SlideShare a Scribd company logo
1 of 154
THE NETWORK LAYER Chapter 5
OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],application transport network data link physical application transport network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical
NETWORK LAYER DESIGN ISSUES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],CONNECTIONLESS: DATAGRAM (1) 1. Send Data 2. Receive Data application transport network data link physical application transport network data link physical
CONNECTIONLESS: DATAGRAM (2) ,[object Object],The table of router A is changed because of some reasons! Management and update this tables for routing =  Routing algorithm   Store-and-Forward  packet  Subnet Routing tables
[object Object],[object Object],[object Object],VIRTUAL CIRCUITS (1) 1.  Initiate call 2. I ncoming call 3.  Accept call 4.  Call connected 5.  Data flow begins 6.  Receive data application transport network data link physical application transport network data link physical
VIRTUAL CIRCUITS (2) ,[object Object]
ATM (1) ,[object Object],[object Object],[object Object],[object Object]
ATM (2) ,[object Object],[object Object],[object Object]
COMPARISON OF VIRTUAL-CIRCUIT AND DATAGRAM Internet ATM
QUALITY OF SERVICE: QOS (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QUALITY OF SERVICE: QOS (2) ,[object Object],[object Object],[object Object]
ROUTING (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ROUTING (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DIJKSTRA ALGORITHM (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Non-Adaptive Algorithm
DIJKSTRA ALGORITHM (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],N: A, B, C, D, E, F C(A,C)=5; C(C,A)=5 C(B,D)=2; C(D,B)=3 … Source=A p(F): A-D-E-F D(F)=4 Example: A F D C E B 1 1 1 2 2 2 5 3 5 3 5 3
DIJKSTRA ALGORITHM (3) 1  Initialization:   2  N = {A}  3  For all nodes v  4  If v adjacent to A then 5  D(v) = c(A,v)  6  Else D(v) = infinity  8  Loop   9  Find w not in N such that D(w) is a minimum  10  Add w to N  11  Update D(v) for all v adjacent to w and not in N:  12  D(v) = min(  D(v),   D(w)  + c(w,v)  )  /* new cost to v is either old cost to v or known shortest path  cost to w plus cost from w to v */  13  until  all nodes in N  C version of this algorithm is available in book  v w D(v) c(w,v) D(w) A
DIJKSTRA ALGORITHM (4) ,[object Object],Step 0 1 2 3 4 5 start N A AD ADE ADEB ADEBC ADEBCF D(B),p(B) 2,A-B 2,A-B 2,A-B 2,A-B 2,A-B 2,A-B D(C),p(C) 5,A-C 4,A-D-C 3,A-D-E-C 3,A-D-E-C 3,A-D-E-C 3,A-D-E-C D(D),p(D) 1,A-D 1,A-D 1,A-D 1,A-D 1,A-D 1,A-D D(E),p(E) infinity 2,A-D-E 2,A-D-E 2,A-D-E 2,A-D-E 2,A-D-E D(F),p(F) infinity infinity 4,A-D-E-F 4,A-D-E-F 4,A-D-E-F 4,A-D-E-F D(v): Distance (cost) of A to v. P(v): nodes along path fromA to v. A F D C E B 1 1 1 2 2 2 5 3 5 3
DIJKSTRA'S SHORTEST PATH ALGORITHM ,[object Object],s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6        0 distance label S = {  } PQ = { s, 2, 3, 4, 5, 6, 7, t }
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6        0 distance label S = {  } PQ = { s, 2, 3, 4, 5, 6, 7, t } delmin
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 distance label S = { s } PQ = { 2, 3, 4, 5, 6, 7, t } decrease key  X   X X
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 distance label S = { s } PQ = { 2, 3, 4, 5, 6, 7, t }  X   X X delmin
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X decrease key X 33
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X X 33 delmin
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2, 6 } PQ = { 3, 4, 5, 7, t }  X   X X X 33 44 X X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6 } PQ = { 3, 4, 5, 7, t }  X   X X 44 X delmin  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6, 7 } PQ = { 3, 4, 5, t }  X   X X 44 X 35 X 59 X 24  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6, 7 } PQ = { 3, 4, 5, t }  X   X X 44 X 35 X 59 X delmin  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 6, 7 } PQ = { 4, 5, t }  X   X X 44 X 35 X 59 X X 51 X 34  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 6, 7 } PQ = { 4, 5, t }  X   X X 44 X 35 X 59 X X 51 X 34 delmin  X 33 X 32 24
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 5, 6, 7 } PQ = { 4, t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 5, 6, 7 } PQ = { 4, t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45 delmin  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7 } PQ = { t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7 } PQ = { t }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45 delmin  X 33 X 32 24
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7, t } PQ = { }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7, t } PQ = { }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45  X 33 X 32
DIJKSTRA'S ALGORITHM - PSEUDOCODE dist[s] ←0  (distance to source vertex is zero) for  all  v ∈ V–{s}         do   dist[v] ←∞  (set all other distances to infinity)  S←∅  (S, the set of visited vertices is initially empty)  Q←V    (Q, the queue initially contains all vertices)                 while  Q ≠∅  (while the queue is not empty)  do    u ←  mindistance (Q,dist) (select the element of Q with the min. distance)         S←S∪{u}  (add u to list of visited vertices)         for all  v ∈ neighbors[u]                 do  if    dist[v] > dist[u] + w(u, v)  (if new shortest path found)                          then       d[v] ←d[u] + w(u, v) (set new value of shortest path) (if desired, add traceback code) return  dist
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
One more Ex:
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],DIJKSTRA ALGORITHM (5)
FLOODING ALGORITHM (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Non-Adaptive Algorithm
FLOODING ALGORITHM (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DISTANCE VECTOR ROUTING (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Adaptive Algorithm
DISTANCE VECTOR ROUTING (3) ,[object Object],[object Object],[object Object],D J  (G,?)=  c(J,H)+min w {D H (G,w)}= 6+12= 18
[object Object],[object Object],[object Object],[object Object],[object Object]
DISTANCE VECTOR ROUTING (4) ,[object Object],[object Object],[object Object],[object Object],[object Object],Table for dest.=A There is no path to A In a subnet with longest subnet path=N, after N exchanges everyone will know
DISTANCE VECTOR ROUTING (5) ,[object Object],[object Object],[object Object],After this A goes down Counting will continuous to infinity   ,[object Object],[object Object],B thinks that there is a path to A thru C but C itself go to A via B!
LINK STATE ROUTING (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Adaptive Algorithm
LINK STATE ROUTING (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LINK STATE ROUTING (3) The link state packets for this subnet. The packet buffer for router B, Used in step  
THE NETWORK LAYER IN THE INTERNET (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NETWORK LAYER IN THE INTERNET (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NETWORK LAYER IN THE INTERNET (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NETWORK LAYER IN THE INTERNET (4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NETWORK LAYER IN THE INTERNET (5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP FRAGMENTATION AND REASSEMBLY (1) fragmentation:  in:  one large datagram out:  3 smaller datagrams reassembly
IP FRAGMENTATION AND REASSEMBLY (2) ID =x offset =0 fragflag =0 length =4000 ID =x offset =0 fragflag =1 length =1500 ID =x offset =1480 fragflag =1 length =1500 ID =x offset =2960 fragflag =0 length =1040 One large datagram becomes 3 smaller datagrams. ,[object Object],[object Object],[object Object],0……….3979 data 20 Byte 4000 Bytes 0……….1479 1480…2959
IP ADDRESSES (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],223.1.1 .1 223.1.1 .3 223.1.1 .4 223.1.2 .9 223.1.1.1 = 11011111 00000001 00000001 00000001 223 1 1 1 223.1.1 .2 223.1.2 .2 223.1.2 .1 223.1.3 .2 223.1.3 .1 223.1.3 .27
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP ADDRESSES (2) 223.1.1 .1 223.1.1 .2 223.1.1 .3 223.1.1 .4 223.1.2 .9 223.1.2 .2 223.1.2. 1 223.1.3 .2 223.1.3 .1 223.1.3 .27 network consisting of 3 IP networks LAN
[object Object],IP ADDRESSES (3) 223.1.1.1 223.1.1.3 223.1.1.4 223.1.2.2 223.1.2.1 223.1.2.6 223.1.3.2 223.1.3.1 223.1.3.27 223.1.1.2 223.1.7.0 223.1.7.1 223.1.8.0 223.1.8.1 223.1.9.1 223.1.9.2 Interconnected  system consisting of six networks.
[object Object],IP ADDRESSES (4) 0 network host A C D class 1.0.0.0  to 127.255.255.255 128.0.0.0  to 191.255.255.255 192.0.0.0  to 223.255.255.255 224.0.0.0  to 239.255.255.255 32  bits 65K Hosts 16K Networks 254 Hosts 4M Networks 16M Hosts 126 Networks 110 network host 10 network host B 1110 multicast address
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP ADDRESSES (5) class code network host
IP ADDRESSES (6) ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP ADDRESSES (7) ,[object Object],[object Object],[object Object]
IP ADDRESSES (8) ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP ADDRESSES (9) ,[object Object],[object Object],[object Object]
[object Object],GETTING A DATAGRAM FROM SOURCE TO DEST. (1) ,[object Object],[object Object],misc fields source IP addr dest IP addr data 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2 .9 223.1.2 .2 223.1.2 .1 223.1.3 .2 223.1.3 .1 223.1.3 .27 A E B Dest. Net.  Next Router  Nhops 223.1.1  1 223.1.2   223.1.1.4  2 223.1.3   223.1.1.4  2 forwarding table in A
GETTING A DATAGRAM FROM SOURCE TO DEST. (2) B ,[object Object],[object Object],[object Object],[object Object],[object Object],forwarding table in A A 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 E Dest. Net. Next Router  Nhops 223.1.1  1 223.1.2  223.1.1.4  2 223.1.3  223.1.1.4  2 misc fields 223.1.1.1 223.1.1.3 data
GETTING A DATAGRAM FROM SOURCE TO DEST. (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],forwarding table in A 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 E A B Dest. Net. Next Router  Nhops 223.1.1  1 223.1.2  223.1.1.4  2 223.1.3  223.1.1.4  2 misc fields 223.1.1.1 223.1.2.3 data
GETTING A DATAGRAM FROM SOURCE TO DEST. (4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],forwarding table in router 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 A E B misc fields 223.1.1.1 223.1.2.3 data Dest. Net Router  Nhops  Interface 223.1.1  -  1  223.1.1.4   223.1.2  -  1  223.1.2.9 223.1.3  -  1  223.1.3.27
[object Object],THE INTERNET NETWORK LAYER ,[object Object],[object Object],[object Object],forwarding table ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Transport layer: TCP, UDP Link layer physical layer Network layer
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP ADDRESSES: HOW TO GET ONE?
THE INTERNET NETWORK LAYER PROTOCOLS  (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE INTERNET NETWORK LAYER PROTOCOLS (2) ,[object Object]
THE INTERNET NETWORK LAYER PROTOCOLS (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MOBILE IP
 
 
 
 
 
 
Remote host and mobile host communication
Mobile IP has two addresses  for a mobile host:  one home address and one care-of address.  The home address is permanent;  the care-of address changes as the mobile  host moves from one network to another.
Registration request and reply
Data transfer
 
 
 
ROUTING FOR MOBILE HOSTS ,[object Object]
ROUTING IN AD HOC NETWORKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ROUTE DISCOVERY  USING  AODV – AD-HOC ON DEMAND DISTANCE VECTOR ROUTING PROTOCOL  ,[object Object],[object Object],[object Object],[object Object],[object Object]
ROUTE DISCOVERY (2) ,[object Object]
ROUTE DISCOVERY (3) ,[object Object]
ROUTE MAINTENANCE ,[object Object],[object Object]
CONGESTION
CONGESTION CONTROL ALGORITHMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONGESTION  ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GENERAL PRINCIPLES OF CONGESTION CONTROL ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Increase the resources or  Decrease the load . That is not always possible. So we have to apply some congestion prevention policy.
CONGESTION PREVENTION POLICIES ,[object Object],5-26
CONGESTION CONTROL IN VIRTUAL-CIRCUIT SUBNETS ,[object Object]
HOP-BY-HOP CHOKE PACKETS ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
JITTER CONTROL ,[object Object]
QUALITY OF SERVICE ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LABEL SWITCHING AND MPLS ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual-circuit routing  Traditional Method MPLS it is  not possible to group several distinct paths  with different end points onto the same virtual-circuit identifier because there would be no way to distinguish them at the final destination.  With MPLS, the packets still contain their  final destination address +  label ,  so that at the end of the labeled route the  label header can be removed and forwarding can continue the usual way , using the network layer destination address. forwarding table construction in VC when a user wants to establish a connection, a  setup packet is launched  into the network to create the path and make the forwarding table entries forwarding table construction in MPLS there is  no setup phase  for each connection instead there are two ways for the forwarding table entries to be created.  In the  data-driven approach ,  Control-driven approach
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HOW NETWORKS DIFFER ,[object Object],5-43
HOW NETWORKS CAN BE CONNECTED ,[object Object],[object Object]
CONCATENATED VIRTUAL CIRCUITS ,[object Object]
CONNECTIONLESS INTERNETWORKING ,[object Object]
TUNNELING ,[object Object]
THE NETWORK LAYER IN THE INTERNET ,[object Object],[object Object]
IP ADDRESSES ,[object Object]
IP ADDRESSES (2) ,[object Object]
SUBNETS (2) ,[object Object]
IPV6
IPV6  MAJOR GOALS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAJOR IMPROVEMENTS OVER IPV4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPV6 PLANNED SUPPORT LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640
ADDRESS SPACE AND NOTATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640
IPv4 Header IPv6  Header - field ’ s  name  kept from IPv4 to IPv6 - fields not kept in IPv6 -  Name & position changed in IPv6 -  New field in IPv6 Legend Version IHL Type of Service Total Length Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding Version Traffic Class Flow Label Payload Length Next Header Hop Limit Source Address Destination Address
PACKET FORMAT DETAILS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640
SUMMARY OF HEADER CHANGES BETWEEN IPV4 & IPV6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXTENSION HEADERS next header = TCP TCP header + data IPv6 header next header = Routing TCP header + data Routing header next header = TCP IPv6 header next header = Routing fragment of TCP header + data Routing header next header = Fragment Fragment header next header = TCP IPv6 header
EXTENSION HEADERS (CONT.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FRAGMENT HEADER ,[object Object],[object Object],[object Object],[object Object],Next Header Original Packet Identifier Reserved Fragment Offset 0 0 M
IPV6 TECHNOLOGY SCOPE IP Service IPv4 Solution IPv6 Solution Mobile IP   with Direct Routing DHCP Mobile IP IGMP/ PIM/Multicast BGP IP Multicast MLD/ PIM/Multicast  BGP, Scope Identifier Mobility Autoconfiguration Serverless , Reconfiguration , DHCP 32-bit, Network  Address Translation 128-bit , Multiple Scopes Addressing Range Quality-of-Service Differentiated Service, Integrated Service Differentiated Service, Integrated Service Security IPSec Mandated,   works End-to-End IPSec
SUMMARY OF MAIN IPV6 BENEFITS ,[object Object],[object Object],[object Object],[object Object],[object Object]
IPV6 ADVANCED FEATURES ,[object Object],[object Object],[object Object],[object Object],[object Object]
KEY DIFFERENCES IN HEADER ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640
ROUTING EXTENSION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640 0 8 16 24 31 Next header Hd. Ext. Len 0 Segmnts left 1 – 24 addresses
THE MAIN IPV6 HEADER ,[object Object]
EXTENSION HEADERS ,[object Object],5-69
EXTENSION HEADERS (2) ,[object Object]
EXTENSION HEADERS (3) ,[object Object]

More Related Content

What's hot

Longest common subsequence
Longest common subsequenceLongest common subsequence
Longest common subsequenceKiran K
 
DISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEMDISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEMMANISH KUMAR
 
Applied Multivariate Statistical Analysis 6th Edition Johnson Solutions Manual
Applied Multivariate Statistical Analysis 6th Edition Johnson Solutions ManualApplied Multivariate Statistical Analysis 6th Edition Johnson Solutions Manual
Applied Multivariate Statistical Analysis 6th Edition Johnson Solutions Manualnumulotap
 
linear transformation and rank nullity theorem
linear transformation and rank nullity theorem linear transformation and rank nullity theorem
linear transformation and rank nullity theorem Manthan Chavda
 
Reduced order observers
Reduced order observersReduced order observers
Reduced order observersSolo Hermelin
 
String Matching with Finite Automata and Knuth Morris Pratt Algorithm
String Matching with Finite Automata and Knuth Morris Pratt AlgorithmString Matching with Finite Automata and Knuth Morris Pratt Algorithm
String Matching with Finite Automata and Knuth Morris Pratt AlgorithmKiran K
 
Linear transformation.ppt
Linear transformation.pptLinear transformation.ppt
Linear transformation.pptRaj Parekh
 
6 radar range-doppler-angular loops
6 radar range-doppler-angular loops6 radar range-doppler-angular loops
6 radar range-doppler-angular loopsSolo Hermelin
 
Linear transformations-thestuffpoint.com
Linear transformations-thestuffpoint.comLinear transformations-thestuffpoint.com
Linear transformations-thestuffpoint.comAbu Bakar Soomro
 
Bellmanford . montaser hamza.iraq
Bellmanford . montaser hamza.iraqBellmanford . montaser hamza.iraq
Bellmanford . montaser hamza.iraqmontaser185
 
Matrix of linear transformation
Matrix of linear transformationMatrix of linear transformation
Matrix of linear transformationbeenishbeenish
 
Chapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier TransformChapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier TransformAttaporn Ninsuwan
 
Chapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic SignalsChapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic SignalsAttaporn Ninsuwan
 
Filter design and simulation
Filter design and simulationFilter design and simulation
Filter design and simulationSandesh Agrawal
 
Floyd warshall-algorithm
Floyd warshall-algorithmFloyd warshall-algorithm
Floyd warshall-algorithmMalinga Perera
 

What's hot (20)

Longest common subsequence
Longest common subsequenceLongest common subsequence
Longest common subsequence
 
DISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEMDISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEM
 
Applied Multivariate Statistical Analysis 6th Edition Johnson Solutions Manual
Applied Multivariate Statistical Analysis 6th Edition Johnson Solutions ManualApplied Multivariate Statistical Analysis 6th Edition Johnson Solutions Manual
Applied Multivariate Statistical Analysis 6th Edition Johnson Solutions Manual
 
linear transformation and rank nullity theorem
linear transformation and rank nullity theorem linear transformation and rank nullity theorem
linear transformation and rank nullity theorem
 
Reduced order observers
Reduced order observersReduced order observers
Reduced order observers
 
14 mecv14 dvd
14 mecv14 dvd14 mecv14 dvd
14 mecv14 dvd
 
String Matching with Finite Automata and Knuth Morris Pratt Algorithm
String Matching with Finite Automata and Knuth Morris Pratt AlgorithmString Matching with Finite Automata and Knuth Morris Pratt Algorithm
String Matching with Finite Automata and Knuth Morris Pratt Algorithm
 
Linear transformation.ppt
Linear transformation.pptLinear transformation.ppt
Linear transformation.ppt
 
6 radar range-doppler-angular loops
6 radar range-doppler-angular loops6 radar range-doppler-angular loops
6 radar range-doppler-angular loops
 
Direct current machine
Direct current machineDirect current machine
Direct current machine
 
Linear transformations-thestuffpoint.com
Linear transformations-thestuffpoint.comLinear transformations-thestuffpoint.com
Linear transformations-thestuffpoint.com
 
Clase 15 dsp
Clase 15 dspClase 15 dsp
Clase 15 dsp
 
Clase 16 dsp
Clase 16 dspClase 16 dsp
Clase 16 dsp
 
Bellmanford . montaser hamza.iraq
Bellmanford . montaser hamza.iraqBellmanford . montaser hamza.iraq
Bellmanford . montaser hamza.iraq
 
Matrix of linear transformation
Matrix of linear transformationMatrix of linear transformation
Matrix of linear transformation
 
Chapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier TransformChapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier Transform
 
Chapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic SignalsChapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic Signals
 
Chapter 6 indices
Chapter 6 indicesChapter 6 indices
Chapter 6 indices
 
Filter design and simulation
Filter design and simulationFilter design and simulation
Filter design and simulation
 
Floyd warshall-algorithm
Floyd warshall-algorithmFloyd warshall-algorithm
Floyd warshall-algorithm
 

Viewers also liked

Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Gaussian Elimination
Gaussian EliminationGaussian Elimination
Gaussian EliminationZunAib Ali
 
Single source stortest path bellman ford and dijkstra
Single source stortest path bellman ford and dijkstraSingle source stortest path bellman ford and dijkstra
Single source stortest path bellman ford and dijkstraRoshan Tailor
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layerZee Haak
 
OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3koolkampus
 
Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)Jeffrey Des Binwag
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerVuz Dở Hơi
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 ProtocolMiles Kevin Galario
 
Digital data transmission
Digital data transmissionDigital data transmission
Digital data transmissionBZU lahore
 
Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11koolkampus
 
Internet Access via Cable TV Network
Internet Access via Cable TV NetworkInternet Access via Cable TV Network
Internet Access via Cable TV NetworkSandesh Naik
 

Viewers also liked (20)

Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Gaussian Elimination
Gaussian EliminationGaussian Elimination
Gaussian Elimination
 
Single source stortest path bellman ford and dijkstra
Single source stortest path bellman ford and dijkstraSingle source stortest path bellman ford and dijkstra
Single source stortest path bellman ford and dijkstra
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
Dynamics
DynamicsDynamics
Dynamics
 
Interfaz dte dce
Interfaz dte dceInterfaz dte dce
Interfaz dte dce
 
Sistema de Señalización de Canal Común SS7
Sistema de Señalización de Canal Común SS7Sistema de Señalización de Canal Común SS7
Sistema de Señalización de Canal Común SS7
 
Ch06 1
Ch06 1Ch06 1
Ch06 1
 
Interfaz dte
Interfaz dteInterfaz dte
Interfaz dte
 
Modosdetransmisin
ModosdetransmisinModosdetransmisin
Modosdetransmisin
 
OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3
 
Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
X.25 protocol
X.25 protocolX.25 protocol
X.25 protocol
 
Digital data transmission
Digital data transmissionDigital data transmission
Digital data transmission
 
Line coding
Line codingLine coding
Line coding
 
Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11
 
Internet Access via Cable TV Network
Internet Access via Cable TV NetworkInternet Access via Cable TV Network
Internet Access via Cable TV Network
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 

Similar to Jaimin chp-5 - network layer- 2011 batch

Dijkstra’s algorithm
Dijkstra’s algorithmDijkstra’s algorithm
Dijkstra’s algorithmfaisal2204
 
Bellman-Ford-Moore Algorithm and Dijkstra’s Algorithm
Bellman-Ford-Moore Algorithm and Dijkstra’s AlgorithmBellman-Ford-Moore Algorithm and Dijkstra’s Algorithm
Bellman-Ford-Moore Algorithm and Dijkstra’s AlgorithmFulvio Corno
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s Krish_ver2
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithmSrikrishnan Suresh
 
Single sourceshortestpath by emad
Single sourceshortestpath by emadSingle sourceshortestpath by emad
Single sourceshortestpath by emadKazi Emad
 
Session 13 - Single Source Shortest Path Method.pptx
Session 13 - Single Source Shortest Path Method.pptxSession 13 - Single Source Shortest Path Method.pptx
Session 13 - Single Source Shortest Path Method.pptxSATHWIKCHAKRI
 
Symbolic Regression on Network Properties
Symbolic Regression on Network PropertiesSymbolic Regression on Network Properties
Symbolic Regression on Network PropertiesMarcus Märtens
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET Journal
 
Module 3- transport_layer .pptx
Module 3- transport_layer           .pptxModule 3- transport_layer           .pptx
Module 3- transport_layer .pptxhariprasad279825
 
Branch and bounding : Data structures
Branch and bounding : Data structuresBranch and bounding : Data structures
Branch and bounding : Data structuresKàŕtheek Jåvvàjí
 
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdfDKTaxation
 
24. Shortest Path Algorithm.pdf
24. Shortest Path Algorithm.pdf24. Shortest Path Algorithm.pdf
24. Shortest Path Algorithm.pdfMohsinKhan970714
 
Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Alexander Litvinenko
 
String kmp
String kmpString kmp
String kmpthinkphp
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docxwellesleyterresa
 

Similar to Jaimin chp-5 - network layer- 2011 batch (20)

Dijkstra’s algorithm
Dijkstra’s algorithmDijkstra’s algorithm
Dijkstra’s algorithm
 
Bellman-Ford-Moore Algorithm and Dijkstra’s Algorithm
Bellman-Ford-Moore Algorithm and Dijkstra’s AlgorithmBellman-Ford-Moore Algorithm and Dijkstra’s Algorithm
Bellman-Ford-Moore Algorithm and Dijkstra’s Algorithm
 
dijkstras example.ppt
dijkstras example.pptdijkstras example.ppt
dijkstras example.ppt
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithm
 
12_Graph.pptx
12_Graph.pptx12_Graph.pptx
12_Graph.pptx
 
Single sourceshortestpath by emad
Single sourceshortestpath by emadSingle sourceshortestpath by emad
Single sourceshortestpath by emad
 
Network analysis
Network analysisNetwork analysis
Network analysis
 
Session 13 - Single Source Shortest Path Method.pptx
Session 13 - Single Source Shortest Path Method.pptxSession 13 - Single Source Shortest Path Method.pptx
Session 13 - Single Source Shortest Path Method.pptx
 
Symbolic Regression on Network Properties
Symbolic Regression on Network PropertiesSymbolic Regression on Network Properties
Symbolic Regression on Network Properties
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing Algorithms
 
Module 3- transport_layer .pptx
Module 3- transport_layer           .pptxModule 3- transport_layer           .pptx
Module 3- transport_layer .pptx
 
Branch and bounding : Data structures
Branch and bounding : Data structuresBranch and bounding : Data structures
Branch and bounding : Data structures
 
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
 
24. Shortest Path Algorithm.pdf
24. Shortest Path Algorithm.pdf24. Shortest Path Algorithm.pdf
24. Shortest Path Algorithm.pdf
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...
 
String kmp
String kmpString kmp
String kmp
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
 
4900514.ppt
4900514.ppt4900514.ppt
4900514.ppt
 

More from Jaimin Jani

BE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdf
BE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdfBE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdf
BE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdfJaimin Jani
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batchJaimin Jani
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batchJaimin Jani
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batchJaimin Jani
 
Jaimin chp-2 - 2011 batch
Jaimin   chp-2  - 2011 batchJaimin   chp-2  - 2011 batch
Jaimin chp-2 - 2011 batchJaimin Jani
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batchJaimin Jani
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batchJaimin Jani
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batchJaimin Jani
 

More from Jaimin Jani (8)

BE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdf
BE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdfBE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdf
BE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdf
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
Jaimin chp-2 - 2011 batch
Jaimin   chp-2  - 2011 batchJaimin   chp-2  - 2011 batch
Jaimin chp-2 - 2011 batch
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Jaimin chp-5 - network layer- 2011 batch

  • 1. THE NETWORK LAYER Chapter 5
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. COMPARISON OF VIRTUAL-CIRCUIT AND DATAGRAM Internet ATM
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. DIJKSTRA ALGORITHM (3) 1 Initialization: 2 N = {A} 3 For all nodes v 4 If v adjacent to A then 5 D(v) = c(A,v) 6 Else D(v) = infinity 8 Loop 9 Find w not in N such that D(w) is a minimum 10 Add w to N 11 Update D(v) for all v adjacent to w and not in N: 12 D(v) = min( D(v), D(w) + c(w,v) ) /* new cost to v is either old cost to v or known shortest path cost to w plus cost from w to v */ 13 until all nodes in N C version of this algorithm is available in book v w D(v) c(w,v) D(w) A
  • 18.
  • 19.
  • 20. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6        0 distance label S = { } PQ = { s, 2, 3, 4, 5, 6, 7, t }
  • 21. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6        0 distance label S = { } PQ = { s, 2, 3, 4, 5, 6, 7, t } delmin
  • 22. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 distance label S = { s } PQ = { 2, 3, 4, 5, 6, 7, t } decrease key  X   X X
  • 23. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 distance label S = { s } PQ = { 2, 3, 4, 5, 6, 7, t }  X   X X delmin
  • 24. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X
  • 25. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X decrease key X 33
  • 26. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X X 33 delmin
  • 27. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2, 6 } PQ = { 3, 4, 5, 7, t }  X   X X X 33 44 X X 32
  • 28. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6 } PQ = { 3, 4, 5, 7, t }  X   X X 44 X delmin  X 33 X 32
  • 29. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6, 7 } PQ = { 3, 4, 5, t }  X   X X 44 X 35 X 59 X 24  X 33 X 32
  • 30. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6, 7 } PQ = { 3, 4, 5, t }  X   X X 44 X 35 X 59 X delmin  X 33 X 32
  • 31. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 6, 7 } PQ = { 4, 5, t }  X   X X 44 X 35 X 59 X X 51 X 34  X 33 X 32
  • 32. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 6, 7 } PQ = { 4, 5, t }  X   X X 44 X 35 X 59 X X 51 X 34 delmin  X 33 X 32 24
  • 33. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 5, 6, 7 } PQ = { 4, t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45  X 33 X 32
  • 34. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 5, 6, 7 } PQ = { 4, t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45 delmin  X 33 X 32
  • 35. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7 } PQ = { t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45  X 33 X 32
  • 36. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7 } PQ = { t }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45 delmin  X 33 X 32 24
  • 37. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7, t } PQ = { }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45  X 33 X 32
  • 38. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7, t } PQ = { }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45  X 33 X 32
  • 39. DIJKSTRA'S ALGORITHM - PSEUDOCODE dist[s] ←0 (distance to source vertex is zero) for  all v ∈ V–{s}         do  dist[v] ←∞ (set all other distances to infinity) S←∅ (S, the set of visited vertices is initially empty) Q←V  (Q, the queue initially contains all vertices)               while Q ≠∅ (while the queue is not empty) do   u ←  mindistance (Q,dist) (select the element of Q with the min. distance)        S←S∪{u} (add u to list of visited vertices)        for all v ∈ neighbors[u]               do  if   dist[v] > dist[u] + w(u, v) (if new shortest path found)                          then      d[v] ←d[u] + w(u, v) (set new value of shortest path) (if desired, add traceback code) return dist
  • 51.  
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. LINK STATE ROUTING (3) The link state packets for this subnet. The packet buffer for router B, Used in step 
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 89.  
  • 90.  
  • 91.  
  • 92.  
  • 93.  
  • 94.  
  • 95. Remote host and mobile host communication
  • 96. Mobile IP has two addresses for a mobile host: one home address and one care-of address. The home address is permanent; the care-of address changes as the mobile host moves from one network to another.
  • 99.  
  • 100.  
  • 101.  
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124. Virtual-circuit routing Traditional Method MPLS it is not possible to group several distinct paths with different end points onto the same virtual-circuit identifier because there would be no way to distinguish them at the final destination. With MPLS, the packets still contain their final destination address + label , so that at the end of the labeled route the label header can be removed and forwarding can continue the usual way , using the network layer destination address. forwarding table construction in VC when a user wants to establish a connection, a setup packet is launched into the network to create the path and make the forwarding table entries forwarding table construction in MPLS there is no setup phase for each connection instead there are two ways for the forwarding table entries to be created. In the data-driven approach , Control-driven approach
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135. IPV6
  • 136.
  • 137.
  • 138.
  • 139.
  • 140. IPv4 Header IPv6 Header - field ’ s name kept from IPv4 to IPv6 - fields not kept in IPv6 - Name & position changed in IPv6 - New field in IPv6 Legend Version IHL Type of Service Total Length Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding Version Traffic Class Flow Label Payload Length Next Header Hop Limit Source Address Destination Address
  • 141.
  • 142.
  • 143. EXTENSION HEADERS next header = TCP TCP header + data IPv6 header next header = Routing TCP header + data Routing header next header = TCP IPv6 header next header = Routing fragment of TCP header + data Routing header next header = Fragment Fragment header next header = TCP IPv6 header
  • 144.
  • 145.
  • 146. IPV6 TECHNOLOGY SCOPE IP Service IPv4 Solution IPv6 Solution Mobile IP with Direct Routing DHCP Mobile IP IGMP/ PIM/Multicast BGP IP Multicast MLD/ PIM/Multicast BGP, Scope Identifier Mobility Autoconfiguration Serverless , Reconfiguration , DHCP 32-bit, Network Address Translation 128-bit , Multiple Scopes Addressing Range Quality-of-Service Differentiated Service, Integrated Service Differentiated Service, Integrated Service Security IPSec Mandated, works End-to-End IPSec
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.

Editor's Notes

  1. In addition to the expanded address space, IPv6 offers other benefits: Autoconfiguration - similar to IPX If you deploy large number of appliances, you can’t expect to set an IP address, you need some auto-configuration mechanism which scales DHCP may not be the right way to manage thousands on clients Ipsec is mandated in the architecture Security - NAT compromises end-to-end security in today’s networks by requiring that you trust the end devices. Allows traffic to bypass home subnet - there is still work being done in this area to provide necessary security - similar to “skinny protocol” – imagine IP telephony with no call manager required! Mobile IPv6 removes the triangular issue QoS in IPv6 is the same as IPv4 in QoS and header compression features. Both areas benefited from the work on IPv6! Actually the IPv6 header compresses better than IPv4 header because there are fewer fields! Other features are equivalent but for few details, ie: scope address in multicast,...
  2. Note that Quality of Service is not one of the benefits of IPv6 over IPv4, despite what you may have heard. Both versions of IP have exactly the same QoS features defined. The only difference is the presence of the Flow Label field in IPv6, which allows more efficient packet classification by routers, but this is really a minor implementation optimization, rather than a significant new QoS feature.