SlideShare a Scribd company logo
1 of 83
Download to read offline
Chapter 22
Network Layer:
Delivery, Forwarding,
and Routing
and Routing
22.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
22
22-
-1
1 DELIVERY
DELIVERY
Th
Th t k
t k l
l i
i th
th h dli
h dli f
f th
th
The
The network
network layer
layer supervises
supervises the
the handling
handling of
of the
the
packets
packets by
by the
the underlying
underlying physical
physical networks
networks.
. We
We
d fi
d fi thi
thi h dli
h dli th
th d li
d li f
f k t
k t
define
define this
this handling
handling as
as the
the delivery
delivery of
of a
a packet
packet.
.
Topics discussed in this section:
Topics discussed in this section:
Direct Versus Indirect Delivery
22.2
Figure 22.1 Direct and indirect delivery
22.3
22
22-
-2
2 FORWARDING
FORWARDING
F di
F di t
t l
l th
th k t
k t i
i it
it t
t t
t
Forwarding
Forwarding means
means to
to place
place the
the packet
packet in
in its
its route
route to
to
its
its destination
destination.
. Forwarding
Forwarding requires
requires a
a host
host or
or a
a router
router
t
t h
h ti
ti t bl
t bl Wh
Wh h t
h t h
h k t
k t t
t
to
to have
have a
a routing
routing table
table.
. When
When a
a host
host has
has a
a packet
packet to
to
send
send or
or when
when a
a router
router has
has received
received a
a packet
packet to
to be
be
f d d
f d d it
it l k
l k t
t thi
thi t bl
t bl t
t fi d
fi d th
th t
t t
t th
th
forwarded,
forwarded, it
it looks
looks at
at this
this table
table to
to find
find the
the route
route to
to the
the
final
final destination
destination.
.
Forwarding Techniques
Topics discussed in this section:
Topics discussed in this section:
Forwarding Techniques
Forwarding Process
Routing Table
22.4
g
Figure 22.2 Route method versus next-hop method
22.5
Figure 22.3 Host-specific versus network-specific method
22.6
Figure 22.4 Default method
22.7
Figure 22.5 Simplified forwarding module in classless address
22.8
Note
In classless addressing, we need at least
f l i ti t bl
four columns in a routing table.
22.9
Example 22.1
Make a routing table for router R1, using the
configuration in Figure 22.6.
configuration in Figure 22.6.
Solution
Solution
Table 22.1 shows the corresponding table.
22.10
Figure 22.6 Configuration for Example 22.1
22.11
T bl 22 1 R i bl f R1 i Fi 22 6
Table 22.1 Routing table for router R1 in Figure 22.6
22.12
Example 22.2
Show the forwarding process if a packet arrives at R1 in
Figure 22.6 with the destination address 180.70.65.140.
Solution
The router performs the following steps:
1. The first mask (/26) is applied to the destination address.
The result is 180.70.65.128, which does not match the
corresponding network address.
2. The second mask (/25) is applied to the destination
address. The result is 180.70.65.128, which matches the
corresponding network address. The next-hop address
and the interface number m0 are passed to ARP for
22.13
further processing.
Example 22.3
Show the forwarding process if a packet arrives at R1 in
Figure 22.6 with the destination address 201.4.22.35.
Solution
The router performs the following steps:
The router performs the following steps:
1. The first mask (/26) is applied to the destination
address The result is 201 4 22 0 which does not
address. The result is 201.4.22.0, which does not
match the corresponding network address.
2 The second mask (/25) is applied to the destination
2. The second mask (/25) is applied to the destination
address. The result is 201.4.22.0, which does not
match the corresponding network address (row 2)
22.14
match the corresponding network address (row 2).
Example 22.3 (continued)
3. The third mask (/24) is applied to the destination
address. The result is 201.4.22.0, which matches the
corresponding network address. The destination
address of the packet and the interface number m3 are
passed to ARP.
22.15
Example 22.4
Show the forwarding process if a packet arrives at R1 in
Figure 22.6 with the destination address 18.24.32.78.
Solution
This time all masks are applied, one by one, to the
destination address, but no matching network address is
found. When it reaches the end of the table, the module
gives the next-hop address 180.70.65.200 and interface
number m2 to ARP. This is probably an outgoing package
that needs to be sent, via the default router, to someplace
else in the Internet.
22.16
Figure 22.7 Address aggregation
22.17
Figure 22.8 Longest mask matching
22.18
Example 22.5
As an example of hierarchical routing, let us consider
Figure 22.9. A regional ISP is granted 16,384 addresses
Figure 22.9. A regional ISP is granted 16,384 addresses
starting from 120.14.64.0. The regional ISP has decided
to divide this block into four subblocks, each with 4096
to divide this block into four subblocks, each with 4096
addresses. Three of these subblocks are assigned to three
local ISPs; the second subblock is reserved for future use.
local ISPs; the second subblock is reserved for future use.
Note that the mask for each block is /20 because the
original block with mask /18 is divided into 4 blocks.
original block with mask /18 is divided into 4 blocks.
The first local ISP has divided its assigned subblock into
8 smaller blocks and assigned each to a small ISP. Each
small ISP provides services to 128 households, each using
f dd
22.19
four addresses.
Example 22.5 (continued)
The second local ISP has divided its block into 4 blocks
and has assigned the addresses to four large
and has assigned the addresses to four large
organizations.
The third local ISP has divided its block into 16 blocks
and assigned each block to a small organization. Each
small organization has 256 addresses, and the mask is
/24.
There is a sense of hierarchy in this configuration. All
routers in the Internet send a packet with destination
routers in the Internet send a packet with destination
address 120.14.64.0 to 120.14.127.255 to the regional ISP.
22.20
Figure 22.9 Hierarchical routing with ISPs
22.21
Figure 22.10 Common fields in a routing table
22.22
Example 22.6
One utility that can be used to find the contents of a
routing table for a host or router is netstat in UNIX or
LINUX. The next slide shows the list of the contents of a
d f l h d i d h
default server. We have used two options, r and n. The
option r indicates that we are interested in the routing
bl d h i i di h l ki f
table, and the option n indicates that we are looking for
numeric addresses. Note that this is a routing table for a
h Al h h di d h i bl
host, not a router. Although we discussed the routing table
for a router throughout the chapter, a host also needs a
i bl
routing table.
22.23
Example 22.6 (continued)
The destination column here defines the network address.
The term gateway used by UNIX is synonymous with
router. This column actually defines the address of the next
hop. The value 0.0.0.0 shows that the delivery is direct. The
last entry has a flag of G, which means that the destination
can be reached through a router (default router). The Iface
22.24
defines the interface.
Example 22.6 (continued)
More information about the IP address and physical
f p y
address of the server can be found by using the ifconfig
command on the given interface (eth0).
g f ( )
22.25
Figure 22.11 Configuration of the server for Example 22.6
22.26
22
22-
-3
3 UNICAST ROUTING PROTOCOLS
UNICAST ROUTING PROTOCOLS
A
A routing
routing table
table can
can be
be either
either static
static or
or dynamic
dynamic.
. A
A static
static
bl
bl i
i i h
i h l
l i
i A
A d i
d i bl
bl i
i
table
table is
is one
one with
with manual
manual entries
entries.
. A
A dynamic
dynamic table
table is
is
one
one that
that is
is updated
updated automatically
automatically when
when there
there is
is a
a
h
h h
h i
i h
h I
I A
A i
i l
l
change
change somewhere
somewhere in
in the
the Internet
Internet.
. A
A routing
routing protocol
protocol
is
is a
a combination
combination of
of rules
rules and
and procedures
procedures that
that lets
lets
i
i h
h I
I i f
i f h
h h
h f
f h
h
routers
routers in
in the
the Internet
Internet inform
inform each
each other
other of
of changes
changes.
.
Topics discussed in this section:
Topics discussed in this section:
Optimization
Intra- and Interdomain Routing
Topics discussed in this section:
Topics discussed in this section:
Intra and Interdomain Routing
Distance Vector Routing and RIP
Link State Routing and OSPF
22.27
Path Vector Routing and BGP
Figure 22.12 Autonomous systems
22.28
Figure 22.13 Popular routing protocols
22.29
Figure 22.14 Distance vector routing tables
22.30
Figure 22.15 Initialization of tables in distance vector routing
22.31
Note
In distance vector routing, each node
h it ti t bl ith it
shares its routing table with its
immediate neighbors periodically and
when there is a change.
22.32
Figure 22.16 Updating in distance vector routing
22.33
Figure 22.17 Two-node instability
22.34
Figure 22.18 Three-node instability
22.35
Figure 22.19 Example of a domain using RIP
22.36
Figure 22.20 Concept of link state routing
22.37
Figure 22.21 Link state knowledge
22.38
Figure 22.22 Dijkstra algorithm
22.39
Figure 22.23 Example of formation of shortest path tree
22.40
Table 22.2 Routing table for node A
22.41
Figure 22.24 Areas in an autonomous system
22.42
Figure 22.25 Types of links
22.43
Figure 22.26 Point-to-point link
22.44
Figure 22.27 Transient link
22.45
Figure 22.28 Stub link
22.46
Figure 22.29 Example of an AS and its graphical representation in OSPF
22.47
Figure 22.30 Initial routing tables in path vector routing
22.48
Figure 22.31 Stabilized tables for three autonomous systems
22.49
Figure 22.32 Internal and external BGP sessions
22.50
22
22-
-4
4 MULTICAST ROUTING PROTOCOLS
MULTICAST ROUTING PROTOCOLS
In
In this
this section,
section, we
we discuss
discuss multicasting
multicasting and
and multicast
multicast
routing
routing protocols
protocols.
.
Unicast, Multicast, and Broadcast
Topics discussed in this section:
Topics discussed in this section:
Applications
Multicast Routing
Routing Protocols
22.51
Routing Protocols
Figure 22.33 Unicasting
22.52
Note
In unicasting, the router forwards the
i d k t th h
received packet through
only one of its interfaces.
22.53
Figure 22.34 Multicasting
22.54
Note
In multicasting, the router may
f d th i d k t
forward the received packet
through several of its interfaces.
22.55
Figure 22.35 Multicasting versus multiple unicasting
22.56
Note
Emulation of multicasting through
lti l i ti i t ffi i t
multiple unicasting is not efficient
and may create long delays,
particularly with a large group.
22.57
Note
In unicast routing, each router in the
d i h t bl th t d fi
domain has a table that defines
a shortest path tree to possible
destinations.
22.58
Figure 22.36 Shortest path tree in unicast routing
22.59
Note
In multicast routing, each involved
t d t t t
router needs to construct
a shortest path tree for each group.
22.60
Figure 22.37 Source-based tree approach
22.61
Note
In the source-based tree approach, each
t d t h h t t th
router needs to have one shortest path
tree for each group.
22.62
Figure 22.38 Group-shared tree approach
22.63
Note
In the group-shared tree approach, only
th t hi h h h t t
the core router, which has a shortest
path tree for each group, is involved in
multicasting.
22.64
Figure 22.39 Taxonomy of common multicast protocols
22.65
Note
Multicast link state routing uses the
b d t h
source-based tree approach.
22.66
Note
Flooding broadcasts packets, but
t l i th t
creates loops in the systems.
22.67
Note
RPF eliminates the loop in the
fl di
flooding process.
22.68
Figure 22.40 Reverse path forwarding (RPF)
22.69
Figure 22.41 Problem with RPF
22.70
Figure 22.42 RPF Versus RPB
22.71
Note
RPB creates a shortest path broadcast
Note
RPB creates a shortest path broadcast
tree from the source to each destination.
It g arantees that each destination
It guarantees that each destination
receives one and only one copy
of the packet.
22.72
Figure 22.43 RPF, RPB, and RPM
22.73
Note
RPM adds pruning and grafting to RPB
Note
RPM adds pruning and grafting to RPB
to create a multicast shortest
path tree that s pports d namic
path tree that supports dynamic
membership changes.
22.74
Figure 22.44 Group-shared tree with rendezvous router
22.75
Figure 22.45 Sending a multicast packet to the rendezvous router
22.76
N t
In CBT the source sends the multicast
Note
In CBT, the source sends the multicast
packet (encapsulated in a unicast
k ) h Th
packet) to the core router. The core
router decapsulates the packet and
p p
forwards it to all interested interfaces.
22.77
Note
PIM-DM is used in a dense multicast
i t h LAN
environment, such as a LAN.
22.78
Note
PIM-DM uses RPF and pruning and
fti t t i t h dl
grafting strategies to handle
multicasting.
However, it is independent of the
underlying unicast protocol.
underlying unicast protocol.
22.79
Note
PIM-SM is used in a sparse multicast
i t h WAN
environment such as a WAN.
22.80
Note
PIM-SM is similar to CBT but uses a
i l d
simpler procedure.
22.81
Figure 22.46 Logical tunneling
22.82
Figure 22.47 MBONE
22.83

More Related Content

What's hot

Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flowassinha
 
Email server configuration on cisco packet tracer
Email server configuration on cisco packet tracerEmail server configuration on cisco packet tracer
Email server configuration on cisco packet tracerprodhan999
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)Joud Khattab
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Canada
 
Packet Tracer Simulation Lab Layer 2 Switching
Packet Tracer Simulation Lab Layer 2 SwitchingPacket Tracer Simulation Lab Layer 2 Switching
Packet Tracer Simulation Lab Layer 2 SwitchingJohnson Liu
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA Packet Tracer 1.6.1
CCNA Packet Tracer 1.6.1CCNA Packet Tracer 1.6.1
CCNA Packet Tracer 1.6.1Rafat Khandaker
 
Jobsheet 3 ad hoc
Jobsheet 3 ad hocJobsheet 3 ad hoc
Jobsheet 3 ad hocfmraihan
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)newbie2019
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptxKISHOYIANKISH
 
Umts access kpi troubleshooting guide rrc
Umts access kpi troubleshooting guide   rrcUmts access kpi troubleshooting guide   rrc
Umts access kpi troubleshooting guide rrcPrashant Gaurav
 
VPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOMEVPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOMEnetworkershome
 
Huawei switch configuration commands
Huawei switch configuration commandsHuawei switch configuration commands
Huawei switch configuration commandsHuanetwork
 

What's hot (20)

Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 
Email server configuration on cisco packet tracer
Email server configuration on cisco packet tracerEmail server configuration on cisco packet tracer
Email server configuration on cisco packet tracer
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Packet Tracer Simulation Lab Layer 2 Switching
Packet Tracer Simulation Lab Layer 2 SwitchingPacket Tracer Simulation Lab Layer 2 Switching
Packet Tracer Simulation Lab Layer 2 Switching
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
CCNA Packet Tracer 1.6.1
CCNA Packet Tracer 1.6.1CCNA Packet Tracer 1.6.1
CCNA Packet Tracer 1.6.1
 
Jobsheet 3 ad hoc
Jobsheet 3 ad hocJobsheet 3 ad hoc
Jobsheet 3 ad hoc
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 
Ch15
Ch15Ch15
Ch15
 
Umts access kpi troubleshooting guide rrc
Umts access kpi troubleshooting guide   rrcUmts access kpi troubleshooting guide   rrc
Umts access kpi troubleshooting guide rrc
 
VPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOMEVPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOME
 
Huawei switch configuration commands
Huawei switch configuration commandsHuawei switch configuration commands
Huawei switch configuration commands
 

Similar to Ch22

22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_RoutingAhmar Hashmi
 
module 5 ch22_networking_routing.pdf
module 5 ch22_networking_routing.pdfmodule 5 ch22_networking_routing.pdf
module 5 ch22_networking_routing.pdfprashant554034
 
Concept of Network Routing Layer
Concept of Network Routing LayerConcept of Network Routing Layer
Concept of Network Routing LayerPawan Singh
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsNoctorous Jamal
 
Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-junkut3
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_MulticastingAhmar Hashmi
 
routing protocol.pptx
routing protocol.pptxrouting protocol.pptx
routing protocol.pptxAyush616831
 
Cisco discovery drs ent module 6 - v.4 in english.
Cisco discovery   drs ent module 6 - v.4 in english.Cisco discovery   drs ent module 6 - v.4 in english.
Cisco discovery drs ent module 6 - v.4 in english.igede tirtanata
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork LayerZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...ZahouAmel1
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routingHamzahMohammed4
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdfmrcopyxerox
 

Similar to Ch22 (20)

22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
 
Chapter 22
Chapter 22Chapter 22
Chapter 22
 
module 5 ch22_networking_routing.pdf
module 5 ch22_networking_routing.pdfmodule 5 ch22_networking_routing.pdf
module 5 ch22_networking_routing.pdf
 
4d routing
4d routing4d routing
4d routing
 
ch22.ppt
ch22.pptch22.ppt
ch22.ppt
 
Concept of Network Routing Layer
Concept of Network Routing LayerConcept of Network Routing Layer
Concept of Network Routing Layer
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Unit 4
Unit  4Unit  4
Unit 4
 
Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
 
Ch21
Ch21Ch21
Ch21
 
routing protocol.pptx
routing protocol.pptxrouting protocol.pptx
routing protocol.pptx
 
Cisco discovery drs ent module 6 - v.4 in english.
Cisco discovery   drs ent module 6 - v.4 in english.Cisco discovery   drs ent module 6 - v.4 in english.
Cisco discovery drs ent module 6 - v.4 in english.
 
Routing
RoutingRouting
Routing
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routing
 
Network layer
Network layerNetwork layer
Network layer
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 

Recently uploaded

GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 

Recently uploaded (20)

GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 

Ch22

  • 1. Chapter 22 Network Layer: Delivery, Forwarding, and Routing and Routing 22.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 22 22- -1 1 DELIVERY DELIVERY Th Th t k t k l l i i th th h dli h dli f f th th The The network network layer layer supervises supervises the the handling handling of of the the packets packets by by the the underlying underlying physical physical networks networks. . We We d fi d fi thi thi h dli h dli th th d li d li f f k t k t define define this this handling handling as as the the delivery delivery of of a a packet packet. . Topics discussed in this section: Topics discussed in this section: Direct Versus Indirect Delivery 22.2
  • 3. Figure 22.1 Direct and indirect delivery 22.3
  • 4. 22 22- -2 2 FORWARDING FORWARDING F di F di t t l l th th k t k t i i it it t t t t Forwarding Forwarding means means to to place place the the packet packet in in its its route route to to its its destination destination. . Forwarding Forwarding requires requires a a host host or or a a router router t t h h ti ti t bl t bl Wh Wh h t h t h h k t k t t t to to have have a a routing routing table table. . When When a a host host has has a a packet packet to to send send or or when when a a router router has has received received a a packet packet to to be be f d d f d d it it l k l k t t thi thi t bl t bl t t fi d fi d th th t t t t th th forwarded, forwarded, it it looks looks at at this this table table to to find find the the route route to to the the final final destination destination. . Forwarding Techniques Topics discussed in this section: Topics discussed in this section: Forwarding Techniques Forwarding Process Routing Table 22.4 g
  • 5. Figure 22.2 Route method versus next-hop method 22.5
  • 6. Figure 22.3 Host-specific versus network-specific method 22.6
  • 7. Figure 22.4 Default method 22.7
  • 8. Figure 22.5 Simplified forwarding module in classless address 22.8
  • 9. Note In classless addressing, we need at least f l i ti t bl four columns in a routing table. 22.9
  • 10. Example 22.1 Make a routing table for router R1, using the configuration in Figure 22.6. configuration in Figure 22.6. Solution Solution Table 22.1 shows the corresponding table. 22.10
  • 11. Figure 22.6 Configuration for Example 22.1 22.11
  • 12. T bl 22 1 R i bl f R1 i Fi 22 6 Table 22.1 Routing table for router R1 in Figure 22.6 22.12
  • 13. Example 22.2 Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address 180.70.65.140. Solution The router performs the following steps: 1. The first mask (/26) is applied to the destination address. The result is 180.70.65.128, which does not match the corresponding network address. 2. The second mask (/25) is applied to the destination address. The result is 180.70.65.128, which matches the corresponding network address. The next-hop address and the interface number m0 are passed to ARP for 22.13 further processing.
  • 14. Example 22.3 Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address 201.4.22.35. Solution The router performs the following steps: The router performs the following steps: 1. The first mask (/26) is applied to the destination address The result is 201 4 22 0 which does not address. The result is 201.4.22.0, which does not match the corresponding network address. 2 The second mask (/25) is applied to the destination 2. The second mask (/25) is applied to the destination address. The result is 201.4.22.0, which does not match the corresponding network address (row 2) 22.14 match the corresponding network address (row 2).
  • 15. Example 22.3 (continued) 3. The third mask (/24) is applied to the destination address. The result is 201.4.22.0, which matches the corresponding network address. The destination address of the packet and the interface number m3 are passed to ARP. 22.15
  • 16. Example 22.4 Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address 18.24.32.78. Solution This time all masks are applied, one by one, to the destination address, but no matching network address is found. When it reaches the end of the table, the module gives the next-hop address 180.70.65.200 and interface number m2 to ARP. This is probably an outgoing package that needs to be sent, via the default router, to someplace else in the Internet. 22.16
  • 17. Figure 22.7 Address aggregation 22.17
  • 18. Figure 22.8 Longest mask matching 22.18
  • 19. Example 22.5 As an example of hierarchical routing, let us consider Figure 22.9. A regional ISP is granted 16,384 addresses Figure 22.9. A regional ISP is granted 16,384 addresses starting from 120.14.64.0. The regional ISP has decided to divide this block into four subblocks, each with 4096 to divide this block into four subblocks, each with 4096 addresses. Three of these subblocks are assigned to three local ISPs; the second subblock is reserved for future use. local ISPs; the second subblock is reserved for future use. Note that the mask for each block is /20 because the original block with mask /18 is divided into 4 blocks. original block with mask /18 is divided into 4 blocks. The first local ISP has divided its assigned subblock into 8 smaller blocks and assigned each to a small ISP. Each small ISP provides services to 128 households, each using f dd 22.19 four addresses.
  • 20. Example 22.5 (continued) The second local ISP has divided its block into 4 blocks and has assigned the addresses to four large and has assigned the addresses to four large organizations. The third local ISP has divided its block into 16 blocks and assigned each block to a small organization. Each small organization has 256 addresses, and the mask is /24. There is a sense of hierarchy in this configuration. All routers in the Internet send a packet with destination routers in the Internet send a packet with destination address 120.14.64.0 to 120.14.127.255 to the regional ISP. 22.20
  • 21. Figure 22.9 Hierarchical routing with ISPs 22.21
  • 22. Figure 22.10 Common fields in a routing table 22.22
  • 23. Example 22.6 One utility that can be used to find the contents of a routing table for a host or router is netstat in UNIX or LINUX. The next slide shows the list of the contents of a d f l h d i d h default server. We have used two options, r and n. The option r indicates that we are interested in the routing bl d h i i di h l ki f table, and the option n indicates that we are looking for numeric addresses. Note that this is a routing table for a h Al h h di d h i bl host, not a router. Although we discussed the routing table for a router throughout the chapter, a host also needs a i bl routing table. 22.23
  • 24. Example 22.6 (continued) The destination column here defines the network address. The term gateway used by UNIX is synonymous with router. This column actually defines the address of the next hop. The value 0.0.0.0 shows that the delivery is direct. The last entry has a flag of G, which means that the destination can be reached through a router (default router). The Iface 22.24 defines the interface.
  • 25. Example 22.6 (continued) More information about the IP address and physical f p y address of the server can be found by using the ifconfig command on the given interface (eth0). g f ( ) 22.25
  • 26. Figure 22.11 Configuration of the server for Example 22.6 22.26
  • 27. 22 22- -3 3 UNICAST ROUTING PROTOCOLS UNICAST ROUTING PROTOCOLS A A routing routing table table can can be be either either static static or or dynamic dynamic. . A A static static bl bl i i i h i h l l i i A A d i d i bl bl i i table table is is one one with with manual manual entries entries. . A A dynamic dynamic table table is is one one that that is is updated updated automatically automatically when when there there is is a a h h h h i i h h I I A A i i l l change change somewhere somewhere in in the the Internet Internet. . A A routing routing protocol protocol is is a a combination combination of of rules rules and and procedures procedures that that lets lets i i h h I I i f i f h h h h f f h h routers routers in in the the Internet Internet inform inform each each other other of of changes changes. . Topics discussed in this section: Topics discussed in this section: Optimization Intra- and Interdomain Routing Topics discussed in this section: Topics discussed in this section: Intra and Interdomain Routing Distance Vector Routing and RIP Link State Routing and OSPF 22.27 Path Vector Routing and BGP
  • 28. Figure 22.12 Autonomous systems 22.28
  • 29. Figure 22.13 Popular routing protocols 22.29
  • 30. Figure 22.14 Distance vector routing tables 22.30
  • 31. Figure 22.15 Initialization of tables in distance vector routing 22.31
  • 32. Note In distance vector routing, each node h it ti t bl ith it shares its routing table with its immediate neighbors periodically and when there is a change. 22.32
  • 33. Figure 22.16 Updating in distance vector routing 22.33
  • 34. Figure 22.17 Two-node instability 22.34
  • 35. Figure 22.18 Three-node instability 22.35
  • 36. Figure 22.19 Example of a domain using RIP 22.36
  • 37. Figure 22.20 Concept of link state routing 22.37
  • 38. Figure 22.21 Link state knowledge 22.38
  • 39. Figure 22.22 Dijkstra algorithm 22.39
  • 40. Figure 22.23 Example of formation of shortest path tree 22.40
  • 41. Table 22.2 Routing table for node A 22.41
  • 42. Figure 22.24 Areas in an autonomous system 22.42
  • 43. Figure 22.25 Types of links 22.43
  • 46. Figure 22.28 Stub link 22.46
  • 47. Figure 22.29 Example of an AS and its graphical representation in OSPF 22.47
  • 48. Figure 22.30 Initial routing tables in path vector routing 22.48
  • 49. Figure 22.31 Stabilized tables for three autonomous systems 22.49
  • 50. Figure 22.32 Internal and external BGP sessions 22.50
  • 51. 22 22- -4 4 MULTICAST ROUTING PROTOCOLS MULTICAST ROUTING PROTOCOLS In In this this section, section, we we discuss discuss multicasting multicasting and and multicast multicast routing routing protocols protocols. . Unicast, Multicast, and Broadcast Topics discussed in this section: Topics discussed in this section: Applications Multicast Routing Routing Protocols 22.51 Routing Protocols
  • 53. Note In unicasting, the router forwards the i d k t th h received packet through only one of its interfaces. 22.53
  • 55. Note In multicasting, the router may f d th i d k t forward the received packet through several of its interfaces. 22.55
  • 56. Figure 22.35 Multicasting versus multiple unicasting 22.56
  • 57. Note Emulation of multicasting through lti l i ti i t ffi i t multiple unicasting is not efficient and may create long delays, particularly with a large group. 22.57
  • 58. Note In unicast routing, each router in the d i h t bl th t d fi domain has a table that defines a shortest path tree to possible destinations. 22.58
  • 59. Figure 22.36 Shortest path tree in unicast routing 22.59
  • 60. Note In multicast routing, each involved t d t t t router needs to construct a shortest path tree for each group. 22.60
  • 61. Figure 22.37 Source-based tree approach 22.61
  • 62. Note In the source-based tree approach, each t d t h h t t th router needs to have one shortest path tree for each group. 22.62
  • 63. Figure 22.38 Group-shared tree approach 22.63
  • 64. Note In the group-shared tree approach, only th t hi h h h t t the core router, which has a shortest path tree for each group, is involved in multicasting. 22.64
  • 65. Figure 22.39 Taxonomy of common multicast protocols 22.65
  • 66. Note Multicast link state routing uses the b d t h source-based tree approach. 22.66
  • 67. Note Flooding broadcasts packets, but t l i th t creates loops in the systems. 22.67
  • 68. Note RPF eliminates the loop in the fl di flooding process. 22.68
  • 69. Figure 22.40 Reverse path forwarding (RPF) 22.69
  • 70. Figure 22.41 Problem with RPF 22.70
  • 71. Figure 22.42 RPF Versus RPB 22.71
  • 72. Note RPB creates a shortest path broadcast Note RPB creates a shortest path broadcast tree from the source to each destination. It g arantees that each destination It guarantees that each destination receives one and only one copy of the packet. 22.72
  • 73. Figure 22.43 RPF, RPB, and RPM 22.73
  • 74. Note RPM adds pruning and grafting to RPB Note RPM adds pruning and grafting to RPB to create a multicast shortest path tree that s pports d namic path tree that supports dynamic membership changes. 22.74
  • 75. Figure 22.44 Group-shared tree with rendezvous router 22.75
  • 76. Figure 22.45 Sending a multicast packet to the rendezvous router 22.76
  • 77. N t In CBT the source sends the multicast Note In CBT, the source sends the multicast packet (encapsulated in a unicast k ) h Th packet) to the core router. The core router decapsulates the packet and p p forwards it to all interested interfaces. 22.77
  • 78. Note PIM-DM is used in a dense multicast i t h LAN environment, such as a LAN. 22.78
  • 79. Note PIM-DM uses RPF and pruning and fti t t i t h dl grafting strategies to handle multicasting. However, it is independent of the underlying unicast protocol. underlying unicast protocol. 22.79
  • 80. Note PIM-SM is used in a sparse multicast i t h WAN environment such as a WAN. 22.80
  • 81. Note PIM-SM is similar to CBT but uses a i l d simpler procedure. 22.81
  • 82. Figure 22.46 Logical tunneling 22.82