The network layer is responsible for transporting data segments from the sending host to the receiving host. Key functions of the network layer include forwarding, which moves packets through routers, and routing, which determines the path between source and destination. There are two main network architectures: connection-oriented networks using virtual circuits and connectionless networks using datagrams. Routers examine packet headers to perform forwarding and contain input/output ports connected by a switching fabric, as well as a routing processor that maintains routing tables.
The document provides information on the TCP/IP protocol suite including:
- TCP/IP has 4 layers (Application, Transport, Network, Data Link) compared to OSI's 7 layers.
- Common application layer protocols include FTP, Telnet, SMTP, HTTP.
- Transport layer protocols are TCP and UDP which provide reliable and unreliable data transmission.
- Network layer protocols like IP, ARP, and ICMP handle routing and addressing.
- Layers communicate through encapsulation where each layer adds its own header to protocol data units.
Link-state routing protocols use Dijkstra's algorithm to calculate the shortest path to all destinations based on a link-state database containing the full network topology. Each router runs the same algorithm locally to determine the optimal path. Key aspects include link-state advertisements to share connectivity information, the topological database to store network maps, and shortest path first calculations to derive routes. Common link-state protocols are OSPF and IS-IS. They provide fast convergence and scalability but require more resources than distance-vector protocols.
presentation on TCP/IP protocols data comunicationsAnyapuPranav
The document provides an overview of the TCP/IP protocol architecture. It discusses the five layers of TCP/IP including the physical, network access, internet, transport, and application layers. It describes the protocols used at each layer, such as IP, TCP, UDP, HTTP, and FTP. The document also discusses how data is encapsulated as it passes through each layer of the TCP/IP model and is transmitted from one host to another across networks and the internet.
This document provides an overview of the network layer and some of its key protocols. It begins with an introduction to the network layer and its main responsibilities, including routing packets between subnets that may have different addressing schemes or protocols. It then discusses some of the network layer's main functionalities and features. The remainder of the document defines and describes several important network layer protocols, including EIGRP, ICMP, IGMP, IPv4, and others. It provides high-level explanations of how these protocols function and their roles within the network layer.
The document discusses protocols and the TCP/IP protocol suite. It introduces the layered protocol architecture and describes the need for coordination between communicating systems. It explains key aspects of protocols including syntax, semantics, and timing. The TCP/IP protocol suite is presented including the layers of physical, network access, internet, and transport. TCP and UDP are described as transport layer protocols, with TCP providing reliable connection-oriented delivery and UDP being unreliable and connectionless. The OSI reference model layers and concepts of internetworking such as routers are also summarized.
This document provides an overview of the key topics covered in Chapter 4 of the textbook "Computer Networking: A Top Down Approach" including:
- The network layer principles of forwarding versus routing, how routers work, routing algorithms, and scaling techniques.
- Network layer service models including best effort, guaranteed delivery, and quality of service guarantees.
- Virtual circuit and datagram networks and how connections are established in each.
- The internal components and functions of routers including routing algorithms, forwarding tables, switching fabrics, input/output port queuing.
- The Internet network layer protocols including IP for addressing, datagrams, and fragmentation/reassembly, ICMP for error reporting, and routing protocols.
NP - Unit 3 - Forwarding Datagram and ICMPhamsa nandhini
The document discusses IP forwarding and ICMP. It describes how IP datagrams are forwarded across networks using routers and forwarding tables. ICMP allows routers to send error or control messages back to the source if a datagram experiences problems during forwarding. The key types of ICMP messages are described, such as echo request/reply for ping, destination unreachable, time exceeded, and parameter problem messages.
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
The document provides information on the TCP/IP protocol suite including:
- TCP/IP has 4 layers (Application, Transport, Network, Data Link) compared to OSI's 7 layers.
- Common application layer protocols include FTP, Telnet, SMTP, HTTP.
- Transport layer protocols are TCP and UDP which provide reliable and unreliable data transmission.
- Network layer protocols like IP, ARP, and ICMP handle routing and addressing.
- Layers communicate through encapsulation where each layer adds its own header to protocol data units.
Link-state routing protocols use Dijkstra's algorithm to calculate the shortest path to all destinations based on a link-state database containing the full network topology. Each router runs the same algorithm locally to determine the optimal path. Key aspects include link-state advertisements to share connectivity information, the topological database to store network maps, and shortest path first calculations to derive routes. Common link-state protocols are OSPF and IS-IS. They provide fast convergence and scalability but require more resources than distance-vector protocols.
presentation on TCP/IP protocols data comunicationsAnyapuPranav
The document provides an overview of the TCP/IP protocol architecture. It discusses the five layers of TCP/IP including the physical, network access, internet, transport, and application layers. It describes the protocols used at each layer, such as IP, TCP, UDP, HTTP, and FTP. The document also discusses how data is encapsulated as it passes through each layer of the TCP/IP model and is transmitted from one host to another across networks and the internet.
This document provides an overview of the network layer and some of its key protocols. It begins with an introduction to the network layer and its main responsibilities, including routing packets between subnets that may have different addressing schemes or protocols. It then discusses some of the network layer's main functionalities and features. The remainder of the document defines and describes several important network layer protocols, including EIGRP, ICMP, IGMP, IPv4, and others. It provides high-level explanations of how these protocols function and their roles within the network layer.
The document discusses protocols and the TCP/IP protocol suite. It introduces the layered protocol architecture and describes the need for coordination between communicating systems. It explains key aspects of protocols including syntax, semantics, and timing. The TCP/IP protocol suite is presented including the layers of physical, network access, internet, and transport. TCP and UDP are described as transport layer protocols, with TCP providing reliable connection-oriented delivery and UDP being unreliable and connectionless. The OSI reference model layers and concepts of internetworking such as routers are also summarized.
This document provides an overview of the key topics covered in Chapter 4 of the textbook "Computer Networking: A Top Down Approach" including:
- The network layer principles of forwarding versus routing, how routers work, routing algorithms, and scaling techniques.
- Network layer service models including best effort, guaranteed delivery, and quality of service guarantees.
- Virtual circuit and datagram networks and how connections are established in each.
- The internal components and functions of routers including routing algorithms, forwarding tables, switching fabrics, input/output port queuing.
- The Internet network layer protocols including IP for addressing, datagrams, and fragmentation/reassembly, ICMP for error reporting, and routing protocols.
NP - Unit 3 - Forwarding Datagram and ICMPhamsa nandhini
The document discusses IP forwarding and ICMP. It describes how IP datagrams are forwarded across networks using routers and forwarding tables. ICMP allows routers to send error or control messages back to the source if a datagram experiences problems during forwarding. The key types of ICMP messages are described, such as echo request/reply for ping, destination unreachable, time exceeded, and parameter problem messages.
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
This document provides an overview of the TCP/IP protocol stack. It discusses the four layers of TCP/IP - network interface, internet, transport and application layer - and how they relate to the seven-layer OSI model. Key protocols of each TCP/IP layer like IP, TCP, UDP, HTTP, FTP, SMTP are explained along with their functions. Other topics covered include ports, port scanning, and Windows sockets API.
The document provides an overview of the TCP/IP network model. It discusses the four layers of the TCP/IP model: application layer, transport layer, internet layer, and network access layer. The application layer contains protocols like HTTP and FTP that allow applications to access networked services. The transport layer uses TCP and UDP to deliver data and provide reliability. The internet layer handles routing and uses IP. The network access layer deals with physical network components like cables and network interface cards.
Network Layer addresses data at the logical and physical levels. Logical addresses are generated by CPUs and allow virtual addressing, while physical addresses map to specific memory locations. The network layer provides routing across multiple physical links from one device to another. IP addresses uniquely identify devices on the Internet, though they can change over time as connections change. IPv6 was developed to address the impending exhaustion of IPv4 addresses by expanding the address space to 128 bits.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
The document discusses computer networks and network protocols. It begins with an introduction to network protocols and the Internet protocols. It then provides definitions and explanations of communication protocols, including addressing, transmission modes, and error detection/recovery techniques. It lists and describes common network protocols like TCP/IP, routing protocols, FTP, SMTP, and more. It also discusses the OSI model layers, TCP/IP protocol suite, data encapsulation, protocol data units, protocol assignments to layers, and addresses at each layer.
The document discusses several network protocols used at different layers of the OSI model. It introduces NetBIOS/NetBEUI which provides name registration and connection-oriented/connectionless communication over LANs. TCP/IP is described as a layered protocol suite used widely on the internet, with IP, TCP, UDP operating at the network and transport layers. ARP and RARP are discussed as protocols that resolve logical to physical addresses. ICMP and IGMP are control protocols that provide error reporting and multicast group management. IPX/SPX is presented as an alternative to TCP/IP used in Novell networks. HDLC and SDLC are synchronous data link protocols used for communication over WAN links.
protocol and the TCP/IP suite Chapter 02daniel ayalew
The document discusses protocols and the TCP/IP protocol suite. It introduces the layered protocol architecture and describes the need for coordination between communicating systems. It explains key aspects of protocols including syntax, semantics, and timing. The TCP/IP protocol suite is presented including the layers of physical, network access, internet, and transport. TCP and UDP are described as transport layer protocols, with TCP providing reliable connection-oriented delivery and UDP being unreliable and connectionless. The OSI reference model layers and concepts of internetworking such as routers are also summarized.
This document provides a summary of key concepts related to routing and routing protocols. It discusses routing and how routers forward packets from source to destination using routing tables. Common routing algorithms and protocols like RIP, OSPF, BGP, DVMRP and PIM are explained at a high level. Network concepts like metrics, areas, autonomous systems, and multicast addressing are also covered briefly. The document is intended to provide an overview of routing fundamentals and protocols for a computer networks course.
TCP provides reliable, ordered delivery of data through the use of sequence numbers and acknowledgments. It accumulates data into segments and ensures delivery through retransmissions. UDP is a simpler protocol that does not ensure delivery or order, making it faster but unreliable. IP handles addressing and fragmentation of packets to accommodate networks with different maximum sizes. IPv6 was developed to support more devices, longer addresses, extension headers and simplified header processing.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
Routing protocols exchange information to determine the best paths between sources and destinations in a network. The document discusses several routing protocols:
Distance vector protocols like RIP propagate routing tables between routers periodically. They are simple to configure but slow to converge. Link state protocols like OSPF use link state advertisements to build a map of the network and calculate the lowest cost paths more quickly. OSPF divides large networks into areas to reduce routing table sizes and convergence times. It elects routers on area borders to aggregate routing information between areas.
The document discusses Internet protocols and their history. It describes how Internet protocols were first developed in the 1970s by DARPA to facilitate communication between research institutions. This led to the development of TCP/IP, which later became the foundation for the Internet and World Wide Web. The document then provides details on various Internet protocols like IP, TCP, UDP, and application-layer protocols. It describes features of each protocol and how they enable communication over the Internet.
Routing protocols allow routers to exchange information and dynamically calculate the optimal data pathways between any two points on a network. Interior routing protocols operate within an autonomous system, while exterior protocols route between autonomous systems. Common interior protocols include RIP, OSPF, IGRP, and EIGRP, while exterior protocols include EGP and BGP. Routing metrics like hop count, bandwidth, load, and reliability help routers determine the best routes. Dynamic routing enables automatic path selection and updating in response to topology changes. [/SUMMARY]
This document provides an overview of common TCP/IP tools including the command prompt, ipconfig, ping, and tracert. It also covers advanced TCP/IP tools such as netstat, nbtstat, pathping, nslookup, netsh, route, net, and telnet. The objectives are to understand basic and advanced TCP/IP commands and their functionality in displaying network configuration, testing connectivity, tracing network paths, and troubleshooting. Additional resources like books, courses, and exams are listed to further learning.
TCP/IP is a set of communication protocols used to connect devices on the internet and other networks. It has two main protocols - TCP for reliable transmission of data between devices, and IP for addressing devices and routing packets across networks. TCP/IP uses ports to allow multiple applications to run simultaneously on a single device. Routers use IP addressing and routing tables to determine the best path for sending packets between devices on different networks.
The document discusses IPv4 and its datagram format. It explains that IPv4 is a best-effort, connectionless protocol that provides no error control or flow control. The datagram format includes a header containing fields like version, header length, total length, protocol, source/destination addresses, and an optional data field. It describes fields related to fragmentation, checksum calculation, and optional header fields like timestamps and routing options.
TCP provides reliable data transfer over unreliable packet networks by using acknowledgments, retransmissions, and adaptive congestion control. It works with IP to transfer data through routers that may drop packets. While TCP ensures reliable delivery, it must control its transmission rate to avoid overwhelming network capacity and causing congestion collapse. This is achieved through additive-increase, multiplicative-decrease of the congestion window and techniques like active queue management.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
TCP/IP is a set of communication protocols that enable data transmission across networks and between devices. It involves two main protocols: TCP and IP. TCP establishes reliable connections and ensures reliable delivery of data packets. IP handles addressing, routing packets between networks, and fragmentation/reassembly of packets. Key features of TCP/IP include logical addressing, routability, name resolution, multiplexing, and interoperability. TCP/IP operates on four layers - network interface, internet, transport, and application - with each layer building on the services of the layer below.
The document outlines Chapter 4 of a networking textbook. Chapter 4 covers the network layer, including network layer services, how routers work, routing algorithms, and implementations in the Internet. The key topics covered are virtual circuit versus datagram networks, the functions of routers including forwarding and routing, and routing algorithms like link state and distance vector.
on sending side encapsulates segments into datagrams on rcving side, deliver...Ashish Gupta
The document provides an overview of the key concepts in the network layer, including that the network layer encapsulates segments into datagrams for transmission, routers examine header fields to forward datagrams to their destination, and common routing protocols and algorithms like RIP, OSPF, and BGP are used to route packets across the Internet.
This document provides an overview of the TCP/IP protocol stack. It discusses the four layers of TCP/IP - network interface, internet, transport and application layer - and how they relate to the seven-layer OSI model. Key protocols of each TCP/IP layer like IP, TCP, UDP, HTTP, FTP, SMTP are explained along with their functions. Other topics covered include ports, port scanning, and Windows sockets API.
The document provides an overview of the TCP/IP network model. It discusses the four layers of the TCP/IP model: application layer, transport layer, internet layer, and network access layer. The application layer contains protocols like HTTP and FTP that allow applications to access networked services. The transport layer uses TCP and UDP to deliver data and provide reliability. The internet layer handles routing and uses IP. The network access layer deals with physical network components like cables and network interface cards.
Network Layer addresses data at the logical and physical levels. Logical addresses are generated by CPUs and allow virtual addressing, while physical addresses map to specific memory locations. The network layer provides routing across multiple physical links from one device to another. IP addresses uniquely identify devices on the Internet, though they can change over time as connections change. IPv6 was developed to address the impending exhaustion of IPv4 addresses by expanding the address space to 128 bits.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
The document discusses computer networks and network protocols. It begins with an introduction to network protocols and the Internet protocols. It then provides definitions and explanations of communication protocols, including addressing, transmission modes, and error detection/recovery techniques. It lists and describes common network protocols like TCP/IP, routing protocols, FTP, SMTP, and more. It also discusses the OSI model layers, TCP/IP protocol suite, data encapsulation, protocol data units, protocol assignments to layers, and addresses at each layer.
The document discusses several network protocols used at different layers of the OSI model. It introduces NetBIOS/NetBEUI which provides name registration and connection-oriented/connectionless communication over LANs. TCP/IP is described as a layered protocol suite used widely on the internet, with IP, TCP, UDP operating at the network and transport layers. ARP and RARP are discussed as protocols that resolve logical to physical addresses. ICMP and IGMP are control protocols that provide error reporting and multicast group management. IPX/SPX is presented as an alternative to TCP/IP used in Novell networks. HDLC and SDLC are synchronous data link protocols used for communication over WAN links.
protocol and the TCP/IP suite Chapter 02daniel ayalew
The document discusses protocols and the TCP/IP protocol suite. It introduces the layered protocol architecture and describes the need for coordination between communicating systems. It explains key aspects of protocols including syntax, semantics, and timing. The TCP/IP protocol suite is presented including the layers of physical, network access, internet, and transport. TCP and UDP are described as transport layer protocols, with TCP providing reliable connection-oriented delivery and UDP being unreliable and connectionless. The OSI reference model layers and concepts of internetworking such as routers are also summarized.
This document provides a summary of key concepts related to routing and routing protocols. It discusses routing and how routers forward packets from source to destination using routing tables. Common routing algorithms and protocols like RIP, OSPF, BGP, DVMRP and PIM are explained at a high level. Network concepts like metrics, areas, autonomous systems, and multicast addressing are also covered briefly. The document is intended to provide an overview of routing fundamentals and protocols for a computer networks course.
TCP provides reliable, ordered delivery of data through the use of sequence numbers and acknowledgments. It accumulates data into segments and ensures delivery through retransmissions. UDP is a simpler protocol that does not ensure delivery or order, making it faster but unreliable. IP handles addressing and fragmentation of packets to accommodate networks with different maximum sizes. IPv6 was developed to support more devices, longer addresses, extension headers and simplified header processing.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
Routing protocols exchange information to determine the best paths between sources and destinations in a network. The document discusses several routing protocols:
Distance vector protocols like RIP propagate routing tables between routers periodically. They are simple to configure but slow to converge. Link state protocols like OSPF use link state advertisements to build a map of the network and calculate the lowest cost paths more quickly. OSPF divides large networks into areas to reduce routing table sizes and convergence times. It elects routers on area borders to aggregate routing information between areas.
The document discusses Internet protocols and their history. It describes how Internet protocols were first developed in the 1970s by DARPA to facilitate communication between research institutions. This led to the development of TCP/IP, which later became the foundation for the Internet and World Wide Web. The document then provides details on various Internet protocols like IP, TCP, UDP, and application-layer protocols. It describes features of each protocol and how they enable communication over the Internet.
Routing protocols allow routers to exchange information and dynamically calculate the optimal data pathways between any two points on a network. Interior routing protocols operate within an autonomous system, while exterior protocols route between autonomous systems. Common interior protocols include RIP, OSPF, IGRP, and EIGRP, while exterior protocols include EGP and BGP. Routing metrics like hop count, bandwidth, load, and reliability help routers determine the best routes. Dynamic routing enables automatic path selection and updating in response to topology changes. [/SUMMARY]
This document provides an overview of common TCP/IP tools including the command prompt, ipconfig, ping, and tracert. It also covers advanced TCP/IP tools such as netstat, nbtstat, pathping, nslookup, netsh, route, net, and telnet. The objectives are to understand basic and advanced TCP/IP commands and their functionality in displaying network configuration, testing connectivity, tracing network paths, and troubleshooting. Additional resources like books, courses, and exams are listed to further learning.
TCP/IP is a set of communication protocols used to connect devices on the internet and other networks. It has two main protocols - TCP for reliable transmission of data between devices, and IP for addressing devices and routing packets across networks. TCP/IP uses ports to allow multiple applications to run simultaneously on a single device. Routers use IP addressing and routing tables to determine the best path for sending packets between devices on different networks.
The document discusses IPv4 and its datagram format. It explains that IPv4 is a best-effort, connectionless protocol that provides no error control or flow control. The datagram format includes a header containing fields like version, header length, total length, protocol, source/destination addresses, and an optional data field. It describes fields related to fragmentation, checksum calculation, and optional header fields like timestamps and routing options.
TCP provides reliable data transfer over unreliable packet networks by using acknowledgments, retransmissions, and adaptive congestion control. It works with IP to transfer data through routers that may drop packets. While TCP ensures reliable delivery, it must control its transmission rate to avoid overwhelming network capacity and causing congestion collapse. This is achieved through additive-increase, multiplicative-decrease of the congestion window and techniques like active queue management.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
TCP/IP is a set of communication protocols that enable data transmission across networks and between devices. It involves two main protocols: TCP and IP. TCP establishes reliable connections and ensures reliable delivery of data packets. IP handles addressing, routing packets between networks, and fragmentation/reassembly of packets. Key features of TCP/IP include logical addressing, routability, name resolution, multiplexing, and interoperability. TCP/IP operates on four layers - network interface, internet, transport, and application - with each layer building on the services of the layer below.
The document outlines Chapter 4 of a networking textbook. Chapter 4 covers the network layer, including network layer services, how routers work, routing algorithms, and implementations in the Internet. The key topics covered are virtual circuit versus datagram networks, the functions of routers including forwarding and routing, and routing algorithms like link state and distance vector.
on sending side encapsulates segments into datagrams on rcving side, deliver...Ashish Gupta
The document provides an overview of the key concepts in the network layer, including that the network layer encapsulates segments into datagrams for transmission, routers examine header fields to forward datagrams to their destination, and common routing protocols and algorithms like RIP, OSPF, and BGP are used to route packets across the Internet.
The document outlines the key concepts in the network layer chapter, including:
- The functions of the network layer including forwarding, routing, and connection setup in some architectures.
- The differences between virtual circuit and datagram networks and how routers and forwarding work differently in each.
- An overview of the main components and functions of a router, including routing processors, switching fabrics, input/output ports, and forwarding tables.
- Details on IP as the main network layer protocol used in the Internet, including its datagram format, addressing, and fragmentation.
Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Inte...Ashish Gupta
This chapter discusses the network layer and its goals of understanding network layer services like routing versus forwarding, how routers work, and dealing with issues of scale. It covers topics such as virtual circuit and datagram networks, the components inside routers, IP and IPv6 addressing, routing algorithms like link state and distance vector used on the Internet, and routing protocols including RIP, OSPF, and BGP. The network layer encapsulates data from the transport layer into datagrams and routers examine header fields to forward packets.
services: network layer service models forwarding versus routing how a router...Ashish Gupta
This document provides an overview of the key concepts in the network layer. It discusses network layer service models, how routers work, routing algorithms, and implementations in the Internet such as IPv4, IPv6, routing protocols like RIP, OSPF, and BGP. The goals are to understand the principles of network layer services, forwarding versus routing, dealing with scale, and advanced topics related to mobility and future protocols.
on sending side encapsulates segments into datagramsAshish Gupta
This document provides an overview of the key topics that will be covered in Chapter 4 on the network layer. It will discuss network layer service models, how routers work, routing algorithms for path selection, dealing with scaling issues, and implementations in IPv6, mobility, and the Internet. Specific topics that will be covered include virtual circuit and datagram networks, the components inside a router, IP addressing and protocols like ICMP and IPv6, common routing algorithms like link state, distance vector, and hierarchical routing, and routing protocols used in the Internet such as RIP, OSPF, and BGP.
The document discusses the network layer in computer networks. It outlines the goals of network layer design which are to make the services provided independent of the subnet topology, shield the transport layer from details of the subnets, and use a uniform numbering plan across networks. It also includes figures illustrating network layer concepts such as the relationship between layers, routing between machines using routers/gateways, and hierarchical routing at the interdomain and intradomain levels between autonomous systems.
Layer should be shielded from the number, type and topology of the subnets pr...Ashish Gupta
The document discusses network layer design goals and routing. The network layer goals are for its services to be independent of the subnet topology, to shield the transport layer from subnet details, and to use a uniform numbering plan across networks. Figures are included showing routing in networks with end systems, routers, and autonomous systems.
Link state Distance Vector Hierarchical routing 4.6 Routing in the InternetAshish Gupta
The document discusses the network layer and routing. It introduces topics like virtual circuit and datagram networks, the components of routers like IP, IPv4 addressing, NAT, ICMP, IPv6. It also describes different routing algorithms like link state, distance vector, hierarchical routing. Specific routing protocols on the Internet like RIP, OSPF, BGP are covered. The document also discusses broadcast and multicast routing at the network layer.
Internet Protocol Datagram format IPv4 addressing NAT ICMP IPv6Ashish Gupta
This document discusses routing in computer networks. It covers the network layer, which shields the transport layer from knowledge of network subnets. The network layer provides a uniform addressing plan across different network types. Routers are used at the network layer to direct traffic between subnets and autonomous systems in order to achieve end-to-end communication across multiple network domains.
This document provides an overview of the key concepts in the network layer data plane, including:
- The goals and functions of the network layer data plane and control plane.
- The basic components and operations of a router, including input ports, switching fabrics, output ports, and buffer management.
- Forwarding and routing as the two key network layer functions.
- IP as the core network layer protocol used in the Internet, including its addressing and packet format.
- Generalized forwarding and software-defined networking approaches.
- Common queuing, scheduling, and buffer management techniques used within routers.
- The document is a chapter from a textbook on computer networking that discusses the network layer. It covers topics like virtual circuit networks, datagram networks, the operation of routers, IP, routing algorithms, and routing in the Internet.
- Routers examine header fields to forward packets to the appropriate output port based on the destination address and routing tables. Routing algorithms determine the path packets take between source and destination.
- Virtual circuit networks use call setup and connection state in routers to provide guaranteed services, while datagram networks like the Internet forward packets based only on destination addresses for simple operation.
This document provides an overview of the network layer, including:
1. It describes the network layer functions of forwarding, routing, encapsulation, and de-encapsulation.
2. It explains the basic components and functions inside a router, including input/output ports, switching, queuing, and packet scheduling.
3. It covers the Internet Protocol (IP) including IPv4 and IPv6 formats, addressing, fragmentation, and network address translation (NAT).
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicastinghamsa nandhini
Routing protocols like RIP and OSPF automate the distribution of routing information between routers. RIP is a distance-vector protocol that uses hop counts as its metric. It faces problems like slow convergence after failures. OSPF is a link-state protocol that uses shortest path first algorithm for routing. It provides faster convergence. IP multicast uses a special address range and delivery mechanisms to efficiently deliver data from one source to multiple receivers in a group.
The document discusses topics related to computer networks and networking. It covers wireless LANs, connecting devices like hubs and switches, virtual LANs, and various aspects of the network layer including packetizing, routing, forwarding, packet switching approaches, IPv4 addressing, and forwarding of IP packets. Specific topics within the network layer section include packetizing, routing and forwarding services, error control, congestion control, datagram and virtual circuit approaches to packet switching, and IPv4 addressing structures like address space, notation, hierarchy, and classful addressing.
The document discusses topics related to the network layer, including:
1. It describes virtual circuits and datagrams, which are two methods for transferring data across networks.
2. It covers IPv4 addressing concepts such as address space, notations, classful and classless addressing, subnetting, and network address translation.
3. It provides an overview of additional network layer topics like IPv6 addressing, routing algorithms, internet control protocols, and routing protocols.
TCP/IP is the standard communication protocol on the internet. It is comprised of several layers including application, transport, internet, and link layers. The transport layer includes TCP and UDP which provide connection-oriented and connectionless data transmission respectively. TCP ensures reliable data delivery through features like connections, acknowledgments, and flow control. IPv6 is the latest version of the Internet Protocol which addresses the shortcomings of IPv4 like limited address space. IPv6 features include a larger 128-bit address space, simplified header format, built-in security, and autoconfiguration capabilities.
This document provides an overview of routing fundamentals and subnets. It defines key concepts like routed protocols, routing protocols, IP addressing, and subnetting. Routed protocols like IP define packet formats and addressing to enable communication across networks, while routing protocols like RIP exchange information to maintain routing tables and select optimal paths. The document also explains how routers use routing tables to determine the best path for sending packets and contains examples of subnetting IP addresses to create multiple subnets within a class C network.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
This document provides an introduction to network layer concepts. It discusses:
1. The network layer is layer 3 of the OSI model and is responsible for logical addressing, internetworking, and routing packets from source to destination.
2. Network layer functions include forwarding, routing, logical addressing, connection setup, and fragmentation/defragmentation. Forwarding refers to transferring packets between interfaces on a router, while routing determines the optimal end-to-end path between sources and destinations.
3. Network layer services can be connection-oriented using virtual circuits, which guarantee delivery properties, or connectionless using datagrams, which provide only best effort delivery. Common virtual circuit networks are ATM and Frame Relay,
Kinetic studies on malachite green dye adsorption from aqueous solutions by A...Open Access Research Paper
Water polluted by dyestuffs compounds is a global threat to health and the environment; accordingly, we prepared a green novel sorbent chemical and Physical system from an algae, chitosan and chitosan nanoparticle and impregnated with algae with chitosan nanocomposite for the sorption of Malachite green dye from water. The algae with chitosan nanocomposite by a simple method and used as a recyclable and effective adsorbent for the removal of malachite green dye from aqueous solutions. Algae, chitosan, chitosan nanoparticle and algae with chitosan nanocomposite were characterized using different physicochemical methods. The functional groups and chemical compounds found in algae, chitosan, chitosan algae, chitosan nanoparticle, and chitosan nanoparticle with algae were identified using FTIR, SEM, and TGADTA/DTG techniques. The optimal adsorption conditions, different dosages, pH and Temperature the amount of algae with chitosan nanocomposite were determined. At optimized conditions and the batch equilibrium studies more than 99% of the dye was removed. The adsorption process data matched well kinetics showed that the reaction order for dye varied with pseudo-first order and pseudo-second order. Furthermore, the maximum adsorption capacity of the algae with chitosan nanocomposite toward malachite green dye reached as high as 15.5mg/g, respectively. Finally, multiple times reusing of algae with chitosan nanocomposite and removing dye from a real wastewater has made it a promising and attractive option for further practical applications.
Evolving Lifecycles with High Resolution Site Characterization (HRSC) and 3-D...Joshua Orris
The incorporation of a 3DCSM and completion of HRSC provided a tool for enhanced, data-driven, decisions to support a change in remediation closure strategies. Currently, an approved pilot study has been obtained to shut-down the remediation systems (ISCO, P&T) and conduct a hydraulic study under non-pumping conditions. A separate micro-biological bench scale treatability study was competed that yielded positive results for an emerging innovative technology. As a result, a field pilot study has commenced with results expected in nine-twelve months. With the results of the hydraulic study, field pilot studies and an updated risk assessment leading site monitoring optimization cost lifecycle savings upwards of $15MM towards an alternatively evolved best available technology remediation closure strategy.
Improving the viability of probiotics by encapsulation methods for developmen...Open Access Research Paper
The popularity of functional foods among scientists and common people has been increasing day by day. Awareness and modernization make the consumer think better regarding food and nutrition. Now a day’s individual knows very well about the relation between food consumption and disease prevalence. Humans have a diversity of microbes in the gut that together form the gut microflora. Probiotics are the health-promoting live microbial cells improve host health through gut and brain connection and fighting against harmful bacteria. Bifidobacterium and Lactobacillus are the two bacterial genera which are considered to be probiotic. These good bacteria are facing challenges of viability. There are so many factors such as sensitivity to heat, pH, acidity, osmotic effect, mechanical shear, chemical components, freezing and storage time as well which affects the viability of probiotics in the dairy food matrix as well as in the gut. Multiple efforts have been done in the past and ongoing in present for these beneficial microbial population stability until their destination in the gut. One of a useful technique known as microencapsulation makes the probiotic effective in the diversified conditions and maintain these microbe’s community to the optimum level for achieving targeted benefits. Dairy products are found to be an ideal vehicle for probiotic incorporation. It has been seen that the encapsulated microbial cells show higher viability than the free cells in different processing and storage conditions as well as against bile salts in the gut. They make the food functional when incorporated, without affecting the product sensory characteristics.
Epcon is One of the World's leading Manufacturing Companies.EpconLP
Epcon is One of the World's leading Manufacturing Companies. With over 4000 installations worldwide, EPCON has been pioneering new techniques since 1977 that have become industry standards now. Founded in 1977, Epcon has grown from a one-man operation to a global leader in developing and manufacturing innovative air pollution control technology and industrial heating equipment.
Climate Change All over the World .pptxsairaanwer024
Climate change refers to significant and lasting changes in the average weather patterns over periods ranging from decades to millions of years. It encompasses both global warming driven by human emissions of greenhouse gases and the resulting large-scale shifts in weather patterns. While climate change is a natural phenomenon, human activities, particularly since the Industrial Revolution, have accelerated its pace and intensity
Optimizing Post Remediation Groundwater Performance with Enhanced Microbiolog...Joshua Orris
Results of geophysics and pneumatic injection pilot tests during 2003 – 2007 yielded significant positive results for injection delivery design and contaminant mass treatment, resulting in permanent shut-down of an existing groundwater Pump & Treat system.
Accessible source areas were subsequently removed (2011) by soil excavation and treated with the placement of Emulsified Vegetable Oil EVO and zero-valent iron ZVI to accelerate treatment of impacted groundwater in overburden and weathered fractured bedrock. Post pilot test and post remediation groundwater monitoring has included analyses of CVOCs, organic fatty acids, dissolved gases and QuantArray® -Chlor to quantify key microorganisms (e.g., Dehalococcoides, Dehalobacter, etc.) and functional genes (e.g., vinyl chloride reductase, methane monooxygenase, etc.) to assess potential for reductive dechlorination and aerobic cometabolism of CVOCs.
In 2022, the first commercial application of MetaArray™ was performed at the site. MetaArray™ utilizes statistical analysis, such as principal component analysis and multivariate analysis to provide evidence that reductive dechlorination is active or even that it is slowing. This creates actionable data allowing users to save money by making important site management decisions earlier.
The results of the MetaArray™ analysis’ support vector machine (SVM) identified groundwater monitoring wells with a 80% confidence that were characterized as either Limited for Reductive Decholorination or had a High Reductive Reduction Dechlorination potential. The results of MetaArray™ will be used to further optimize the site’s post remediation monitoring program for monitored natural attenuation.
ENVIRONMENT~ Renewable Energy Sources and their future prospects.tiwarimanvi3129
This presentation is for us to know that how our Environment need Attention for protection of our natural resources which are depleted day by day that's why we need to take time and shift our attention to renewable energy sources instead of non-renewable sources which are better and Eco-friendly for our environment. these renewable energy sources are so helpful for our planet and for every living organism which depends on environment.
Presented by The Global Peatlands Assessment: Mapping, Policy, and Action at GLF Peatlands 2024 - The Global Peatlands Assessment: Mapping, Policy, and Action
Microbial characterisation and identification, and potability of River Kuywa ...Open Access Research Paper
Water contamination is one of the major causes of water borne diseases worldwide. In Kenya, approximately 43% of people lack access to potable water due to human contamination. River Kuywa water is currently experiencing contamination due to human activities. Its water is widely used for domestic, agricultural, industrial and recreational purposes. This study aimed at characterizing bacteria and fungi in river Kuywa water. Water samples were randomly collected from four sites of the river: site A (Matisi), site B (Ngwelo), site C (Nzoia water pump) and site D (Chalicha), during the dry season (January-March 2018) and wet season (April-July 2018) and were transported to Maseno University Microbiology and plant pathology laboratory for analysis. The characterization and identification of bacteria and fungi were carried out using standard microbiological techniques. Nine bacterial genera and three fungi were identified from Kuywa river water. Clostridium spp., Staphylococcus spp., Enterobacter spp., Streptococcus spp., E. coli, Klebsiella spp., Shigella spp., Proteus spp. and Salmonella spp. Fungi were Fusarium oxysporum, Aspergillus flavus complex and Penicillium species. Wet season recorded highest bacterial and fungal counts (6.61-7.66 and 3.83-6.75cfu/ml) respectively. The results indicated that the river Kuywa water is polluted and therefore unsafe for human consumption before treatment. It is therefore recommended that the communities to ensure that they boil water especially for drinking.
4. Network layer
• transport segment from
sending to receiving host
• on sending side
encapsulates segments into
datagrams
• on receiving side, delivers
segments to transport layer
• network layer protocols in
every host, router
• router examines header
fields in all IP datagrams
passing through it
application
transport
network
data link
physical
application
transport
network
data link
physical
network
data link
physical network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physicalnetwork
data link
physical
7. Connection setup
• 3rd important function in some network
architectures:
– ATM, frame relay, X.25
• before datagrams flow, two end hosts and
intervening routers establish virtual connection
– routers get involved
• network vs transport layer connection service:
– network: between two hosts (may also involve
intervening routers in case of VCs)
– transport: between two processes
15. Virtual circuits
• call setup, teardown for each call before data can flow
• each packet carries VC identifier (not destination host
address)
• every router on source‐dest path maintains “state” for
each passing connection
• link, router resources (bandwidth, buffers) may be
allocated to VC (dedicated resources = predictable
service)
“source‐to‐dest path behaves much like telephone
circuit”
– performance‐wise
– network actions along source‐to‐dest path
17. VC implementation
a VC consists of:
1. path from source to destination
2. VC numbers, one number for each link along path
3. entries in forwarding tables in routers along path
packet belonging to VC carries VC number
(rather than dest address)
VC number can be changed on each link.
new VC number comes from forwarding table
24. Destination Address Range
11001000 00010111 00010000 00000000
through
11001000 00010111 00010111 11111111
11001000 00010111 00011000 00000000
through
11001000 00010111 00011000 11111111
11001000 00010111 00011001 00000000
through
11001000 00010111 00011111 11111111
otherwise
Link Interface
0
1
2
3
Q: but what happens if ranges don’t divide up so nicely?
Datagram forwarding table
25. Longest prefix matching
Destination Address Range
11001000 00010111 00010*** *********
11001000 00010111 00011000 *********
11001000 00010111 00011*** *********
otherwise
DA: 11001000 00010111 00011000 10101010
examples:
DA: 11001000 00010111 00010110 10100001 which interface?
which interface?
when looking for forwarding table entry for given
destination address, use longest address prefix that
matches destination address.
longest prefix matching
Link interface
0
1
2
3
26. Datagram or VC network: why?
Internet (datagram)
• data exchange among
computers
– “elastic” service, no strict
timing req.
• many link types
– different characteristics
– uniform service difficult
• “smart” end systems
(computers)
– can adapt, perform control,
error recovery
– simple inside network,
complexity at “edge”
ATM (VC)
• evolved from telephony
• human conversation:
– strict timing, reliability
requirements
– need for guaranteed
service
• “dumb” end systems
– telephones
– complexity inside network
29. Four components of a router
• Input ports. The input port performs several functions.
– It performs the physical layer functionality (shown in light
blue in Figure last slide) of terminating an incoming physical
link to a router.
– It performs the data link layer functionality (shown in dark
blue) needed to interoperate with the data link layer
functionality on the other side of the incoming link.
– It also performs a lookup and forwarding function (shown in
red) so that a datagram forwarded into the switching fabric of
the router emerges at the appropriate output port.
– Control packets (e.g., packets carrying routing protocol
information such as RIP, OSPF or IGMP) are forwarded from
the input port to the routing processor. In practice, multiple
ports are often gathered together on a single line card within
a router.
30. Four components of a router
• Switching fabric. The switching fabric connects the router's
input ports to its output ports. This switching fabric is
completely contained with the router ‐ a network inside of a
network router!
• Output ports. An output port stores the datagrams that have
been forwarded to it through the switching fabric, and then
transmits the datagrams on the outgoing link. The output port
thus performs the reverse data link and physical layer
functionality as the input port.
• Routing processor. The routing processor executes the routing
protocols (e.g., the protocols we studied in section 4.4),
maintains the routing tables, and performs network
management functions (see chapter 8), within the router. Since
we cover these topics elsewhere in this book, we defer
discussion of these topics to elsewhere.
43. IP Header
• Data Unit Idnetifier (ID)
• Sending host puts an identification number in each
datagram
• Total length: Length of user data plus header in octets
• Data Offset ‐ Position of fragment in original datagram
• In multiples of 64 bits (8 octets)
• More flag
• Indicates that this is not the last fragment
• Datagrams can be fragmented/refragmented at any router
• Datagrams are reassembled only at the destination host
45. IP fragmentation, reassembly
• network links have MTU
(max.transfer size) ‐ largest
possible link‐level frame
– different link types,
different MTUs
• large IP datagram divided
(“fragmented”) within net
– one datagram becomes
several datagrams
– “reassembled” only at
final destination
– IP header bits used to
identify, order related
fragments
fragmentation:
in: one large datagram
out: 3 smaller datagrams
reassembly
…
…
47. IP fragmentation, reassembly…
• IP fragmentation plays an important role in gluing
together the many disparate link‐layer technologies.
• But fragmentation also has its costs.
– First, it complicates routers and end systems, which need to be
designed to accommodate datagram fragmentation and
reassembly.
– Second, fragmentation can be used to create lethal DoS
attacks, whereby the attacker sends a series of bizarre and
unexpected fragments.
• Jolt2 attack, where the attacker sends a stream of small fragments to
the target host, none of which has an offset of zero.
• Another class sends overlapping IP fragments, that is, fragments whose
offset values are set so that the fragments do not align properly
48. IP addressing: introduction
• IP address: 32‐bit
identifier for host, router
interface
• interface: connection
between host/router and
physical link
– router’s typically have
multiple interfaces
– host typically has one or
two interfaces (e.g., wired
Ethernet, wireless 802.11)
• IP addresses associated
with each interface
223.1.1.1
223.1.1.2
223.1.1.3
223.1.1.4 223.1.2.9
223.1.2.2
223.1.2.1
223.1.3.2223.1.3.1
223.1.3.27
223.1.1.1 = 11011111 00000001 00000001 00000001
223 1 11
50. Subnets
• IP address:
–subnet part ‐ high order
bits
–host part ‐ low order
bits
• what’s a subnet ?
–device interfaces with
same subnet part of IP
address
–can physically reach
each other without
intervening router
network consisting of 3 subnets
223.1.1.1
223.1.1.3
223.1.1.4 223.1.2.9
223.1.3.2223.1.3.1
subnet
223.1.1.2
223.1.3.27
223.1.2.2
223.1.2.1
62. ISPs-R-Us has a more specific route to Organization 1
“Send me anything
with addresses
beginning
200.23.16.0/20”
200.23.16.0/23
200.23.18.0/23
200.23.30.0/23
Fly‐By‐Night‐ISP
Organization 0
Organization 7
Internet
Organization 1
ISPs‐R‐Us
“Send me anything
with addresses
beginning 199.31.0.0/16
or 200.23.18.0/23”
200.23.20.0/23
Organization 2
.
.
.
.
.
.
Hierarchical addressing: more specific
routes
66. NAT: network address translation
implementation: NAT router must:
– outgoing datagrams: replace (source IP address, port #)
of every outgoing datagram to (NAT IP address, new port
#)
. . . remote clients/servers will respond using (NAT IP address,
new port #) as destination addr
– remember (in NAT translation table) every (source IP
address, port #) to (NAT IP address, new port #)
translation pair
– incoming datagrams: replace (NAT IP address, new port
#) in dest fields of every incoming datagram with
corresponding (source IP address, port #) stored in NAT
table
71. NAT traversal problem
• solution 3: relaying (used in Skype)
– NATed client establishes connection to relay
– external client connects to relay
– relay bridges packets between to connections
138.76.29.7
client
1. connection to
relay initiated
by NATed host
2. connection to
relay initiated
by client
3. relaying
established
NAT
router
10.0.0.1
73. Traceroute and ICMP
source sends series of UDP
segments to dest
first set has TTL =1
second set has TTL=2, etc.
unlikely port number
when nth set of datagrams
arrives to nth router:
router discards datagrams
and sends source ICMP
messages (type 11, code 0)
ICMP messages includes
name of router & IP address
when ICMP messages
arrives, source records
RTTs
stopping criteria:
UDP segment eventually
arrives at destination host
destination returns ICMP
“port unreachable”
message (type 3, code 3)
source stops
3 probes
3 probes
3 probes
74. IPv6: motivation
• initial motivation: 32‐bit address space soon to
be completely allocated.
• additional motivation:
– header format helps speed processing/forwarding
– header changes to facilitate QoS
IPv6 datagram format:
– fixed‐length 40 byte header
– no fragmentation allowed
• 2128 addresses?
= 340,282,366,920,938,463,463,374,607,431,770,000,000
= 340 billion billion billion billion addresses?
75. IPv6 datagram format
priority: identify priority among datagrams in flow
flow Label: identify datagrams in same “flow.”
(concept of“flow” not well defined
RFC 1752 and RFC 2460).
next header: identify upper layer protocol for data
data
destination address
(128 bits)
source address
(128 bits)
payload len next hdr hop limit
flow labelpriver
32 bits
87. Routing algorithm classification
Q: global or decentralized
information?
global:
• all routers have complete
topology, link cost info
• “link state” algorithms
decentralized:
• router knows physically‐
connected neighbors, link costs
to neighbors
• iterative process of
computation, exchange of info
with neighbors
• “distance vector” algorithms
Q: static or dynamic?
static:
routes change slowly over
time
dynamic:
routes change more
quickly
periodic update
in response to link cost
changes
Q: Load‐sensitive or Load‐insensitive?
Load‐sensitive: link costs vary dynamically based on the current level of
congestion of the link
load‐insensitive doesn’t reflect the current or past level of congestion of the link
88. A Link‐State Routing Algorithm
Dijkstra’s algorithm
• net topology, link costs
known to all nodes
– accomplished via “link
state broadcast”
– all nodes have same info
• computes least cost paths
from one node (‘source”)
to all other nodes
– gives forwarding table for
that node
• iterative: after k
iterations, know least cost
path to k dest.’s
notation:
• c(x,y): link cost from node
x to y; = ∞ if not direct
neighbors
• D(v): current value of cost
of path from source to dest.
v
• p(v): predecessor node
along path from source to v
• N': set of nodes whose
least cost path definitively
known
93. Dijkstra’s algorithm, discussion
algorithm complexity: n nodes
each iteration: need to check all nodes, A, not in N
n(n+1)/2 comparisons: O(n2)
more efficient implementations possible: O(nlogn)
oscillations possible:
e.g., support link cost equals amount of carried traffic:
A
D
C
B
1 1+e
e0
e
1 1
0 0
initially
A
D
C
B
given these costs,
find new routing….
resulting in new costs
2+e 0
00
1+e 1
A
D
C
B
given these costs,
find new routing….
resulting in new costs
0 2+e
1+e1
0 0
A
D
C
B
given these costs,
find new routing….
resulting in new costs
2+e 0
00
1+e 1
99. x y z
x
y
z
0 2 7
∞∞ ∞
∞∞ ∞
from
cost to
fromfrom
x y z
x
y
z
0
x y z
x
y
z
∞ ∞
∞∞ ∞
cost to
x y z
x
y
z
∞∞ ∞
7 1 0
cost to
∞
2 0 1
∞ ∞ ∞
2 0 1
7 1 0
time
x z
12
7
y
node x
table
Dx(y) = min{c(x,y) + Dy(y), c(x,z) + Dz(y)}
= min{2+0 , 7+1} = 2
Dx(z) = min{c(x,y) +
Dy(z), c(x,z) + Dz(z)}
= min{2+1 , 7+0} = 3
32
node y
table
node z
table
cost to
from
101. Distance vector: link cost changes
link cost changes:
node detects local link cost change
updates routing info, recalculates
distance vector
if DV changes, notify neighbors
“good
news
travels
fast”
x z
14
50
y
1
t0 : y detects link‐cost change, updates its DV, informs its neighbors.
t1 : z receives update from y, updates its table, computes new least
cost to x , sends its neighbors its DV.
t2 : y receives z’s update, updates its distance table. y’s least costs do not
change, so y does not send a message to z.
102. Distance vector: link cost changes
link cost changes:
node detects local link cost change
bad news travels slow - “count to
infinity” problem!
44 iterations before algorithm
stabilizes: see text
x z
14
50
y
60
poisoned reverse:
If Z routes throughY to get to X :
Z tellsY its (Z’s) distance to X is infinite (soY won’t route
to X via Z)
will this completely solve count to infinity problem?
103. Comparison of LS and DV algorithms
message complexity
• LS: with n nodes, E links, O(nE)
msgs sent
• DV: exchange between neighbors
only
– convergence time varies
speed of convergence
• LS: O(n2) algorithm requires O(nE)
msgs
– may have oscillations
• DV: convergence time varies
– may be routing loops
– count‐to‐infinity problem
robustness: what happens if
router malfunctions?
LS:
– node can advertise incorrect
link cost
– each node computes only its
own table
DV:
– DV node can advertise
incorrect path cost
– each node’s table used by
others
• error propagate thru
network
105. Hierarchical routing
• aggregate routers into
regions, “autonomous
systems” (AS)
• routers in same AS run
same routing protocol
– “intra‐AS” routing protocol
– routers in different AS can
run different intra‐AS routing
protocol
gateway router:
• at “edge” of its own
AS
• has link to router in
another AS
115. w x y
z
A
C
D B
destination subnet next router # hops to dest
w A 2
y B 2
z B 7
x ‐‐ 1
…. …. ....
routing table in router D
A 5
dest next hops
w ‐ 1
x ‐ 1
z C 4
…. … ...
A‐to‐D advertisement
RIP: example
119. OSPF (Open Shortest Path First)
• “open”: publicly available
• uses link state algorithm
– LS packet dissemination
– topology map at each node
– route computation using Dijkstra’s algorithm
• OSPF advertisement carries one entry per
neighbor
• advertisements flooded to entire AS
– carried in OSPF messages directly over IP (rather than
TCP or UDP
• IS‐IS routing protocol: nearly identical to OSPF
120. OSPF “advanced” features (not in RIP)
• security: all OSPF messages authenticated (to
prevent malicious intrusion)
• multiple same‐cost paths allowed (only one path
in RIP)
• for each link, multiple cost metrics for different
TOS (e.g., satellite link cost set “low” for best
effort ToS; high for real time ToS)
• integrated uni‐ and multicast support:
– Multicast OSPF (MOSPF) uses same topology data
base as OSPF
• hierarchical OSPF in large domains.
122. Hierarchical OSPF
• two‐level hierarchy: local area, backbone.
– link‐state advertisements only in area
– each nodes has detailed area topology; only know
direction (shortest path) to nets in other areas.
• area border routers: “summarize” distances to nets in
own area, advertise to other Area Border routers.
• backbone routers: run OSPF routing limited to
backbone.
• boundary routers: connect to other AS’s.
123. Internet inter‐AS routing: BGP
• BGP (Border Gateway Protocol): the de facto
inter‐domain routing protocol
– “glue that holds the Internet together”
• BGP provides each AS a means to:
– eBGP: obtain subnet reachability information from
neighboring ASs.
– iBGP: propagate reachability information to all AS‐
internal routers.
– determine “good” routes to other networks based
on reachability information and policy.
• allows subnet to advertise its existence to rest
of Internet: “I exist and I am here”
124. BGP basics
• when AS3 advertises a prefix to AS1:
– AS3 promises it will forward datagrams towards that prefix
– AS3 can aggregate prefixes in its advertisement
AS3
AS2
3b
3c
3a
AS1
1c
1a
1d
1b
2a
2c
2b
other
networks
other
networks
BGP session: two BGP routers (“peers”) exchange BGP
messages:
advertising paths to different destination network prefixes (“path vector”
protocol)
exchanged over semi-permanentTCP connections
BGP
message
126. Path attributes and BGP routes
• advertised prefix includes BGP attributes
– prefix + attributes = “route”
• two important attributes:
– AS‐PATH: contains ASs through which prefix advertisement
has passed: e.g., AS 67, AS 17
– NEXT‐HOP: indicates specific internal‐AS router to next‐
hop AS. (may be multiple links from current AS to next‐
hop‐AS)
• gateway router receiving route advertisement uses
import policy to accept/decline
– e.g., never route through AS x
– policy‐based routing
128. BGP messages
• BGP messages exchanged between peers over TCP connection
• BGP messages:
– OPEN: opens TCP connection to peer and
authenticates sender
– UPDATE: advertises new path (or withdraws old)
– KEEPALIVE: keeps connection alive in absence of
UPDATES; also ACKs OPEN request
– NOTIFICATION: reports errors in previous msg;
also used to close connection
139. BGP routing policy
A,B,C are provider networks
X,W,Y are customer (of provider networks)
X is dual-homed: attached to two networks
X does not want to route from B via X to C
.. so X will not advertise to B a route to C
A
B
C
W
X
Y
legend:
customer
network:
provider
network
140. BGP routing policy (2)
A advertises path AW to B
B advertises path BAW to X
Should B advertise path BAW to C?
No way! B gets no “revenue” for routing CBAW since neitherW nor
C are B’s customers
B wants to force C to route to w via A
B wants to route only to/from its customers!
A
B
C
W
X
Y
legend:
customer
network:
provider
network
144. In‐network duplication
• flooding: when node receives broadcast packet,
sends copy to all neighbors
– problems: cycles & broadcast storm
• controlled flooding: node only broadcasts pkt if it
hasn’t broadcast same packet before
– node keeps track of packet ids already broadacsted
– or reverse path forwarding (RPF): only forward packet if
it arrived on shortest path between node and source
• spanning tree:
– no redundant packets received by any node
151. Reverse path forwarding: example
result is a source-specific reverse SPT
may be a bad choice with asymmetric links
router with attached
group member
router with no attached
group member
datagram will be forwarded
LEGEND
R1
R2
R3
R4
R5
R6 R7
s: source
datagram will not be
forwarded
154. Center‐based trees
• single delivery tree shared by all
• one router identified as “center” of tree
• to join:
– edge router sends unicast join‐msg addressed to
center router
– join‐msg “processed” by intermediate routers and
forwarded towards center
– join‐msg either hits existing tree branch for this
center, or arrives at center
– path taken by join‐msg becomes new branch of tree
for this router
156. Internet Multicasting Routing: DVMRP
• DVMRP: distance vector multicast routing
protocol, RFC1075
• flood and prune: reverse path forwarding,
source‐based tree
– RPF tree based on DVMRP’s own routing tables
constructed by communicating DVMRP routers
– no assumptions about underlying unicast
– initial datagram to mcast group flooded everywhere
via RPF
– routers not wanting group: send upstream prune
msgs
157. DVMRP: continued…
• soft state: DVMRP router periodically (1 min.)
“forgets” branches are pruned:
– mcast data again flows down unpruned branch
– downstream router: reprune or else continue to
receive data
• routers can quickly regraft to tree
– following IGMP join at leaf
• odds and ends
– commonly implemented in commercial router
158. Tunneling
Q: how to connect “islands” of multicast
routers in a “sea” of unicast routers?
mcast datagram encapsulated inside “normal” (non-
multicast-addressed) datagram
normal IP datagram sent thru “tunnel” via regular IP unicast
to receiving mcast router (recall IPv6 inside IPv4 tunneling)
receiving mcast router unencapsulates to get mcast
datagram
physical topology logical topology
161. PIM‐ dense mode
flood-and-prune RPF: similar to DVMRP but…
underlying unicast protocol provides RPF info
for incoming datagram
less complicated (less efficient) downstream
flood than DVMRP reduces reliance on
underlying routing algorithm
has protocol mechanism for router to detect it
is a leaf-node router
162. PIM ‐ sparse mode
• center‐based approach
• router sends join msg to
rendezvous point (RP)
– intermediate routers
update state and forward
join
• after joining via RP, router
can switch to source‐specific
tree
– increased performance:
less concentration,
shorter paths
all data multicast
from rendezvous
point
rendezvous
point
join
join
join
R1
R2
R3
R4
R5
R6
R7