Networking: Network layer

Similar documents
CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Information Network Systems The network layer. Stephan Sigg

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Chapter 09 Network Protocols

HY 335 Φροντιστήριο 8 ο

TCP /IP Fundamentals Mr. Cantu

EEC-684/584 Computer Networks

II. Principles of Computer Communications Network and Transport Layer

Topics for This Week

Router Architecture Overview

ECE 158A: Lecture 7. Fall 2015

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

IP - The Internet Protocol

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Chapter 12 Network Protocols

internet technologies and standards

Network Layer (4): ICMP

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Network layer: Overview. Network Layer Functions

Lecture 8. Network Layer (cont d) Network Layer 1-1

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Lecture 19: Network Layer Routing in the Internet

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Chapter 4: Network Layer

Chapter 4: Network Layer

Master Course Computer Networks IN2097

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

ECE 4450:427/527 - Computer Networks Spring 2017

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Network Layer: Internet Protocol

Internet Protocol, Version 6

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

EEC-484/584 Computer Networks

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

Chapter 19 Network Layer: Logical Addressing

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Internet Control Message Protocol (ICMP)

Internet Technology 3/23/2016

Planning for Information Network

Lecture 16: Network Layer Overview, Internet Protocol

The Internetworking Problem. Internetworking. A Translation-based Solution

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS4/MSc Computer Networking. Lecture 4 The network layer: Forwarding, Routing, IP and Internet routing protocols

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

ECE 428 Internet Protocols (Network Layer: Layer 3)

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Internetworking Part 2

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer

CSC 4900 Computer Networks: Routing Protocols

Introduction to routing in the Internet

CS4/MSc Computer Networking. Lectures 6-8 The network layer: Forwarding, Routing, IP and Internet routing protocols

Outline. Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Lecture Computer Networks

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

IPv6 : Internet Protocol Version 6

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s)

CHAPTER-2 IP CONCEPTS

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 4: outline. Network Layer 4-1

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

TDTS06: computer Networks

Computer Networking Introduction

CSc 466/566. Computer Security. 18 : Network Security Introduction

Introduction to routing in the Internet

Vorlesung Kommunikationsnetze

CSc 450/550 Computer Networks Internet Routing

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

IP Protocols. ALTTC/Oct

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

internet technologies and standards

CS 457 Lecture 11 More IP Networking. Fall 2011

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Chapter 6. The Network Layer

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

CSCI Topics: Internet Programming Fall 2008

CSEP 561 Internetworking. David Wetherall

Introduction to Internetworking

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Internet protocol stack

Transcription:

control Networking: Network layer Comp Sci 3600 Security

Outline control 1 2 control 3 4 5

Network layer control

Outline control 1 2 control 3 4 5

Network layer purpose: control Role of the network layer is simple, to move packets from a sending host to a receiving host. Two important network-layer functions can be identified: Forwarding: When a packet arrives at a router s input link, the router must move the packet to the appropriate output link. For example, a packet arriving from Host H1 to R1 must be forwarded to the next router on a path to H2. : The network layer must determine the route or path taken by packets as they flow from a sender to a receiver. The algorithms that calculate these paths are referred to as algorithms. A algorithm would determine, for example, the path along which packets flow from H1 to H2.

v4 address control

algorithms build forwarding tables control

Every router has a forwarding table control A router forwards a packet by examining the value of a field in the arriving packet s header, and then using this header value to index into the router s forwarding table. The value stored in the forwarding table entry for that header indicates the router s outgoing link interface to which that packet is to be forwarded. The algorithm may be centralized (e.g., with an algorithm executing on a central site and downloading information to each of the routers) or decentralized (i.e., with a piece of the distributed algorithm running in each router). In either case, a router receives protocol messages, which are used to configure its forwarding table.

Outline control 1 2 control 3 4 5

control In a datagram network, each time an end system wants to send a packet, it stamps the packet with the address of the destination end system and then pops the packet into the network.

packet control As a packet is transmitted from source to destination, it passes through a series of routers. Each of these routers uses the packet s destination address to forward the packet. Specifically, each router has a forwarding table that maps destination addresses to link interfaces; when a packet arrives at the router, the router uses the packet s destination address to look up the appropriate output link interface in the forwarding table. The router then forwards the packet to that output link interface.

tables control Suppose that our router has four links, numbered 0 through 3, and that packets are to be forwarded to the link interfaces as follows:

Longest prefix match control When there are multiple matches, the router uses the longest prefix matching rule; that is, it finds the longest matching entry in the table and forwards the packet to the link interface associated with the longest prefix match.

Outline control 1 2 control 3 4 5

architecture control and management functions collectively referred to as the router control plane, usually implemented in software and execute on the processor (typically a traditional CPU) Forwarding functions collectively referred to as the router forwarding plane

Input ports: control Physical layer function of terminating an incoming physical link Link-layer functions needed to interoperate with the link layer at the other side of the incoming link Lookup function is also performed at the input port; this will occur in the rightmost box of the input port. It is here that the forwarding table is consulted to determine the router output port to which an arriving packet will be forwarded via the switching fabric. Control packets (for example, packets carrying protocol information) are forwarded from an input port to the processor. Term port here, referring to the physical input and output router interfaces, is different from the software ports associated with network applications and sockets

fabric: control The switching fabric connects the router s input ports to its output ports. This switching fabric is completely contained within the router, a network inside of a network router!

ports: control Stores packets received from the switching fabric and transmits these packets on the outgoing link by performing the necessary link-layer and physical-layer functions. When a link is bidirectional (that is, carries traffic in both directions), an output port will typically be paired with the input port for that link

processor: control The processor executes the protocols, maintains tables and attached link state information, and computes the forwarding table for the router. It also performs the network management functions

Outline control 1 2 control 3 4 5

control The lookup performed in the input port is central to the router s operation. It is here that the router uses the forwarding table to look up the output port to which an arriving packet will be forwarded via the switching fabric. The forwarding table is computed and updated by the processor, with a shadow copy typically stored at each input port. Search through the forwarding table looking for the longest prefix match Once a packet s output port has been determined via the lookup, the packet can be sent into the switching fabric.

Outline control 1 2 control 3 4 5

architecture variation control Which is fastest?

Outline control 1 2 control 3 4 5

control Takes packets that have been stored in the output port s memory and transmits them over the output link. This includes selecting and de-queueing packets for transmission, and performing the needed link-layer and physical-layer transmission functions.

Outline control 1 2 control 3 4 5

control As queues grow large, the router s memory can eventually be exhausted and packet loss will occur when no memory is available to store arriving packets.

port queuing control

Head of line (HOL) blocking in input queuing control

Outline control 1 2 control 3 4 5

control (more to come) control

Outline control 1 2 control 3 4 5

Network layer components control

Outline control 1 2 control 3 4 5

v4 address control

v4 header control

v4 header control Version number. 4 bits specify the protocol version of the datagram. can determine how to interpret the remainder of the datagram. Different versions of use different data-gram formats. Header length. Because an can contain a variable number of options (which are included in the header), these 4 bits are needed to determine where in the datagram the data actually begins. Most datagrams do not contain options, so the typical datagram has a 20-byte header. Type of service. included in the v4 header to allow different types of datagrams (for example, datagrams particularly requiring low delay, high throughput, or reliability) to be distinguished from each other. For example, it might be useful to distinguish real-time datagrams (such as those used by an telephony application) from non-real-time traffic (for example, FTP).

v4 header control length. total length of the datagram (header plus data), measured in bytes. s are rarely larger than 1,500 bytes. Identifier, flags, fragmentation offset. These three fields have to do with so-called fragmentation. Time-to-live. included to ensure that datagrams do not circulate forever (due to, for example, a long-lived loop) Decremented by one each time the datagram is processed by a router. If the TTL field reaches 0, the datagram must be dropped. Protocol. Used only when an datagram reaches its final destination. Value of this field indicates the specific transport-layer protocol to which the data portion of this datagram should be passed. For example, a value of 6 indicates that the data portion is passed to TCP, while a value of 17 indicates that the data is passed to UDP.

v4 header control Header checksum. aids a router in detecting bit errors in a received datagram. Source and destination addresses. When a source creates a datagram, it inserts its address into the source address field and inserts the address of the ultimate destination into the destination address field. Often the source host determines the destination address via a DNS lookup. Options. allow an header to be extended. Header options were meant to be used rarely. Data (payload). In most circumstances, the data field of the datagram contains the transport-layer segment to be delivered to the destination. Total of 20 bytes of header (assuming no options). If the datagram carries a TCP segment, then each (nonfragmented) datagram carries a total of 40 bytes of header (20 bytes of header plus 20 bytes of TCP header) along with message.

v4 header details control

v4 header details control Version The first header field in an packet is the four-bit version field. Header Length (IHL) The Header Length (IHL) field has 4 bits, which is the number of 32-bit words. Since an v4 header may contain a variable number of options, this field specifies the size of the header (this also coincides with the offset to the data). Differentiated Services Code Point (DSCP) Originally defined as the Type of service (ToS) field. An example is Voice over (Vo), which is used for interactive data voice exchange. Explicit Congestion Notification (ECN) This field is defined in RFC 3168 and allows end-to-end notification of network congestion without dropping packets. ECN is an optional feature that is only used when both endpoints support it and are willing to use it. It is only effective when supported by the underlying network.

v4 header details control Total Length This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets. Sometimes links impose further restrictions on the packet size, in which case datagrams must be fragmented. Fragmentation in v4 is handled in either the host or in routers. Identification This field is an identification field and is primarily used for uniquely identifying the group of fragments of a single datagram. Flags A three-bit field follows and is used to control or identify fragments. They are (in order, from most significant to least significant):

v4 header details control Fragment Offset The fragment offset field is measured in units of eight-byte blocks. It is 13 bits long and specifies the offset of a particular fragment relative to the beginning of the original unfragmented datagram. Time To Live (TTL) An eight-bit time to live field helps prevent datagrams from persisting (e.g. going in circles) on an internet. It is specified in seconds, but time intervals less than 1 second are rounded up to 1. In practice, the field has become a hop countwhen the datagram arrives at a router, the router decrements the TTL field by one. When the TTL field hits zero, the router discards the packet and typically sends an Time Exceeded message to the sender. The program traceroute uses these Time Exceeded messages to print the routers used by packets to go from the source to the destination. Protocol This field defines the protocol used in the data portion of the datagram.

v4 header details control Header Checksum The 16-bit checksum field is used for error-checking of the header. When a packet arrives at a router, the router calculates the checksum of the header and compares it to the checksum field. If the values do not match, the router discards the packet. Errors in the data field must be handled by the encapsulated protocol. Source address This field is the v4 address of the sender of the packet. Note that this address may be changed in transit by a network address translation device. Destination address This field is the v4 address of the receiver of the packet. As with the source address, this may be changed in transit by a network address translation device. Options The options field is not often used. Data The data portion of the packet is not included in the packet checksum. Its contents are interpreted based on the value of the Protocol header field.

v4 fragmentation control

addresses in routers control The boundary between the host and the physical link is called an interface. The boundary between the router and any one of its links is also called an interface. A router thus has multiple interfaces, one for each of its links. Because every host and router is capable of sending and receiving datagrams, requires each host and router interface to have its own address. Thus, an address is technically associated with an interface, rather than with the host or router containing that interface.

v4 address control about 4 billion addresses

Interface addresses and subnets control

Subnet addressing control

Subnet addressing control To determine the subnets, detach each interface from its host or router, creating islands of isolated, with interfaces terminating the end points of the isolated. Each of these isolated is called a subnet.

Three routers interconnecting six subnets control

Obtaining address blocks control ISP provides addresses from a larger block of addresses that had already been allocated to the ISP. For example, the ISP may itself have been allocated the address block 200.23.16.0/20. The ISP, in turn, could divide its address block into eight equal-sized contiguous address blocks and give one of these address blocks out to each of up to eight organizations that are supported by this ISP, as shown below. (underlined the subnet part of these addresses for your convenience.)

control Dynamic Host Configuration Protocol (DHCP) client-server

DHCP process control DHCP discover message, which a client sends within a UDP packet to port 67, broadcast A DHCP server receiving a DHCP discover message responds to the client with a DHCP offer message that is broadcast to all nodes on the subnet, again using the broadcast address of 255.255.255.255. DHCP request. The newly arriving client will choose from among one or more server offers and respond to its selected offer with a DHCP request message, echoing back the configuration parameters. DHCP ACK. The server responds to the DHCP request message with a DHCP ACK message, confirming the requested parameters.

DHCP query response control

Network address translation (NAT) control NAT router behaves to the outside world as a single device with a single address, matching external ports to internal network /port combinations What are problems with NAT?

Outline control 1 2 control 3 4 5

Control Message Protocol () control is often considered part of but architecturally it lies just above, as messages are carried inside datagrams. That is, messages are carried as payload, just as TCP or UDP segments are carried as payload. Similarly, when a host receives an datagram with specified as the upper-layer protocol, it demultiplexes the datagram s contents to, just as it would demultiplex a datagram s content to TCP or UDP. The well-known ping program sends an type 8 code 0 message to the specified host. The destination host, seeing the echo request, sends back a type 0 code 0 echo reply. Most TCP/ implementations support the ping server directly in the operating system; that is, the server is not a process Traceroute uses

Control Message Protocol () control

Outline control 1 2 control 3 4 5

v6 address format control

v6 header control

The most important changes introduced in v6: control Expanded addressing capabilities. v6 increases the size of the address from 32 to 128 bits. This ensures that the world won t run out of addresses. Now, every grain of sand on the planet can be -addressable. In addition to unicast and multicast addresses, v6 has introduced a new type of address, called an address, which allows a datagram to be delivered to any one of a group of hosts. This feature could be used, for example, to send an HTTP GET to the nearest of a number of mirror sites that contain a given document.

The most important changes introduced in v6: control A streamlined 40-byte header. A number of v4 fields have been dropped or made optional. The resulting 40-byte fixed-length header allows for faster of the datagram. A new encoding of options allows for more flexible options.

The most important changes introduced in v6: control Flow labeling and priority. v6 has an elusive definition of a flow. RFC 1752 and RFC 2460 state that this allows labeling of packets belonging to particular flows for which the sender requests special handling, such as a nondefault quality of service or real-time service. For example, audio and video transmission might likely be treated as a flow. On the other hand, the more traditional applications, such as file transfer and e-mail, might not be treated as flows. It is possible that the traffic carried by a high-priority user (for example, someone paying for better service for their traffic) might also be treated as a flow.

The following fields are defined in v6: control Version. This 4-bit field identifies the version number. Not surprisingly, v6 carries a value of 6 in this field. Note that putting a 4 in this field does not create a valid. If it did, life would be a lot simpler, see the discussion below regarding the transition from v4 to v6. Traffic class. This 8-bit field is similar in spirit to the TOS field we saw in v4. Flow label. As discussed above, this 20-bit field is used to identify a flow of datagrams. Payload length. This 16-bit value is treated as an unsigned integer giving the number of bytes in the v6 datagram following the fixed-length, 40-byte data- gram header.

The following fields are defined in v6: control Next header. This field identifies the protocol to which the contents (data field) of this datagram will be delivered (for example, to TCP or UDP). The field uses the same values as the protocol field in the v4 header. Hop limit. The contents of this field are decremented by one by each router that forwards the datagram. If the hop limit count reaches zero, the datagram is discarded. Source and destination addresses. The various formats of the v6 128-bit address are described in RFC 4291. Data. This is the payload portion of the. When the datagram reaches its destination, the payload will be removed from the datagram and passed on to the protocol specified in the next header field.

v6 header details control

v6 header details control Traffic class. 8-bit field is similar in spirit to the TOS field we saw in v4. Flow label. datagrams. 20-bit field is used to identify a flow of Payload length. This 16-bit value is treated as an unsigned integer giving the number of bytes in the v6 datagram following the fixed-length, 40-byte datagram header. Next header. This field identifies the protocol to which the contents (data field) of this datagram will be delivered (for example, to TCP or UDP). The field uses the same values as the protocol field in the v4 header. Hop limit. The contents of this field are decremented by one by each router that forwards the datagram. If the hop limit count reaches zero, the datagram is discarded.

v6 header details control Source and destination addresses. The various formats of the v6 128-bit address are described in RFC 4291. Data. This is the payload portion of the. When the datagram reaches its destination, the payload will be removed from the datagram and passed on to the protocol specified in the next header field.

Backwards compatibility via dual-stack control

Backwards compatibility via tunneling control

Outline control 1 2 control 3 4 5

control While TLS or SSH secure application layer, end-to-end encrypts the network layer. Cryptographic agreement. two communicating hosts to agree on cryptographic algorithms and keys. Encryption of datagram payloads. When the sending host receives a segment from the transport layer, encrypts the payload. The payload can only be decrypted by in the receiving host. Data integrity. allows the receiving host to verify that the datagram s header fields and encrypted payload were not modified while the datagram was en route from source to destination. Origin authentication. When a host receives an datagram from a trusted source (with a trusted key see), the host is assured that the source address in the datagram is the actual source of the datagram.

control When two hosts have an session established between them, all TCP and UDP segments sent between them will be encrypted and authenticated. therefore provides blanket coverage, securing all communication between the two hosts for all network applications.

Outline control 1 2 control 3 4 5

Abstract graph model of a computer network control Given any two nodes x and y, there are typically many paths between the two nodes, with each path having a cost. One or more of these paths is a least-cost path.

Outline control 1 2 control 3 4 5

table building algorithm control A global algorithm computes the least-cost path between a source and destination using complete, global knowledge about the network. That is, the algorithm takes the connectivity between all nodes and all link costs as inputs. broadcast to all nodes in the network, and then centrally perform Dijkstra s algorithm to find the shortest path on a graph

Least cost path and forwarding table for nodule u control

Outline control 1 2 control 3 4 5

table building algorithm control In a decentralized algorithm, the calculation of the least-cost path is carried out in an iterative, distributed manner. No node has complete information about the costs of all network links. Instead, each node begins with only the knowledge of the costs of its own directly attached links. Then, through an iterative process of calculation and exchange of information with its neighboring nodes (that is, nodes that are at the other end of links to which it itself is attached), a node gradually calculates the least-cost path to a destination or set of destinations.

Distance-vector (DV) algorithm control

Outline control 1 2 control 3 4 5

control : interconnected autonomous systems (AS)

Autonomous systems control Autonomous systems (ASs) consist of a group of router typically under the same administrative control (e.g., operated by the same ISP or belonging to the same company network). s within the same AS all run the same algorithm and have information about each other. The algorithm running within an autonomous system is called an intra-autonomous system protocol. Obtaining reachability information from neighboring ASs and propagating the reachability information to all routers internal to the AS, are handled by the inter-as protocol. Since the inter-as protocol involves communication between two ASs, the two communicating ASs must run the same inter-as protocol. In the all ASs run the same inter-as protocol, called BGP4

Outline control 1 2 control 3 4 5

Outline control 1 2 control 3 4 5

Distributed: Information Protocol (R) control Each router maintains a R table known as a table. A router s table includes both the router s distance vector and the router s forwarding table.

Distributed: Information Protocol (R) control

Outline control 1 2 control 3 4 5

Central: Open Shortest Path First (OSPF) control Used by mega-isps OSPF was conceived as the successor to R and as such has a number of advanced features. At its heart, however, OSPF is a link-state protocol that uses flooding of link-state information and a Dijkstra least-cost path algorithm. With OSPF, a router constructs a complete topological map (that is, a graph) of the entire autonomous system. The router then locally runs Dijkstra s shortest-path algorithm to determine a shortest-path tree to all subnets, with itself as the root node. Individual link costs are configured by the network administrator

Outline control 1 2 control 3 4 5

Border Gateway Protocol version 4 (BGP4) control

BGP provides each A.S. a means to: control 1 Obtain subnet reachability information from neighboring ASs. 2 Propagate the reachability information to all routers internal to the AS. 3 Determine good routes to subnets based on the reachability information and on AS policy. Most importantly, BGP allows each subnet to advertise its existence to the rest of the. A subnet screams I exist and I am here, and BGP makes sure that all the ASs in the know about the subnet and how to get there. If it weren t for BGP, each subnet would be isolated, alone and unknown by the rest of the.

Border Gateway Protocol version 4 (BGP4) control BGP session that spans two ASs is called an external BGP (ebgp) session BGP session between routers in the same AS is called an internal BGP (ibgp) session

Outline control 1 2 control 3 4 5

control In broadcast, the network layer provides a service of delivering a packet sent from a source node to all other nodes in the network; Multicast enables a single source node to send a copy of a packet to a subset of the other network nodes. v6 has introduced a new type of address, called an address, which allows a datagram to be delivered to any one of a group of hosts. This feature could be used, for example, to send an HTTP GET to the nearest of a number of mirror sites that contain a given document

Broadcast control When a host sends a datagram with destination address 255.255.255.255, the message is delivered to all hosts on the same subnet.

How to broadcast? control