Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Similar documents
Chapter 5. The Network Layer

Chapter 5. The Network Layer. Network Layer Design Isues. Store-and-Forward Packet Switching 10/7/2010. Implementation of Connectionless Service

Chapter 5. The Network Layer

Chapter 5. The Network Layer. CEN Chapter 5 1

Chapter 5. The Network Layer FATİH ŞAHİN Network Layer Design Isues. Store-and-Forward Packet Switching

Chapter 6. The Network Layer

Outline EEC-682/782 Computer Networks I. Midterm 1 Statistics. Midterm 1 Statistics. High 99, Low 34, Average 66

Chapter 5 (Week 10) The Network Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP

Chapter 6. The Network Layer

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

EEC-484/584 Computer Networks

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

Lecture Outline. Bag of Tricks

Jaringan Komputer. Network Layer. Network Layer. Network Layer. Network Layer Design Issues. Store-and-Forward Packet Switching

Quality of Service in the Internet

Chapter 24 Congestion Control and Quality of Service 24.1

Quality of Service (QoS)

Quality of Service (QoS)

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Quality of Service in the Internet

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

ETSF10 Internet Protocols Transport Layer Protocols

II. Principles of Computer Communications Network and Transport Layer

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Kent State University

Real-Time Protocol (RTP)

Internet Services & Protocols. Quality of Service Architecture

ADVANCED COMPUTER NETWORKS

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

Chapter 24 Congestion Control and Quality of Service Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

UNIT IV TRANSPORT LAYER

Network Layer Chapter 5

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

Advanced Computer Networks

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony

The Network Layer. Network Layer Design Objectives

Basics (cont.) Characteristics of data communication technologies OSI-Model

Point-to-Point Network Switching. Computer Networks Term B10

Chapter 5. The Network Layer

Quality of Service II

Multimedia Networking

RSVP and the Integrated Services Architecture for the Internet

The Network Layer and Routers

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

Multicast and Quality of Service. Internet Technologies and Applications

Unit 2 Packet Switching Networks - II

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

UNIT 2 TRANSPORT LAYER

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Lecture 3. The Network Layer (cont d) Network Layer 1-1

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

Network Support for Multimedia

Computer Networks. Andrew S. Tanenbaum

CS422 Computer Networks

Lecture 13. Quality of Service II CM0256

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services

Chapter 6: Congestion Control and Resource Allocation

Chapter 20 Network Layer: Internet Protocol 20.1

Real-Time Applications. Delay-adaptive: applications that can adjust their playback point (delay or advance over time).

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

Lecture 14: Performance Architecture

"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.

Mohammad Hossein Manshaei 1393

H3C S9500 QoS Technology White Paper

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

CSE 461 Quality of Service. David Wetherall

Improving QOS in IP Networks. Principles for QOS Guarantees

EEC-684/584 Computer Networks

Multimedia Networking

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

Part1: Lecture 4 QoS

Last time! Overview! 14/04/15. Part1: Lecture 4! QoS! Router architectures! How to improve TCP? SYN attacks SCTP. SIP and H.

CSE 123b Communications Software

Queue Overflow. Dropping Packets. Tail Drop. Queues will always sometimes overflow. But Cause more variation in delay (jitter)

Quality of Service. Traffic Descriptor Traffic Profiles. Figure 24.1 Traffic descriptors. Figure Three traffic profiles

CS519: Computer Networks. Lecture 5, Part 5: Mar 31, 2004 Queuing and QoS

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

Marking Traffic CHAPTER

Multimedia Applications over Packet Networks

Lecture 24: Scheduling and QoS

RSVP 1. Resource Control and Reservation

Resource Control and Reservation

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Internet Protocols (chapter 18)

QUALITY of SERVICE. Introduction

Chapter 18. Introduction to Network Layer

Where we are in the Course

Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Multimedia Networking and Quality of Service

Code No: RR Set No. 1

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.

Information and Communication Networks. Communication

Application Layer Network Layer

Quality of Service (QoS)

Transcription:

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1

Lecture 5: Network Layer (cont ) Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. 2

Contents The network layer design issues Routing algorithms Congestion control algorithms Quality of services Internetworking The network layer in the Internet 3

Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies Congestion Control in Virtual-Circuit Subnets Congestion Control in Datagram Subnets Load Shedding Jitter Control 4

Network Congestion When too much traffic is offered, congestion sets in and performance degrades sharply. 5

General Principles of Congestion Control Open loop solutions Solve the problems by good design Prevent congestions from happening Make decision without regard to state of the network Closed loop solutions Using feedback loop 6

Closed Loop Solutions Three Part Feedback Loop Monitor the system detect when and where congestion occurs. Pass information to where action can be taken. Adjust system operation to correct the problem. 7

Open Loop Solutions - Congestion Prevention Policies Policies that affect congestion. 8

Congestion Control in Virtual-Circuit Subnets (a) A congested subnet. (b) A redrawn subnet, eliminates congestion and a virtual circuit from A to B. 9

Congestion Control in Datagram Subnets Warning bit Routers use a bit in the packet s header to signal the warning state. The receiver copies the warning bit from the packet s header to the ACK message The source, on receiving ACK with warning bit will adjust transmission rate accordingly Choke Packets The router sends choke packet directly to the source host 10

Hop-by-Hop Choke Packets (a) A choke packet that affects only the source. (b) A choke packet that affects each hop it passes through. 11

Load Shedding When routers are so heavily loaded with packets that they can t handle any more, they just throw them away Packets can be selected randomly or by using some selection strategy 12

Random Early Detection It is more effective to detect and prevent congestion from happening Routers monitor the network load on their queues, if they predict that congestion is about to happen, they start to drop packets 13

Jitter Control Jitter: variation in packet arrival times (a) High jitter. (b) Low jitter. 14

Quality of Service Requirements Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS 15

Requirements How stringent the quality-of-service requirements are. 16

Techniques for Good QoS Overprovisioning Buffering Traffic shaping The leak bucket algorithm Token bucket algorithm Resource reservation Admission control Proportional routing Packet scheduling 17

Buffering Smoothing the output stream by buffering packets. 18

The Leaky Bucket Algorithm (a) A leaky bucket with water. (b) a leaky bucket with packets. 19

The Token Bucket Algorithm (a) Before. (b) After. 20

The Leaky Bucket Algorithm (a) Input to a leaky bucket. (b) Output from a leaky bucket. Output from a token bucket with capacities of (c) 250 KB, (d) 500 KB, (e) 750 KB, (f) Output from a 500KB token bucket feeding a 10- MB/sec leaky bucket. 21

Resource Reservation Packets of a flow have to follow the same route, similar to a virtual circuit Resources can be reserved Bandwidth Buffer space CPU cycles (of routers) 22

Admission Control An example of flow specification. 23

Packet Scheduling (a) A router with five packets queued for line O. (b) Finishing times for the five packets. 24

Integrated Services An architecture for streaming multimedia Flow-based reservation algorithms Aimed at both unicast and multicast application Main protocol: RSVP Resource reservation Protocol 25

RSVP-The Resource reservation Protocol (a) A network, (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2. 26

RSVP-The Resource reservation Protocol (2) (a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1. 27

RSVP-The Resource reservation Protocol (3) Flow-based algorithms (e.g. RSVP) have the potential to offer good quality of service However: Require advanced setup to establish each flow Maintain internal per-flow state in routers Require changes to router code and involve complex router-to-router exchanges Very few, or almost no implementation, of RSVP 28

Differentiated Services Class-based quality of service Administration defines a set of service classes with corresponding forwarding rules Customers sign up for service class they want Similar to postal mail services: Express or Regular Examples: expedited forwarding and assured forwarding 29

Expedited Forwarding Expedited packets experience a traffic-free network. 30

Assured Forwarding A possible implementation of the data flow for assured forwarding. 31

Label Switching and MPLS Transmitting a TCP segment using IP, MPLS, and PPP. 32

Internetworking How Networks Differ How Networks Can Be Connected Concatenated Virtual Circuits Connectionless Internetworking Tunneling Internetwork Routing Fragmentation 33

Connecting Networks A collection of interconnected networks. 34

How Networks Differ Some of the many ways networks can differ. 5-43 35

How Networks Can Be Connected (a) Two Ethernets connected by a switch. (b) Two Ethernets connected by routers. 36

Concatenated Virtual Circuits Internetworking using concatenated virtual circuits. 37

Connectionless Internetworking A connectionless internet. 38

Tunneling Tunneling a packet from Paris to London. 39

Tunneling (2) Tunneling a car from France to England. 40

Internetwork Routing (a) An internetwork. (b) A graph of the internetwork. 41

Fragmentation (1) (a) Transparent fragmentation. (b) Nontransparent fragmentation. 42

Fragmentation (2) Fragmentation when the elementary data size is 1 byte. (a) Original packet, containing 10 data bytes. (b) Fragments after passing through a network with maximum packet size of 8 payload bytes plus header. (c) Fragments after passing through a size 5 gateway. 43