SlideShare a Scribd company logo
1 of 22
Download to read offline
Communication
Networks
Network Layer Services
Packet Switching
Overview of Module - 2
• Framing
• What is Framing
• Types of Framing
• Methods for identifying the
boundaries
• Flow Control
• What is flow control
• Types of flow control
• Access Control
• What is access control
• Types of access control
• Ethernet – IEEE 802.3
• Evolution of Ethernet
• Frame Format of Ethernet
• Access Control for Ethernet
• Performance Evaluation of Ethernet
• WLAN – IEEE 802.11
• Architecture
• Bluetooth
• WIFI
• Zigbee
• 6LowPan
• Network Layer Services
• IPv4
• Packet switching
• Network Layer Protocols
Visit www.youtube.com/GURUKULA for Lecture Videos
Switching
• Switch is a mechanism that allows us to
interconnect links to form a larger networks.
• Switch is a multi – input , multi – output
device.
• It receives packets from one input port and
forwards them to one or more output ports.
• Switch provides a star topology
Visit www.youtube.com/GURUKULA for Lecture Videos
Primary Function of a Switch
•The primary function of a Switch is to receive
incoming packets on one of its links and to transmit
them on some other link. This function is referred to
as “forwarding”
Forwarding Approaches
• How does a switch decide which output link to place
each packets on ?
• There are 2 basic approaches from which switch knows
where to forward.
• Datagram (or) connection less approach
• Virtual circuit (or) connection oriented approach
Visit www.youtube.com/GURUKULA for Lecture Videos
Common Requirement for all 2 approach
• Forwarding can be done only if the switch knows 2
important parameters
• IP address of all the host connected to it
• This going to be a unique value so no problem.
• The port number on which a particular host is connected
• Can be done in 2 ways
• Numbering each ports (ie. Forward to Seat No : 10)
• Identifying each port by the name of the node connected to it (ie. Forward
to Seat on which Ram sat yesterday)
Visit www.youtube.com/GURUKULA for Lecture Videos
1. Datagram Approach @ Connection Less
Approach
• All the packets are included with enough information about
the destination. So that any switch will know how to take it to
the destination
• Each and every switch on the network maintains a table which
indicates the details of connected hosts on all ports. This table
is referred to as “Forwarding Table” or “Switching Table”
Visit www.youtube.com/GURUKULA for Lecture Videos
Datagram Approach
Visit www.youtube.com/GURUKULA for Lecture Videos
Visit www.youtube.com/GURUKULA for Lecture Videos
Drawbacks of Datagram Approach
• Difficult to from a forwarding table for large network
• Not suitable for dynamically changing topologies
• Creates a problem when there are multiple paths available to
reach the destination.
Visit www.youtube.com/GURUKULA for Lecture Videos
Characteristics of datagram networks
• They are referred to as “connection less” because they do
not check for the dedicated link to destination before
transmission
• A host have no idea about the capability of the network
to deliver the packets
• All packets take the same path unless the entries on the
forwarding table is altered. This may overload the path
Visit www.youtube.com/GURUKULA for Lecture Videos
2. Virtual Circuit Switching
@
Connection Oriented Approach
• This is an another approach which uses a concept
of “Virtual Circuit”.
•This approach is referred to as connection
oriented approach as it establishes the virtual
circuit between the source and destination
Visit www.youtube.com/GURUKULA for Lecture Videos
Virtual Circuit Approach
Visit www.youtube.com/GURUKULA for Lecture Videos
Process of Virtual Circuit Approach
• The entire process can be classified in to 2 phase
Connection setup
phase
Data transfer
phase
Visit www.youtube.com/GURUKULA for Lecture Videos
Connection Setup Phase
• In this phase a virtual connection is established in all the switches
present between the “Source” and “Destination”
• This processes is referred to as “defining Connection State”
• Defining connection state has 4 main components
• Incoming interface – on which the packets of this VC arrives the switch
• Incoming Virtual Circuit Identifier – uniquely identifies the incoming VC ID
• Outgoing Interface – on which the packets of this VC leaves the switch
• Outgoing Virtual Circuit Identifier - uniquely identifies the outgoing VC ID
Visit www.youtube.com/GURUKULA for Lecture Videos
2 approaches for establishing the connection
state
Manual Configuration
Automatic Configuration
➢ In this case connection state is established by Network
Administrator
➢ Virtual circuit is called “Permanent Virtual Circuit
(PVC)”
➢ Admin can delete the virtual circuit at any time
➢ The process is initiated by the Sending Node
➢ Sending node sends a message to the network requesting
to establish a connection state
➢ This is referred to as “Signalling”
➢ The virtual circuit is called “Switched Virtual Circuit
(SVC)”
➢ Host can delete the VC at any time without the
intervention of admin
Visit www.youtube.com/GURUKULA for Lecture Videos
Establishing Connection State by Network Admin
1. Identify and Create Virtual Circuit from source to destination2. Assigning id for each virtual circuit which is not already used
5
11
7
4
3. Creation of VC table at each switch present between source and
destination3.1 VC table for switch 1
INCOMING
INTERFACE
INCOMING VCI
OUTGOING
INTERFACE
OUTGOING VCI
2 5 1 11
INCOMING
INTERFACE
INCOMING VCI
OUTGOING
INTERFACE
OUTGOING VCI
3 11 2 73.1 VC table for switch 2
3.1 VC table for switch 3
INCOMING
INTERFACE
INCOMING VCI
OUTGOING
INTERFACE
OUTGOING VCI
0 7 1 4INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
2 5 1 11
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
3 11 2 7
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
0 7 1 4
Visitwww.youtube.com/GURUKULA
forLectureVideos
Establishing Connection State by Sending Node
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
2 5 1 11
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
3 11 2 7
INCOMING
INTERFACE
INCOMING
VCI
OUTGOING
INTERFACE
OUTGOING
VCI
0 7 1 4
5
11
7
4
S1 S2 S3
1. Host A sends a setup message into the network with the
destination address of Host B
2. When switch 1 receives the setup message it picks a
VCI1 value and forwards the packet at all ports
3. Switch 1 updates the incoming port number and VCI
chosen
4. Now , Switch 2 receives the setup message. It performs
the same operation as Switch 1 and updates the VC Table
5. Now ,switch 3 receives the setup message and performs
the same operation.
6. Then the setup message is forwarded to Host B. The host
choses the VCI value.
7. At this stage none of the switch knows about the outgoing
interface. This will be updated from the ACK sent by Host B
8. Now, Switch 3 updates its outgoing information on VC
Table and forwards the ACK to Switch 2
9. Switch 2 updates the VC Table and Forwards the ACK to
Switch 1
10. Switch 1 updates the VC Table and forwards the ACK to
Host A
11. By Receiving this ACK Host A knows the Complete
Virtual Path to reach Host B
2. Data Transfer Phase
• Data transfer phase starts after the completion of connection setup
phase.
• Host A puts a value of 5 for outgoing VCI in the header of the packet.
• Switch 1 receives any such packets on interface 2 it refers to the VC
table and puts the VCI value of 11 and forwards.
• Similarly the packet reaches Host B.
• Once the data transfer is done Host A can tear down the connection
with Host B by sending “Tear Down Signal” to Host B
• This signal removes all the entries in the switches.
Visit www.youtube.com/GURUKULA for Lecture Videos
Visit www.youtube.com/GURUKULA for Lecture Videos
Session Summary
• What is Packet Switching
• Different Approaches [ Datagram Approach, Virtual
Circuit Approach]
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

More Related Content

What's hot

2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introductionJAIGANESH SEKAR
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2JAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...Osama M Askoura
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsDamien Magoni
 
Eduroam workshop nic mitev probes - networkshop44
Eduroam workshop  nic mitev probes - networkshop44Eduroam workshop  nic mitev probes - networkshop44
Eduroam workshop nic mitev probes - networkshop44Jisc
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layersjayaprakash
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering pptNitin Gehlot
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layerSendhil Kumar
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Ronoh Kennedy
 

What's hot (19)

2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introduction
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
 
Adhoc ppt2
Adhoc ppt2Adhoc ppt2
Adhoc ppt2
 
Adhoc
AdhocAdhoc
Adhoc
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
Mpls
MplsMpls
Mpls
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Eduroam workshop nic mitev probes - networkshop44
Eduroam workshop  nic mitev probes - networkshop44Eduroam workshop  nic mitev probes - networkshop44
Eduroam workshop nic mitev probes - networkshop44
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layer
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 

Similar to 2.9 network layer services packet switching

Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Azad Kaki
 
CN Unit 2 PPT.pptx
CN Unit 2 PPT.pptxCN Unit 2 PPT.pptx
CN Unit 2 PPT.pptxifetananth06
 
Virt july-2013-meetup
Virt july-2013-meetupVirt july-2013-meetup
Virt july-2013-meetupnvirters
 
Final exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wirelessFinal exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wirelesskratos2424
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1aghacrom
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.pptVimalMallick
 
Switch inter vlan_routing
Switch inter vlan_routingSwitch inter vlan_routing
Switch inter vlan_routingRamesh Thumburu
 
ITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfssuser2d7235
 
03 internetworking
03 internetworking03 internetworking
03 internetworkingbajulusiraj
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingDr Rajiv Srivastava
 
MK-PPT Chapter of networking chapter 33.ppt
MK-PPT Chapter of networking chapter 33.pptMK-PPT Chapter of networking chapter 33.ppt
MK-PPT Chapter of networking chapter 33.pptPawanBharadwaj2
 
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Cisco Canada
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manualnudicixox
 

Similar to 2.9 network layer services packet switching (20)

Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)
 
CN Unit 2 PPT.pptx
CN Unit 2 PPT.pptxCN Unit 2 PPT.pptx
CN Unit 2 PPT.pptx
 
Tema3
Tema3Tema3
Tema3
 
Virt july-2013-meetup
Virt july-2013-meetupVirt july-2013-meetup
Virt july-2013-meetup
 
VLAN
VLANVLAN
VLAN
 
Final exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wirelessFinal exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wireless
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
Switching
SwitchingSwitching
Switching
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
 
10 sdn-vir-6up
10 sdn-vir-6up10 sdn-vir-6up
10 sdn-vir-6up
 
Switch inter vlan_routing
Switch inter vlan_routingSwitch inter vlan_routing
Switch inter vlan_routing
 
ITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdf
 
Java socket programming
Java socket programmingJava socket programming
Java socket programming
 
03 internetworking
03 internetworking03 internetworking
03 internetworking
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
 
mod8-VLANs.ppt
mod8-VLANs.pptmod8-VLANs.ppt
mod8-VLANs.ppt
 
MK-PPT Chapter of networking chapter 33.ppt
MK-PPT Chapter of networking chapter 33.pptMK-PPT Chapter of networking chapter 33.ppt
MK-PPT Chapter of networking chapter 33.ppt
 
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerJAIGANESH SEKAR
 
Minimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationMinimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationJAIGANESH SEKAR
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its typesJAIGANESH SEKAR
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniquesJAIGANESH SEKAR
 
4.2 concepts of diversity
4.2   concepts of diversity4.2   concepts of diversity
4.2 concepts of diversityJAIGANESH SEKAR
 
4.1 effects of multipth propagation
4.1   effects of multipth propagation4.1   effects of multipth propagation
4.1 effects of multipth propagationJAIGANESH SEKAR
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmskJAIGANESH SEKAR
 

More from JAIGANESH SEKAR (14)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - Explainer
 
Minimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationMinimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full Derivation
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its types
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniques
 
4.3 types of diversity
4.3  types of diversity4.3  types of diversity
4.3 types of diversity
 
4.2 concepts of diversity
4.2   concepts of diversity4.2   concepts of diversity
4.2 concepts of diversity
 
4.1 effects of multipth propagation
4.1   effects of multipth propagation4.1   effects of multipth propagation
4.1 effects of multipth propagation
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmsk
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 

2.9 network layer services packet switching

  • 2. Overview of Module - 2 • Framing • What is Framing • Types of Framing • Methods for identifying the boundaries • Flow Control • What is flow control • Types of flow control • Access Control • What is access control • Types of access control • Ethernet – IEEE 802.3 • Evolution of Ethernet • Frame Format of Ethernet • Access Control for Ethernet • Performance Evaluation of Ethernet • WLAN – IEEE 802.11 • Architecture • Bluetooth • WIFI • Zigbee • 6LowPan • Network Layer Services • IPv4 • Packet switching • Network Layer Protocols Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3. Switching • Switch is a mechanism that allows us to interconnect links to form a larger networks. • Switch is a multi – input , multi – output device. • It receives packets from one input port and forwards them to one or more output ports. • Switch provides a star topology Visit www.youtube.com/GURUKULA for Lecture Videos
  • 4. Primary Function of a Switch •The primary function of a Switch is to receive incoming packets on one of its links and to transmit them on some other link. This function is referred to as “forwarding”
  • 5. Forwarding Approaches • How does a switch decide which output link to place each packets on ? • There are 2 basic approaches from which switch knows where to forward. • Datagram (or) connection less approach • Virtual circuit (or) connection oriented approach Visit www.youtube.com/GURUKULA for Lecture Videos
  • 6. Common Requirement for all 2 approach • Forwarding can be done only if the switch knows 2 important parameters • IP address of all the host connected to it • This going to be a unique value so no problem. • The port number on which a particular host is connected • Can be done in 2 ways • Numbering each ports (ie. Forward to Seat No : 10) • Identifying each port by the name of the node connected to it (ie. Forward to Seat on which Ram sat yesterday) Visit www.youtube.com/GURUKULA for Lecture Videos
  • 7. 1. Datagram Approach @ Connection Less Approach • All the packets are included with enough information about the destination. So that any switch will know how to take it to the destination • Each and every switch on the network maintains a table which indicates the details of connected hosts on all ports. This table is referred to as “Forwarding Table” or “Switching Table” Visit www.youtube.com/GURUKULA for Lecture Videos
  • 10. Drawbacks of Datagram Approach • Difficult to from a forwarding table for large network • Not suitable for dynamically changing topologies • Creates a problem when there are multiple paths available to reach the destination. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 11. Characteristics of datagram networks • They are referred to as “connection less” because they do not check for the dedicated link to destination before transmission • A host have no idea about the capability of the network to deliver the packets • All packets take the same path unless the entries on the forwarding table is altered. This may overload the path Visit www.youtube.com/GURUKULA for Lecture Videos
  • 12. 2. Virtual Circuit Switching @ Connection Oriented Approach • This is an another approach which uses a concept of “Virtual Circuit”. •This approach is referred to as connection oriented approach as it establishes the virtual circuit between the source and destination Visit www.youtube.com/GURUKULA for Lecture Videos
  • 13. Virtual Circuit Approach Visit www.youtube.com/GURUKULA for Lecture Videos
  • 14. Process of Virtual Circuit Approach • The entire process can be classified in to 2 phase Connection setup phase Data transfer phase Visit www.youtube.com/GURUKULA for Lecture Videos
  • 15. Connection Setup Phase • In this phase a virtual connection is established in all the switches present between the “Source” and “Destination” • This processes is referred to as “defining Connection State” • Defining connection state has 4 main components • Incoming interface – on which the packets of this VC arrives the switch • Incoming Virtual Circuit Identifier – uniquely identifies the incoming VC ID • Outgoing Interface – on which the packets of this VC leaves the switch • Outgoing Virtual Circuit Identifier - uniquely identifies the outgoing VC ID Visit www.youtube.com/GURUKULA for Lecture Videos
  • 16. 2 approaches for establishing the connection state Manual Configuration Automatic Configuration ➢ In this case connection state is established by Network Administrator ➢ Virtual circuit is called “Permanent Virtual Circuit (PVC)” ➢ Admin can delete the virtual circuit at any time ➢ The process is initiated by the Sending Node ➢ Sending node sends a message to the network requesting to establish a connection state ➢ This is referred to as “Signalling” ➢ The virtual circuit is called “Switched Virtual Circuit (SVC)” ➢ Host can delete the VC at any time without the intervention of admin Visit www.youtube.com/GURUKULA for Lecture Videos
  • 17. Establishing Connection State by Network Admin 1. Identify and Create Virtual Circuit from source to destination2. Assigning id for each virtual circuit which is not already used 5 11 7 4 3. Creation of VC table at each switch present between source and destination3.1 VC table for switch 1 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 2 5 1 11 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 3 11 2 73.1 VC table for switch 2 3.1 VC table for switch 3 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 0 7 1 4INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 2 5 1 11 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 3 11 2 7 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 0 7 1 4 Visitwww.youtube.com/GURUKULA forLectureVideos
  • 18. Establishing Connection State by Sending Node INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 2 5 1 11 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 3 11 2 7 INCOMING INTERFACE INCOMING VCI OUTGOING INTERFACE OUTGOING VCI 0 7 1 4 5 11 7 4 S1 S2 S3 1. Host A sends a setup message into the network with the destination address of Host B 2. When switch 1 receives the setup message it picks a VCI1 value and forwards the packet at all ports 3. Switch 1 updates the incoming port number and VCI chosen 4. Now , Switch 2 receives the setup message. It performs the same operation as Switch 1 and updates the VC Table 5. Now ,switch 3 receives the setup message and performs the same operation. 6. Then the setup message is forwarded to Host B. The host choses the VCI value. 7. At this stage none of the switch knows about the outgoing interface. This will be updated from the ACK sent by Host B 8. Now, Switch 3 updates its outgoing information on VC Table and forwards the ACK to Switch 2 9. Switch 2 updates the VC Table and Forwards the ACK to Switch 1 10. Switch 1 updates the VC Table and forwards the ACK to Host A 11. By Receiving this ACK Host A knows the Complete Virtual Path to reach Host B
  • 19. 2. Data Transfer Phase • Data transfer phase starts after the completion of connection setup phase. • Host A puts a value of 5 for outgoing VCI in the header of the packet. • Switch 1 receives any such packets on interface 2 it refers to the VC table and puts the VCI value of 11 and forwards. • Similarly the packet reaches Host B. • Once the data transfer is done Host A can tear down the connection with Host B by sending “Tear Down Signal” to Host B • This signal removes all the entries in the switches. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 21. Session Summary • What is Packet Switching • Different Approaches [ Datagram Approach, Virtual Circuit Approach]
  • 22. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…