# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

Similar documents
! "# $ $ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1

Chapter 4 Network Layer

CSC 4900 Computer Networks: Routing Algorithms

DATA COMMUNICATOIN NETWORKING

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

CSCE 463/612 Networks and Distributed Processing Spring 2017

Chapter 5 Network Layer: The Control Plane

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13

Chapter 4: Network Layer, partb

Module 3 Network Layer CS755! 3-1!

Δίκτυα Υπολογιστών ΙΙ. Κώστας Μαγκούτης Επίκουρος Καθηγητής Τμήμα Μηχανικών Η/Υ και Πληροφορικής Πανεπιστήμιο Ιωαννίνων

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2017

! "# $ $ %&&' 3-1. Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

CMPE 80N: Introduction to Networking and the Internet. Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 20

Lecture 9. Network Layer (cont d) Network Layer 1-1

Chapter 4 Network Layer

Lecture 4. The Network Layer (cont d)

CSC 401 Data and Computer Communications Networks

EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane

CSC 8560 Computer Networks: Control Plane

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical

Chapter 4 Network Layer

Network Technology 1 5th - Network Layer. Mario Lombardo -

Data Communications & Networks. Session 7 Main Theme Networks: Part II Circuit Switching, Packet Switching, The Network Layer

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane

Chapter 4 Network Layer. Network Layer 4-1

Course on Computer Communication and Networks. Lecture 7 Network Layer, Chapter 4 (6/e) - Part B (7/e Ch5)

Chapter 4 Network Layer

Chapter 4: Network Layer

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer. Chapter goals:

Chapter 4 Network Layer

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

The Internet Ecosystem and Evolution

Chapter 4: Network Layer

Department of Computer Science Southern Illinois University Carbondale

Chapter 4 Network Layer

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet

Chapter 4 Network Layer

Chapter 5 Network Layer: The Control Plane

Telecomunicazioni. Docente: Andrea Baiocchi DIET - Stanza 107, 1 piano palazzina P. Piga Via Eudossiana 18

Chapter 4: network layer

Chapter 4 Network Layer

Chapter 4 Network Layer

Chapter 4 Network Layer

Chapter 4 Network Layer

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Routing Algorithms : Fundamentals of Computer Networks Bill Nace

Chapter 4 Network Layer

COMPUTER NETWORKS CHAP 4 : NETWORK LAYER

CS118 Discussion 1A, Week 6. Zengwen Yuan Dodd Hall 78, Friday 10:00 10:50 a.m.

Chapter 4 Network Layer

CS 3516: Computer Networks

Chapter 4 Network Layer

All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

Chapter IV: Network Layer

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018

Chapter 4: network layer

Chapter 4 Network Layer

Chapter 4 Network Layer

Lecture 17: Network Layer Addressing, Control Plane, and Routing

Interplay Between Routing, Forwarding

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer

IP Multicast Simulation in OPNET

Chapter 4 Network Layer. Chapter 4: Network Layer. Chapter 4: Network Layer. Chapter goals: understand principles behind network layer services:

CMPT 371: Data Communications and Networking. Chapter 4: Network Layer

Chapter 4: Network Layer. Chapter 4: Network Layer

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

COMP 3331/9331: Computer Networks and Applications

Chapter 4 Network Layer. Network Layer 4-1

Chapter 4 Network Layer

Chapter 4 Network Layer

Chapter 4 Network Layer

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 4 Network Layer: The Data Plane

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network layer

Chapter 4: Network Layer

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

Chapter 4 Network Layer: The Data Plane

Chapter 4: network layer

Telecomunicazioni. Docente: Andrea Baiocchi. DIET - Stanza 107, 1 piano palazzina P. Piga Via Eudossiana 18

KR_4. Strato di rete

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Network layer functions. Chapter 4 Network Layer. Network layer functions. Network layer functions

Different Layers Lecture 20

Information Network Systems The network layer. Stephan Sigg

Network Layer: Routing. Routing. Routing protocol. Graph abstraction for routing algorithms: graph nodes are routers graph edges are physical links

Dynamic Routing. The Protocols

Prioritized Traffic Recovery over GMPLS Networks

Chapter 4 Network Layer

Graph abstraction: costs. Graph abstraction 10/26/2018. Interplay between routing and forwarding

Network Layer: Routing

THE THETA BLOCKCHAIN

Interplay between routing, forwarding

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies

Chapter 3 Transport Layer

Transcription:

A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one) and slide content to suit you needs. They obviously epesent a lot of wok on ou pat. In etun fo use, we only ask the following: If you use these slides (e.g., in a class) in substantially unalteed fom, that you mention thei souce (afte all, we d like people to use ou book!) If you post any slides in substantially unalteed fom on a www site, that you note that they ae adapted fom (o pehaps identical to) ou slides, and note ou copyight of this mateial.!" #! %&&' Thanks and enjoy! JFK/KWR All mateial copyight 1996-2007 J.F Kuose and K.W. Ross, All Rights Reseved

( ) m ) m *) m m +, m m ) -.)/! (! - %

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 0

* ) )!) )! ; * -.

8 * ) * 2 ( * * * * * m 4

-(* outing algoithm local fowading table heade value output link 0100 0101 0111 1001 3 2 2 1 value in aiving packet s heade 0111 3 2 1 /

0 * m 3!*!<%4 (* *! ) ( ) m )) ) ) m ( + )) ) *1, m ( '

) > # ) *?@ * )A B; ) * ) ) ) & B; ) * ** ) (* =

) Netwok Achitectue Sevice Model Bandwidth Guaantees? Loss Ode Timing Congestion feedback Intenet ATM ATM ATM ATM best effot CBR VBR ABR UBR none constant ate guaanteed ate guaanteed minimum none no yes yes no no no yes yes yes yes no yes yes no no no (infeed via loss) no congestion no congestion yes no C

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 &

) ) ) 1) ) )! ( m ) m ) m

1? () @ m * m!*(* * 1*+, )? @ *! +(!(**, ( 1+ D( ), %

1 1 * * % 1 (! (* 0 *( (1 1 ( +, 1 (( m 1 ( * *( 0

8( 1 ( % % 0 %% 0% 8( * ( - *- 1 E 6 *6 1 E %0 %% %/0 = 0'% ' C'0 =' F F F F " * G

1! 1 3!*!< %4 2-4*( - /") 0 % 4

( m )*?@ * m ( ** 7 %") /

8( ( ( Destination Addess Range Link Inteface 11001000 00010111 00010000 00000000 though 0 11001000 00010111 00010111 11111111 11001000 00010111 00011000 00000000 though 1 11001000 00010111 00011000 11111111 11001000 00010111 00011001 00000000 though 2 11001000 00010111 00011111 11111111 othewise 3 '

*; Pefix Match Link Inteface 11001000 00010111 00010 0 11001000 00010111 00011000 1 11001000 00010111 00011 2 othewise 3 B; &&&&&&&&&&&&&&&&&&& # *A &&&&&&&&&&&&&&&&&&& # *A =

1 A -+, ; m? @ )! H? @ +, m!*!) m! ;?@ m ** m * )** 3 +1, ))* ) m!( H m * )? (@ m m ; C

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 %&

"6 )) * I+"-.!6 7.8!9:., * * %

-.8. ()!B 4 )! *( J 2 H* )* * *( %%

* *( %0

713 8 *.K 2 ( (+%(, Input Pot Memoy Output Pot System Bus %

719 * ) ( ( (( ( 0%:( (! 4/&& ** * %4

7 1 - ) ( ( 9! ) ) * *;! *( %&&& /&:( %/

6. 9** H )* *(* 7 H * %'

6 H (**)) ; H+, (**)*G %=

5 (**A "800C* ()(** H?@ " + %4&, m!d&: %4:( (** " *! (**H " %C

-.> 8( (LH H 5* +56,( H **H) H* )* H (**)*G 0&

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 0

- 5!*.!K. " M M"-.!6 7.8!9:. * ( -. M ) M * M) -3. M M? @ 0%

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 00

-. * -.) ( +(,?@ * ; ( +, ) ).A %&( *. %&( *-. D&( N ) ) /(* ) 0%( * ) * 0%( -. * ** 0%( -. +)(!. K., +(, * * I ( 6 +*, B!! * * ) 0

-.8 O" ( )3 K + ; * P, ()* m **! **3 K -. ) +?* @, m ( ) m? (@ * m -.( *! * ( * 0 04

-.8 " ( B; &&&( 3 KD4&&( D&&& - D; ** D& ** D& 6 ( ) =&( * ** D =&I= D4&& D4&& D&& - D; - D; - D; ** D ** D ** D& ** D& ** D=4 ** D0'& 0/

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 0'

-. -. 0%( **! * * ( I m 2 ) * m * m -. * 223.1.1.1 223.1.2.1 223.1.1.2 223.1.1.4 223.1.2.9 223.1.1.3 223.1.3.1 223.1.3.27 223.1.2.2 223.1.3.2 223.1.1.1 = 11011111 00000001 00000001 00000001 223 1 1 1 0=

7( -. m (+ (, m + (, # 2 (A m )* (*-. m ) 223.1.1.1 223.1.2.1 223.1.1.2 223.1.1.4 223.1.2.9 223.1.1.3 223.1.3.1 223.1.2.2 223.1.3.27 ( 223.1.3.2 *0 ( 0C

7( 223.1.1.0/24 223.1.2.0/24 " (! **! * B ( 223.1.3.0/24 7( I% &

7( 223.1.1.2 5 A 223.1.1.1 223.1.1.4 223.1.1.3 223.1.9.2 223.1.7.0 223.1.9.1 223.1.8.1 223.1.8.0 223.1.7.1 223.1.2.6 223.1.3.27 223.1.2.1 223.1.2.2 223.1.3.1 223.1.3.2

-. -" -" - " m (* *( m * (I;!; E ( (* ( 11001000 00010111 00010000 00000000 %&&%0/&I%0 %

-. A > 5 -. A ( * m # LL* LIL m K -< II* 5. 5 *. * ) m?@ 0

5. 5 *. : ( -. * )Q * +?@ 7 * ( Q+, 5.)) m (?5. )@ m 5. )?5.**@ m H -.?5.H @ m 5. )?5.@

5. ) 223.1.1.1 DHCP seve 223.1.2.1 9 223.1.1.2 223.1.1.4 223.1.2.9 223.1.2.2 223.1.1.3 223.1.3.27 223.1.3.1 223.1.3.2 B aiving DHCP client needs addess in this netwok 4

5. ) 5. )%%0%4 DHCP discove sc : 0.0.0.0, 68 dest.: 255.255.255.255,67 yiadd: 0.0.0.0 tansaction ID: 654 ) DHCP equest DHCP offe sc: 223.1.2.5, 67 dest: 255.255.255.255, 68 yiadd: 223.1.2.4 tansaction ID: 654 Lifetime: 3600 secs sc: 0.0.0.0, 68 dest:: 255.255.255.255, 67 yiadd: 223.1.2.4 tansaction ID: 655 DHCP seve ID:223.1.2.5 Lifetime: 3600 secs DHCP ACK sc: 223.1.2.5, 67 dest: 255.255.255.255, 68 yiadd: 223.1.2.4 tansaction ID: 655 DHCP seve ID:223.1.2.5 Lifetime: 3600 secs /

-. A > 5 (*-. A * )-7.2 ISP's block 11001000 00010111 00010000 00000000 200.23.16.0/20 Oganization 0 11001000 00010111 00010000 00000000 200.23.16.0/23 Oganization 1 11001000 00010111 00010010 00000000 200.23.18.0/23 Oganization 2 11001000 00010111 00010100 00000000 200.23.20.0/23....... Oganization 7 11001000 00010111 00011110 00000000 200.23.30.0/23 '

5 5 **) * * 6 P& %&&%0/&I%0 6 P %&&%0=&I%0 6 P% %&&%0%&&I%0 6 P' 89-7.?7 ( %&&%0/&I%&@ - %&&%00&&I%0-7. "K?7 ( CC0&&I/@ =

5 * -7. "K *6 P 6 P& %&&%0/&I%0 6 P% %&&%0%&&I%0 6 P' 89-7.?7 ( %&&%0/&I%&@ - %&&%00&&I%0 6 P %&&%0=&I%0-7. "K?7 (CC0&&I/ %&&%0=&I%0@ C

-. > 5-7.(* A --* ( m m 7 m! ) 4&

* - 0='/%C' &&& +!, &&&I% &&& &&&% &&&0 ) ) -. 0='/%C'! ** ( )&&&I% *! +, 4

3 ) Q -. * m * * -7.Q -. *) m *) * m -7. * ) m ) ; (! ) (( +, 4%

- m + -.! E,*) + -.! E, I ) + -.!E, m (+ (,)+ -.!E,+ -.!E, m + -.! E, * *) + -.!E, ( 40

% * &&&!004 0='/%C'!4&&! ( % ( # 0='/%C'!4&&&&&!004 FF FF 70='/%C'!4&& %=C&=/!=& &&& 7 &&&!004 %=C&=/!=& &&& %=C&=/!=& &&& &&&% 0='/%C' 7 %=C&=/!=& 0='/%C'!4&& 0 0 ") 0='/%C'!4&& 7 %=C&=/!=& &&&!004 &&&0 * 0='/%C'!4&&&&&!004 4

/( (* m /&!&&& G ) m 0 m ) M ( ((!!.%. m ( )( -.)/ 44

) ( ) &&& m ) &&& +2, m ;) ( 0='/%C' * * H ) ) m!+%0'/%c'!%4&&, *&&& %4&&& A 0='/%C' &&& &&& 4/

) ( %K)..+K..,-: )+-:,. (-. +0='/%C', ; I ) +, 0='/%C' -: &&& &&&! * 4'

) ( 0+ 7, m ) ( m B; m ( ( % ( 0 ( ( 0='/%C' &&& 4=

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 4C

-3.-3. ( O ) * m (!!! m H I+ (,?()@ -. m -3. -. -3.! * =( *-. Type Code desciption 0 0 echo eply (ping) 3 0 dest. netwok uneachable 3 1 dest host uneachable 3 2 dest potocol uneachable 3 3 dest pot uneachable 3 6 dest netwok unknown 3 7 dest host unknown 4 0 souce quench (congestion contol - not used) 8 0 echo equest (ping) 9 0 oute advetisement 10 0 oute discovey 11 0 TTL expied 12 0 bad IP heade /&

-3. 7 * K. m 8 D m 7 D%! m K ( # ) m " m -3. +! &, m 3 * O-. # -3. )! " 0 7 K. ) ) -3.? (@ +0!0, # -3.! /

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 /%

-.)/ - ) 0%( ( ) m * I* m *> 7 -.)/ * m *;&( m * /0

-.)/5+,. * * 8 ( *?*@ +*?*@ *, ; ** /

6 * -.) ) 6!( *! (?;5@ * -3.)/ ) *-3. m!?. 9@ m * /4

8 -.)-.)/ ( m?* @ m 5 ;-.) -.)/ A -.)/ -.) -.) //

) 9 B 8 -.)/ -.)/ -.)/ -.)/. ) 9 B 8 -.)/ -.)/ -.)/ -.)/ -.) -.) /'

) 9 B 8 -.)/ -.)/ -.)/ -.)/. ) 9 B 8 -.)/ -.)/ -.) -.) -.)/ -.)/ 8< 7 8 79 B 8< 7 8 79 B 8< 7 8 8< 7 8 9 -.)/ 9 -.)/ -.) 9 -.)/ -.) B8 -.)/ /=

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 /C

-(!* outing algoithm local fowading table heade value output link 0100 0101 0111 1001 3 2 2 1 value in aiving packet s heade 0111 1 3 2 '&

:( 4 Gaph: G = (N,E) % ) ; % 0 0 4 % P N = set of outes = { u, v, w, x, y, z } E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) } " :( *; B;.%.! * B *. '

:( % 4 ) ; % 0 0 4 % P M +;!;2,D *+;!;2,!+!P,D4 M (! ) (! ) *+;!; %!; 0!F!;,D+;!; %,N+; %!; 0,NF N+;!;, > # 2 (PA " * '%

" * :(P * A :( )! *? @ P (! ( ) *!;* *(? )@ 7 A 7 ) H m m '0

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 '

7" Q 2! m )? ( @ m ) * * +J @, m ) *( * )*! 2 c(x,y): * ;RD * ( D(v): )* ** ) p(v): * ) N': * *) '4

Q 2 1 Initialization: 2 N'= {u} 3 fo all nodes v 4 if v adjacent to u 5 then D(v) = c(u,v) 6 else D(v) = 7 8 Loop 9 find w not in N'such that D(w) is a minimum 10 add w to N' 11 update D(v) fo all v adjacent to w and not in N': 12 D(v) = min( D(v), D(w) + c(w,v) ) 13 /* new cost to v is eithe old cost to v o known 14 shotest path cost to w plus cost fom w to v */ 15 until all nodes in N' '/

Q 2 ; Step 0 1 2 3 4 5 N' u ux uxy uxyv uxyvw uxyvwz D(v),p(v) 2,u 2,u 2,u D(w),p(w) 5,u 4,x 3,y 3,y D(x),p(x) 1,u D(y),p(y) 2,x D(z),p(z) 4,y 4,y 4,y 4 % ) ; % 0 0 4 % P ''

Q 2 ; +%, " * ) P ; " *( ) ; P +!), +!;, +!;, +!;, +!;, '=

Q 2! ;!! +N,I% 6 + %, ** (6 +, 6 (! D *** & & & N 9 %N & N & & 9 F & %N & & N 9 F %N & N & F 9 'C

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 =&

1 9 8BH+, * ; +,D * * ; ; +,D S+;!),N ) +,T ) )( )*; =

9 8; % 4 ) ; % 0 0 4 % P! ) +P,D4! ; +P,D0! +P,D0 98H +P,D S+!),N ) +P,! +!;,N ; +P,! +!,N +P,T D S%N4! N0! 4N0TD ) ; *( =%

1 ; +, D * * ; ; () +;!), ; ) ; D U ; +,V W ; ( 2 ) m 8()!; ) DU ) +,V W =0

) +, 9 B ) ( # ;) 1 * (! 1 98H ; +, ) S+;!),N ) +,T* K!! ; +,) ; +, =

1 +4, -)! ( 1 * ( ( * ( 1 m ( * ( * B wait fo (change in local link cost o msg fom neighbo) ecompute estimates if DV to any dest has changed, notify neighbos =4

; +,D S+;!,N +,!+;!P,N P +,T D S%N&!'NTD% ;P ;P ; &%' P ;P * ; %& P ;P * * ; P ' & * ; P & % 0 %& '& ; +P,D S+;!,N +P,!+;!P,N P +P,T D S%N!'N&TD0 % ; P ' =/

; +,D S+;!,N +,!+;!P,N P +,T D S%N&!'NTD% ;P ;P ;P ; &%' ; &%0 ; &%0 %& %& P P '& P 0& ;P ;P ;P ; ; &%' ; &%0 %& %& %& P P '& P 0& ;P ;P ;P * * * ; P ' & * * * ; P &%' %& 0& * * * ; P &%0 %& 0& ; +P,D S+;!,N +P,!+;!P,N P +P,T D S%N!'N&TD0 % ; P ' ='

1 *! ) *1!*( ; P 4&? ) * @ &!! 1! * (!P ) * ( - ; ( 1 %! ) P2 ( 2 P ==

1 ) * ( )?*@ ( G (* (P ;. ) -*X Y < m X Y +X 2, < *+ Y2 < )X, ) *( A /& ; P 4& =C

* 71 3 ; 7!B! 6 +B, 1 ;( ( m ) ) 7 *) 7 6 +, H 6 +B, m ) 1) ) m ( m *( "( * * A 7 1 m ) m ( m 1) m 2 ( ( M C&

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 C

5" 6 * P?*@ F %&& 2 2 ( G (; G ) D* C%

5"!? @ +7, 7 m?7@ m **7 ** 7 : 7 C0

-7 0 0 0( 70 ( Inta-AS Routing algoithm 7 Fowading table Inte-AS Routing algoithm % % 7% %( *( *(( 7 m 7 * m 7 O - * ; C

-7 7 ) *7 m *!( A 7 ( 7%! 70 % (* 7 (*7 G 0 0 0( 70 ( 7 % % 7% %( C4

B; 7 *( 7 +)7, ( ; ()7 0+,()7% 7 (* * 7 * *- m *(+;!-, 0 0 0( 70 F ; ( 7 % % %( 7% C/

B; 7 7 * 7 (; (* 7 0 * 7% **(! * * ; m Q(*7 G 0 0 0( 70 F ; ( F 7 % % 7% %( C'

B; 7 7 * 7 (; (* 7 0 * 7% **(! * * ; m Q(*7 G * Lean fom inte-as potocol that subnet x is eachable via multiple gateways Use outing info fom inta-as potocol to detemine costs of least-cost paths to each of the gateways Hot potato outing: Choose the gateway that has the smallest least cost Detemine fom fowading table the inteface I that leads to least-cost gateway. Ente (x,i) in fowading table C=

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 CC

-7" -:. +-:., -7 m "-."-*. m 6 7.86 7.8 m -:".-:".+, &&

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 &

"-.+"-*., ) 97 K -< (C=% E * + ;D4, 8 ( P ) 9 ; )% % ;0 0 P% &%

"-.) ) ; ( )0& )" 3 + ), ) *%4 7 &0

"-.B; ; 9 P!! " # # "( &

"-.B;! "! " %& # # ' ; 9 P!! " # # "( &4

"-. 8") -*) *=& L (I m )() m ) ( m ( ) +* (, m **H+A, m ) ) +* D/, &/

"-.( "-.( (!' +, ) K.! +K., * +-.,( * ( +K., +-., &'

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 &=

6 7.8+6 7.8,?@()( 7 m 7 m m Q 2 6 7.8) ( ) 7 +) *, m 6 7.8 )-.+. K. &C

6 7.8?)@ * +"-., 6 7.8 + ), + "-., 8! *** 6 7+!?@ *( **R *, m 3 6 7.8+3 6 7.8, ( 6 7.8 6 7.8 &

56 7.8

56 7.8 )!(( m ) m R +, (? P@!) 9 (( 6 7.8 (( ( 72 %

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 0

-79:. 9:.+9:., * 9:.) 7 6 ( ((* * (7 %.(* 7 0?@ ( ( (* () ; *-?- @

9:.( * +9:.,;* ). 9:. m 9:. 7%) *;7 m 7% * *; m 7%*; ) 0 0 0( 70 7 9:. 9:. ( % % 7% %( 4

((* 9:. (0!70 *;(*7 m 9:. (*; * 7 m () (* 7%)(%9:. **;! **; *( 0 0 0( 70 7 9:. 9:. ( % % 7% %( /

.( O9:. ) *; 9:.( m *;N( D?@ ( m 7. 5 7 *; )!7 /'!7 ' m B< 56. *7 ;7 + ( * 7 ;7, ) )! I '

9:. ( *;" *)( % 7. 5 0 B< 56. =

9:. 9:. ;. 9:. m 6.B. m K. B ) +, m BB. -1 B )( * K.B7R 6.BH m 6-8--6 ) R C

9:. 9 : ) ( % ) *!9!) <!#!Y +*), < m < * 9)< m <) 9 %&

9:.+%, 9 : ) ( % ) * ) # 9 9) 9# < 7 9) 9# A m G9?)@ *9# # 92 m 9 *) m 9 I* G %

# **- -7 A. -7 ) **! -7! 7 ) ( P! **.* -7 * * -7 )* %%

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 %0

9 " ) * ** duplicate " duplicate ceation/tansmission " "% "% duplicate "0 " "0 " souce duplication in-netwok duplication A %

- *) (! ( m.( O( *( * 2( (* m * ( m 6 ) *+".8,* *) ( m )( %4

7 8 * 9 9 8 B 8 B (a) Boadcast initiated at A : (b) Boadcast initiated at D : %/

7 B Q m 3 *) ( 3 9 9 8 1 4 B 2 5 8 B : : (a) Stepwise constuction of spanning tee (b) Constucted spanning tee %'

3 ".( 7 +,*+, ) ( m ( m ( *** ) m ( ( 7 7(

*( ( m m ) * m +7, m ( F* (! *

7. ** * ) m Q 2 7 " % " "% 4 0 "0 / "/ "' "4 B:B ( ( **! (

").8 2 * * *() + ) (, *

").8; 7 "% " " "4 B:B ( ( "0 "/ "' ( * ( * M *) 7. Z ((

").8 * ( ( m * ( m?@ ( ( 7 B:B " " ( "0 "%.. "/ "' "4. ( *

7 7 7 ( (. ; ; m ; m * ( m ) QI)

( ) ( *?@ * Q m Q m Q? @ ( * m Q ; (*!) m (Q ( (* *

( ; 7 "/ B:B " 0 " ( "0 "% % "/ "' "4 ( Q

-3 "1 3 ". 1 3 ". )!"8&'4 * ) *! ( m ".8( 1 3 ".2 ( ( 1 3 ". m ( m * ))".8 m

13 ".F * 1 3 ".+,?* @ ( m * ( m ) H* m *-:3.Q* m m 3 ( 1 3 ".

-, 5? @ *? @ * A? @ +, -.?@ )-. ) )

.-3.-3 * +, ** ( (!? @ ; ( * 7 E ( E (? @ (*

H *7 ( ( ; ) +!".8, ( * 7 ( ;Q ) ) * +!(, ( ))

.-3 3 *".8! 1 3 ".( ) ".8* * + **, *1 3 ". * *

.-3 7 3 ( Q P) +"., " Q " m *Q *Q)".! * m *! "0 "% Q * P) "/ Q "4 "' P)

.-3 7 3 +, ".! ( ". " Q " ".; ". * ) m? G@ "0 "% Q * P) "/ Q "4 "' P)

- 4" %1 0# 2 -.-. m * m -.) m -3. m -.)/ m m 1 m 5 /" - m "-. m 6 7.8 m 9:. '9 4