Final several design issues at network layer

  • 2,326 views
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
2,326
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
73
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Several Design Issues at Network layer
    • Implementation of Connectionless Services
    • 2. Implementation of Connection oriented Services
    • 3. Comparison of datagram subnet and virtual-circuit subnet
    AshishDubey(9)
    Hansel Gonsalves(12)
    KashyapDavariya(7)
  • 4. Implementation of Connectionless Services
    In Connectionless Service, no need to establish connection
    In this packets are injected into subnet and routed independently of each other.
    No advance set up is needed
    In this context the packets are frequently called datagram and subnet is called datagram subnet.
  • 5. Routing within a datagram subnet
  • 6. Let see the working of datagram subnet.
    Suppose process p1 has long message for process p2.
    It hands message with instructions to transport layer to deliver it to process 2 on host 2.
    The transport layer code runs on H1,within an OS.
    It prepends a transport header to the front of message and hands the result to the network layer.
  • 7. Assume that message is four times longer than maximum packet size.
    The Network layer breaks it into four packets 1, 2 ,3 and 4 and sends all to router A using point-to-point protocol.
    At this point carrier takes over.
    Every router has an internal table that tells where to send packets for each possible destinations.
  • 8. Each table entry is a pair consisting of a destination and the outgoing line to use for that destination.
    Only directly connected lines can be used.
    For eg: A has only two outgoing lines - to B and C - so every incoming packet must be sent to one of these routers, even if ultimate destination is some other router.
  • 9. As packets arrived at A, packets 1, 2 and 3 were stored briefly(to verify their checksums).
    Then each was forwarded to C according to A’s table .
    Packet 1 was then forwarded to C according to A’s table.
    Packet 1 was then forwarded to E and then to F and at F it was encapsulated in datalink layer frame and sent to H2 over the LAN.
  • 10. Packet 2 and 3 follow the same route.
    However packet 4 was routed at different router(i.e at B) for some reason.
    Perhaps it learned of traffic jam somewhere along the ACE path and updated its router table as “later”.
    The algorithm that manages the tables and makes the routing decisions is called Routing Algorithm.
  • 11. Implementation of Connection Oriented Services
    In this a connection is established.
    A path from source to the destination router must be established before any packets can be sent.
    This connection is virtual circuit with physical circuit set up by the telephone system
    Subnet is called virtual circuit subnet.
    The particular route choosen is used for all traffic flowing over the connection.
  • 12. With connection oriented service , each packet carries an identifier telling which virtual circuit it belongs.
  • 13. Routing within a virtual-circuit subnet.
  • 14. Here , host H1 has established a connection 1 with host H2.
    It is remembered as the first entry in each of the routing tables.
    The first lines of A’s table says that if a packet bearing connection identifier 1 comes from H1, it to be sent to router C and given a connection identifier 1.
    Similarly, the first entry at C routes the packet to E, also with connection identifier 1.
  • 15. Now let consider what happens if H3 also wants to establish a connection to H2.
    It chooses identifier 1(because it is initiating the connection and this is its only connection) and tells the subnet to establish the virtual circuit.
    This leads to the second row in the tables.
    Note that we have a conflict here because although A can easily distinguish connection 1 packets from H1 from connection 1 packets from H3 , C cannot do this.
  • 16. For this reason, A assigns a different connection identifier to the outgoing traffic for the second connection.
    Avoiding conflicts of this kind is why routers need the ability to replace connection identifiers in outgoing packets.
    In some contexts, this is called label swithing.
  • 17. Comparison of datagram subnet and virtual-circuit subnet
  • 18. Comparison of datagram subnet and virtual-circuit subnet