,

47 The Network Layer in the Internet The IP Protocol IP Addresses Internet Control Protocols April 5,

48 Internet: Collection of Subnetworks

49 Communication in Internet TL takes data streams and breaks them up into datagrams Datagrams transmitted through Internet, possibly fragmented When all pieces get to destination, they are reassembled by NL into original datagram Datagram handled to TL which inserts it into the input stream of receiving process April 5,

50 IP (Internet Protocol) Glue that holds Internet together Designed from the beginning with internetworking in mind Provides a best-efforts way to transport datagrams from S to D, without regard whether these machines are on the same network or there are other networks in between April 5,

51 The IP Protocol IP datagram: text part and header part. Above, the IPv4 header. April 5,

52 IPv4 header options Intended as escape for subsequent versions of protocol Have variable length, each begins with a 1-byte code identifying the option Some options are followed by another byte telling the length April 5,

53 IP Addresses 32-bit addresses, each host/router has one Encode network nr and host nr Used in source and destination fields of IP packets IP address does not refer to a host but to a network interface If a host is on 2 networks, should have 2 IPs April 5,

54 Classes for IP Addresses April 5,

55 Special IP Addresses Special IP addresses. April 5,

56 Subnets Problem A single class A/B/C address refers to one network, not a collection of LANs; LANs cannot physically extend too much Solution Network split into several parts (subnets) for internal use so that they still act as one happy network to the outside world How to know where (which subnet) to send an incoming packet? (Table with entries in main router mapping router to host) Addressing convention April 5,

57 Subnets illustration A campus network consisting of LANs for various departments. April 5,

58 Example subnet Class B addresses: 14 bits network nr, 16 bits host nr For a subnet: 14 bits network nr 6 bits subnet nr 10 bits host nr 64 subnets, each with max 1022 hosts This split can be later changed if not ok Main router needs subnet mask to indicate the split: o /22 (22 nr of bits of network + subnet part) April 5,

59 The subnet mask example A class B network sub-netted into 64 subnets. April 5,

60 Internet Control Protocols IP used for data transfer Several control protocols exist ICMP, ARP, RARP, BOOTP, DHCP ICMP (Internet Control Message Protocol) Operation of Internet monitored closely by routers When something unexpected occurs, event is reported by ICMP Also used to test the Internet Types of ICMP messages are defined April 5,

61 The principal ICMP message types 5-61 April 5,

62 ARP Address resolution protocol Problem: IP addresses cannot be used to send packets as DLL hardware does not recognize them Solution: some kind of mapping is needed In ARP Broadcast packet asking who owns IP x? All machines get the packet, check their IP and one host replies => Sender builds Ethernet frame addressed to that host and puts IP packet in payload; receiver does the opposite April 5,

63 Optimization of ARP Cache Machines that had run ARP, cache the result in case it s needed again Sender can avoid another broadcast from receiver if it sends IP-to-Ethernet mapping in ARP packet All machines receiving the broadcast can cache it Boot Every machine broadcasts mapping when booting and everyone caches it Time out Entries in ARP cache should time out in few minutes, to allow for changes Proxy ARP One router can be configured to respond to ARP requests for local networks OR: sending hosts recognize they are sending to a remote host and send all such traffic to default Ethernet address handling all remote traffic April 5,

64 RARP Reverse ARP ARP: IP Ethernet; RARP: Ethernet IP Problem occurs when a diskless workstation WS is booted WS gets the binary image of its OS from remote file server Host asks what s my IP? (with a broadcast message: 11 1) RARP replies upon looking up the Ethernet address in its configuration files Better than embedding IP in binary image, as one image is thus used for all stations Disadvantage host broadcasts locally, so its message cannot be forwarded by routers => RARP server needed on each network April 5,

65 BOOTP Bootstrap protocol Gets around RARP disadvantage by using UDP messages, forwarded to routers Provides WS with additional information IP address of file server holding the memory image IP address of default router Subnet mask Problem Requires manual configuration of tables mapping IP Ethernet April 5,

66 DHCP Dynamic host configuration protocol Eliminates BOOTP s problem by allowing both manual and automatic IP addresses assignment Extension of BOOTP; largely replaces BOOTP and RARP DHCP server assigns IP addresses to hosts asking for one DHCP server may be on remote network and is not reachable by broadcasting DHCP relay agent needed on each LAN Newly booted machines broadcast DHCP DISCOVER packet DHCP relay agent sends packet as unicast to DHCP server Leasing: IP addresses allocated for a finite time April 5,

67 Operation of DHCP April 5,

68 NL simulation You may choose either to simulate a routing algorithm or a NL protocol. Choose from: Routing algorithms Shortest Path Routing Flooding Distance Vector Routing Link State Routing Hierarchical Routing Broadcast Routing NL protocols IP ICMP ARP RARP BOOTP DHCP April 5,

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

5.2 Routing Algorithms

5.2 Routing Algorithms CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5. Routing Algorithms Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

ECE 435 Network Engineering Lecture 11

ECE 435 Network Engineering Lecture 11 ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 5 October 2017 Announcements Back from Memsys. Related things: fast memories for network

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

UNIT 2 ROUTING ALGORITHMS

UNIT 2 ROUTING ALGORITHMS UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

ECE 435 Network Engineering Lecture 11

ECE 435 Network Engineering Lecture 11 ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 11 October 2018 Midterm on Tues Announcements 1 HW#4 Review maine.edu created? What is a

More information

The Internet Protocol

The Internet Protocol The Internet Protocol Stefan D. Bruda Winter 2018 THE INTERNET PROTOCOL A (connectionless) network layer protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 15 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

THE INTERNET PROTOCOL INTERFACES

THE INTERNET PROTOCOL INTERFACES THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

Network Layer. For this purpose the network layer should:

Network Layer. For this purpose the network layer should: Network Layer In the preceding tutorials we have studies how the DLL is responsible for moving the frame one end to the other end of the media, the network layer is responsible for the moving the packets

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Lecture 5: Network Layer Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. Contents The

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 22 IP addressing. ICMP LESSON OBJECTIVE General The lesson will continue the discussion on IPv4 along with the idea of ICMP. Specific The focus areas

More information

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001 Routing Algorithms Main issue is how the routers that constitute the network layer of a network cooperate to find the best routes between all pairs of stations. Routing algorithm at a router decides which

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing Layer 3: Network Layer 9. Mar. 2005 1 INF-3190: Switching and Routing Network Layer Goal Enable data transfer from end system to end system End systems Several hops, (heterogeneous) subnetworks Compensate

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2. CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch

More information

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni 3/4/04 EN44 Network Protocols and lgorithms hapter Routing lgorithms Dr. Ridha Ouni Department of omputer Engineering ollege of omputer and Information Sciences King Saud University References Some slides

More information

THE INTERNET PROTOCOL/1

THE INTERNET PROTOCOL/1 THE INTERNET PROTOCOL a (connectionless) network layer protocol designed for use in interconnected systems of packet-switched computer communication networks (store-and-forward paradigm) provides for transmitting

More information

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007. Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing

More information

Jaringan Komputer. Network Layer. Network Layer. Network Layer. Network Layer Design Issues. Store-and-Forward Packet Switching

Jaringan Komputer. Network Layer. Network Layer. Network Layer. Network Layer Design Issues. Store-and-Forward Packet Switching Network Layer Jaringan Komputer Network Layer Concerned with getting packets from the source all the way to the destination May require making many hops at intermediate routers along the way Contrasts

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

UNIT III. 3.1 Circuit switching vs. packet switching / Packet switched networks. Figure 3.1.1: Switching Techniques

UNIT III. 3.1 Circuit switching vs. packet switching / Packet switched networks. Figure 3.1.1: Switching Techniques UNIT III Circuit switching vs. packet switching / Packet switched networks IP ARP RARP DHCP ICMP Queueing discipline Routing algorithms RIP OSPF Subnetting CIDR Interdomain routing BGP Ipv6 Multicasting

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

Chapter 6. The Network Layer

Chapter 6. The Network Layer Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output

More information

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service Network Layer Design Isues Chapter 5 The Network Layer Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Chapter 5. The Network Layer

Chapter 5. The Network Layer Chapter 5 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (03) Internet Protocol tcp/ip> OSI> Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing

More information

Internetworking. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork

Internetworking. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork UNIT - II Internetworking An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. different kinds of network technologies

More information

Chapter 5. The Network Layer. CEN Chapter 5 1

Chapter 5. The Network Layer. CEN Chapter 5 1 Chapter 5 The Network Layer CEN 445 - Chapter 5 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall: Network Layer The Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 1 2 Contents 4.1.1 Connection-Oriented and Connectionless

More information

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control The Network Layer 1 Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 2 Contents Connection-Oriented (virtual circuit)

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

6 Chapter 6. Figure 1 Required Unique Addresses

6 Chapter 6. Figure 1 Required Unique Addresses 6 Chapter 6 6.1 Public and Private IP Addresses The stability of the Internet depends directly on the uniqueness of publicly used network addresses. In Figure 1 Required Unique Addresses, there is an issue

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging) Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2

More information

ICMP, ARP, RARP, IGMP

ICMP, ARP, RARP, IGMP Internet Layer Lehrstuhl für Informatik 4 Raw division into three tasks: Data transfer over a global network Route decision at the sub-nodes Control of the network or transmission status Routing Protocols

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP

Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 397-480 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP).

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Auxiliary protocols IP is helped by a number of protocols that perform specific tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Multicasting

More information

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at the data link layer. To describe how the mapping of a

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

4. Basic IP Support Protocols

4. Basic IP Support Protocols 4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

The Network Layer. Network Layer Design Objectives

The Network Layer. Network Layer Design Objectives 1 next CITS3002 help3002 CITS3002 schedule The Network Layer The Data Link Layer had the responsibility of reliably transmitting frames across along a single wire (or wireless,...) link. The Network Layer's

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013 Computer Science 425 Distributed Systems CS 425 / ECE 428 Fall 2013 Indranil Gupta (Indy) October 10, 2013 Lecture 14 Networking Reading: Chapter 3 (relevant parts) 2013, I. Gupta, K. Nahrtstedt, S. Mitra,

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

EPL606. Internetworking. Part 2a. 1Network Layer

EPL606. Internetworking. Part 2a. 1Network Layer EPL606 Internetworking Part 2a The majority of the slides in this course are adapted from the accompanying slides to the books by Larry Peterson and Bruce Davie and by Jim Kurose and Keith Ross. Additional

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Lecture on Computer Networks

Lecture on Computer Networks Lecture on Computer Networks Historical Development Copyright (c) 28 Dr. Thomas Haenselmann (Saarland University, Germany). Permission is granted to copy, distribute and/or modify this document under the

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing

More information

The Internet. The Internet is an interconnected collection of netw orks.

The Internet. The Internet is an interconnected collection of netw orks. The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached

More information

Chapter 6. The Network Layer

Chapter 6. The Network Layer Chapter 6 The Network Layer 1 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 15 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture The network layer

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

IP Addressing and Subnetting

IP Addressing and Subnetting IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet

More information

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

William Stallings Data and Computer Communications. Chapter 10 Packet Switching William Stallings Data and Computer Communications Chapter 10 Packet Switching Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the

More information