SlideShare a Scribd company logo
COMPUTER NETWORKS
S c h o o l o f C o m p u t e r S c i e n c e &
A p p l i c a t i o n s
Introduction to
Network Layer
LECTURE -1
Introduction to Network Layer
• Network layer
• Network Layer Function
• Routing
• Forwarding
3
WHAT IS NETWORK LAYER?
Definition
1. Layer 3 of OSI Referenece model.
2. Resposible for the source-to-destination delivery of
a packet. ( based on Network architecture)
3. End-to- End message delivery.
4
NETWORK LAYER
• Example
5
NETWORK LAYER
Features
1. It routes the signal through different channels from
one node to other.
2. It acts as a network controller. It manages the
Subnet traffic.
3. It decides by which route data should take.
4. It divides the outgoing messages into packets and
assembles the incoming packets into messages for
higher levels.
6
NETWORK LAYER
Function
1. Forwarding and Routing.
2. Logical addressing or IP addressing.
3. Internetworking: Communication between
different types of network.
4. Connection setup
5. Fragmentation or Defragmentation
7
FORWARDING
• Definition
Refers to routers-local action of
transfering a packet from an
input interface to the appropriate
output link interface.
8
ROUTING
• Definition
Refers to the network-wide
process that determines the end-
to-end paths that packets take
from source to destination.
9
ROUTING & FORWARDING
• Example
10
SUMMARY
Lecture-1 : Introduction to Network
Layer
Q.1 What is Network layer?
Q.2 What are the features of network layer?
Q.3 What are the function of network layer?
Q.4 What is forwarding?
Q.5 What is routing?
Q.6 What is/are the differences between forwarding
and routing?
11
ACTIVITY
Lecture-1 : Introduction to Network
Layer
Reading :
Forwarding Techniques:
http://www.brainkart.com/article/Forwarding-
Techniques_13480/
12
NETWORK
LAYER
SERVICES
• Layer-3
13
LECTURE – 2
Objectives
Network layer services
Network layer architecture
Connection Network layer services
Connectionless Network layer services
Recap
• Network layer
• Network Layer Function
• Network layer Services
Basic of computer network & Its Uses
14
SERVICES OF NETWORK LAYER
1. Provides host-to-host services to the transport
layer.
2. Provides either connection host-to-host service or
connection-less host-to-host service but not both
at a time.
3. Connection service in network layer is offered
through – virtual circuit network.
4. Connectionless service in network layer is offered
through- datagram network.
15
TYPES OF PACKET SWITCHING
NETWORK
• Example
16
NETWORK LAYER ARCHITECTURE
1. ATM : Vitual Circuit Network
2. Framerelay: Virtual Circuit Network
3. Internet : Datagram Network
17
NETWORK LAYER
Virtual Circuit - Services
1. Guaranteed delivery
2. Guaranteed delivery with bounded delay
3. In-order packet delivery
4. Guaranteed minimal bandwidth
5. Guaranteed maximum jitter
6. Security service
18
NETWORK LAYER
Datagram- Services
Provides Best effort services ( Service model)
1. No Guaranteed delivery
2. No Guaranteed delivery with bounded delay
3. No In-order packet delivery
4. No Guaranteed minimal bandwidth
5. No Guaranteed maximum jitter
19
SUMMARY
Lecture-2 : Network Layer Services
Q.1 What are the services offered by network layer in
general?
Q.2 What are the services offered by virtual circuit
network ?
Q.3 What are the services offered by datagram
network ?
Q.4 Give an example for virtual circuit network and
datagram network?
20
ACTIVITY
Lecture-2 : Network Layer Services
Reading:
1. What is the difference between function and
service?
2. What are the additional functionalities of Network
Layer?
=> Find the material/ collect points
21
NETWORK
LAYER DESIGN
ISSUES
• Layer-3
22
LECTURE - 3
Objectives
Network layer design issues
Virtual Circuit Vs Datagram
Network
Recap
• Network layer services
• Network layer architecture
• Connection Network layer services
• Connectionless Network layer services
Network Layer Design Issues
23
NETWORK LAYER DESIGN ISSUES
Challenges
1. Store and Forward packet switching
2. Services provided to Transport layer
3. Implementation of Connectionless Service
4. Implementation of Connection Service
24
STORE & FORWARD PACKET
SWITCHING
Challenge - 1
1. The host sends the packet to the nearest router.
2. This packet is stored there until it has fully arrived.
3. Once the link is fully processed by verifying the
checksum then it is forwarded to the next router till
it reaches the destination.
4. This mechanism is called “Store and Forward
packet switching”.
25
STORE & FORWARD PACKET
SWITCHING
• Problem
26
SERVICES PROVIDED TO
TRANSPORT LAYER
Challenge-2
A discussion point is whether the service should be
connection-oriented or connectionless.
Major Argument :
1. Internet community: connectionless but hosts
should do error control and flow control.
2. Telephone community: subnet should provide a
reliable ( connection services).
27
GOAL OF NETWORK LAYER SERVICE
TO TRANSPORT LAYER
Irrespective of connection or connectionless service:
1. Independent of the router technology.
2. The transport layer should be shielded from the
number, type and topology of the subnets present.
3. The network addresses made available to the
transport layer should use a uniform numbering
plan, even across LAN's and WANs.
28
IMPLEMENTATION OF
CONNECTIONLESS SERVICE
Challenges-3
1. Inconnectionless organisation
• Packets : datagrams
• Subnet : datagram subnet
2. Large packets : divided into manageable sized
packets.
3. Each packet is associated with destination address.
4. Routed independently.
5. Routing algorithms in routers manages route table 29
CONNECTIONLESS SERVICE
• Problem
30
IMPLEMENTATION OF
CONNECTION SERVICE
Challenges-4
1. Connection setup between sourc e to destination
2. Route in chosen path between source and
destination.
3. Achieved by :
a) Circuit switch connection
b) Virtual circuit switched connection
31
CONNECTION ORIENTED SERVICE
• Problem
32
DATAGRAM VS VIRTUAL CIRCUIT
• Comparison
Issue Datagram Subnet VC Subnet
Circuit setup Not needed Required
Addressing Each packet contains the full
source and destination
address
Each packet contains a short
VC number
State information Subnet does not hold state
information
Each VC requires subnet
table space
Routing Each packet is routed
independently
Route chosen during setup;
all packets of a VC follow this
route
Effects of router failures None except for packets lost
during the crash
All VC's that passed through
the failed router are
terminated
Quality of service Difficult to guarantee Easy if enough resources
can be allocated during the
setup procedure
Congestion control Difficult Easy if enough buffers can
33
SUMMARY
Lecture-3 : Network Layer Design Issues
Q.1 What is store and forward in computer network?
Q.2 What is the conflict between internet and
telephone community?
Q.3 What are the design issues of network layer?
Q.4 How network layer connection service is
implemented?
Q.5 How network layer connectionless service is
implemented?
Q.6 What are the differences between datagram
34
ACTIVITY
Lecture-3 : Network Layer Design Issues
Reading :
What’s inside router?
http://www2.ic.uff.br/~michael/kr1999/4-
network/4_06-inside.htm
Trade offs:
• router memory space versus bandwidth
• setup time versus address parsing time
=> Find the material / collect points
35
ROUTING
• Network layer Functionality
36
LECTURE - 4
Objectives
Routing
Routing Activities
Routing on Connection types
Role of IP addressing in routing
Recap
• Network layer design issues
• Virtual Circuit Vs Datagram Network
Routing
37
ROUTING
Concept
1. Routing = building maps and giving direction.
2. Vs Routing is the act of moving information across
an internetwork from a source to a destination.
3. Routers are networking devices which performs
routing.
38
ROUTING ACTIVITIES
• 2 activities
Determining optimal
routing paths and
transporting information
groups (typically called
packets) through an
internetwork.
Although packet switching is
relatively straightforward, path
determination can be very
complex.
39
ROUTING IS APPLIED TO WHAT
TYPE OF CONNECTION?
ROUTING=> WHEN APPLIED TO
VC=> DECISION OF ROUTING ARE
MADE WHEN CIRCUIT IS BEING SET
UP
ROUTING=> WHEN APPLIED TO
DATAGRAM=> THEN ROUTING
DECISION NEED TO MAKE FOR
EACH ARRIVING PACKET.
40
ROLE OF IP ADDRESSES IN
ROUTING
Location is
represented by an IP
address.
Path choice is based
on location.
Unique addressing
allows communication
between end stations.
41
PATH DETERMINATION
Importance-1
• Routing protocols use metrics to evaluate what path
will be the best for a packet to travel.
• A metric is a standard of measurement, that is used
by routing Protocols/algorithms to determine the
optimal path to a destination.
42
PATH DETERMINATION
Importance- 2
• To aid the process of path determination, routing
protocols/algorithms initialize and maintain routing
tables, which contain route information.
• Route information varies depending on the routing
algorithm used.
• Routers compare metrics to determine optimal
routes, and these metrics differ depending on the
design of the routing algorithm used.
43
ROUTING METRICS
Types
1. Hop count or path length : counts the number of
routers a packet must traverse
2. Bandwidth: preferring the path with highest
bandwidth
3. Load: traffic utilization on a link
4. Delay: time for a packet to traverse a path
5. Reliability: probability of a link failure
6. Cost: determined by IOS or administrator to
indicate preference for a route
44
SUMMARY
Lecture - 4 : Routing
Q.1 What is Routing?
Q.2 What is Router ?
Q.3 What are the activities of routing?
Q.4 Routing is applied for what types of connection?
Q.5 What is the role of IP addressing in routing?
Q.6 How optimal path is determined by routing?
Q.7 What are the parameters used for routing?
45
ACTIVITY
Lecture-4 : Routing
Reading:
Router Characteristics and Router Protocols
https://ecomputernotes.com/computernetworkingnote
s/communication-networks/routers
46
TYPES OF
ROUTING
• Network layer Functionality
47
LECTURE - 5
Objectives
Routing Properties
Types of Routing
Static Routing
Dynamic Routing
Adaptive Vs Non-Adaptive Routing
Recap
• Routing
• Routing Activities
• Routing on Connection types
• Role of IP addressing in routing
Types of Routing
48
ROUTING PROPERTIES
Design Goals
Routing algorithms often have one or more of the following
design goals:
1. Correctness- routing done properly and reach their
proper destination.
2. Simplicity - low overhead
3. Robustness – recover from h/w and s/w failures.
4. Stability – stable in all circumstances.
5. Optimality – throughput and minimizing packet delay.
6. Fairness – fair chance for every node to transmit packets.
7. Rapid convergence – Decrease delay-time.
49
ROUTING ALGORITHM
• Concept
It’s a part of the network layer software
responsible for deciding which output line
an incominh packet should be transmiited
on.
50
TYPES OF ROUTING
Categories
1. Adaptive versus Non-Adaptive
2. Static versus dynamic
3. Flat versus hierarchical
4. Intra-domain versus inter-domain
5. Cast Routing : unicast, broadcast, multicast, any cast
51
STATIC ROUTING PROTOCOL
Type -1
1. Configured manually
2. Specifies network address and subnet mask of
remote network, and IP address of next hop router
or exit interface
3. Use static routes when: – Network only consists of
few routers – Network is connected to Internet only
through one ISP
52
MERITS OF STATIC ROUTING
1. Minimal CPU processing
2. Easy to configure
3. Easier for administrator to understand
53
DEMERITS OF STATIC ROUTING
1. Configuration and maintenance is time consuming
2. Does not scale well with growing networks
3. Requires complete knowledge of the whole
network for proper implementation
54
DYNAMIC ROUTING PROTOCOL
Type-2
Added to routing table by using a dynamic routing
protocol
1. Used by routers to share information about the
reach ability and status of remote networks
2. Perform several activities:
– Network discovery
– Updating and maintaining routing tables
55
MERITS OF DYNAMIC ROUTING
1. Less administrative overhead when adding or
deleting a network
2. Protocols automatically react to the topology
changes
3. More scalable
56
DEMERITS OF DYNAMIC ROUTING
1. Router resources are used (CPU cycles, memory and
link bandwidth)
2. More administrator knowledge is required for
configuration, verification and troubleshooting
57
ADAPTIVE & NONADAPTIVE
ROUTING
• Comparison
Feature Adaptive Non-Adaptive
Define Constructs the routing
table based on the
network conditions.
Constructs the static table
Usage Dynamic routing Static routing
Routing decision Based on network
topology & traffic
Based on static table
Examples Distance-vector, Link-
state, Centralized ,
Distributed etc
Flooding
Shortest path
Complexity Complex Simple
58
SUMMARY
Lecture-5 : Types of Routing
Q.1 What are the types of routing?
Q.2 What is adaptive and non-adaptive routing
algorithm?
Q.3 What is static and dynamic routing algorithm?
Q.4 Comparison between adaptive routing and non-
adaptive routing.
59
ACTIVITY
Lecture-5 :Types of Routing
Reading:
1. Centralized /Global versus Decentralized/
Distributed.
2. Single-path versus Multipath
3. Host-intelligent versus Router-intelligent
4. Ad-hoc Routing
60
ROUTING
TAXONOMY
• Classification
61
LECTURE - 6
Objectives
Routing Taxonomy
Flooding
Shortest path Algorithm
Dijkstra Algorithm
Recap
• Routing Properties
• Types of Routing
• Static Routing
• Dynamic Routing
• Adaptive Vs Non-Adaptive Routing
Routing Taxonomy
62
ROUTING TAXONOMY
• Classification
Wired Routing Algorithm
Static Routing
Interior Routing Exterior Routing
Dynamic Routing
DV Routing L-S Routing
BGP
RIP,
IGRP
Shortest Path,
Flooding
OSPF
IS-IS
Hybrid Routing
EIGRP
63
FLOODING
Non-adaptive Routing - Concept
1. Requires no network information like topology,
load condition ,cost of different path.
2. Every incoming packet to a node is sent out on
every outgoing like except the one it arrived on.
64
FLOODING
Characteristics
1. All possible routes between Source and Destination
is tried. A packet will always get through if path
exists
2. As all routes are tried, there will be atleast one
route which is the shortest
3. All nodes directly or indirectly connected are visited
65
FLOODING
Advantages
1. Highly Robust, emergency or immediate messages
can be sent (eg military applications)
2. Set up route in virtual circuit
3. Flooding always chooses the shortest path
4. Broadcast messages to all the nodes
66
FLOODING
Limitations
1. Flooding generates vast number of duplicate
pakects
2. Suitable damping mechanism must be used
67
SHORTEST PATH ALGORITHM
Concept
1. Classic Problem
2. Single shortest path : Dijkstra Algorithm
3. All-pair shortest path : Floyd’s Warshall’s Algorithm
4. Approach : Greedy approach
5. Implemented : weighted graph
68
DIJKSTRA ALGORITHM:
Slide-1
function Dijkstra(Graph, source):
create vertex set Q
for each vertex v in Graph:
dist[v] ← INFINITY
prev[v] ← UNDEFINED
add v to Q
dist[source] ← 0
69
DIJKSTRA ALGORITHM:
Slide-2
while Q is not empty:
u ← vertex in Q with min dist[u]
remove u from Q
for each neighbor v of u: // only v that are
still in Q
alt ← dist[u] + length(u, v)
if alt < dist[v]:
dist[v] ← alt
prev[v] ← u
return dist[], prev[]
70
SHORTEST PATH ALGORITHM
• The first 5 steps used in computing the shortest path from A to D. The
arrows indicate the working node.
71
SUMMARY
Lecture-6 : Routing Taxonomy
Q.1 What is static routing protocol?
Q.2 What is Flooding?
Q.3 What is shortest path algorithm?
Q.4 Explain Dijkstra Algorithm.
72
ACTIVITY
Lecture-6 : Routing Taxonomy
Video:
Shortest path routing algorithm
• https://www.youtube.com/watch?v=nieg8XQQ7i0
• https://www.youtube.com/watch?v=OGsPQy-lM1w
73
DISTANCE
VECTOR
ROUTING
• Classification
74
LECTURE - 7
Objectives
Distance-Vector Routing
DV Routing Features
Bellman-Ford Algorithm
Recap
• Routing Taxonomy
• Flooding
• Shortest path Algorithm
• Dijkstra Algorithm
Distance Vector Routing
75
DISTANCE-VECTOR ROUTING
PROTOCOL
Concept
1. Dynamic routing protocol.
2. Determines the best and most efficient routes for
data packets
3. Parametres: distance & direction (Vector)
4. Distance: the number of steps or hosts
5. Direction: the point data leaving from port to data
reaching to the port.
6. Algorithm: Bellman-Ford Algorithm or Ford-
Fulkerson Algorithm.
76
DISTANCE-VECTOR ROUTING
PROTOCOL
Features
1. Creates automatically routing tables.
2. Algorithm in router exchange its routing table with
each of its neighbours.
3. Merges : existing routing table + received routing
table
4. Performed dynamically after a fixed time interval by
default.
5. Limitation => significant link overhead.
77
BELLMAN-FORD ALGORITHM
Single source shortest path
• Bellman-Ford(G,w,s)
1. Intilialize single source (G,s)
2. for i=1 to |G.v|-1
3. for each edge (u,v) belongs to G.E
4. relax (u,v,w) =>function
5. for each edge(u,v) belongs to G.E
6. If v.d>u.d+w(u,w)
7. return false( no negative cycle)
8. return true.
78
BELLMAN-FORD ALGORITHM
Single source shortest path
relax(u,v,w) => function
1. If v.d>u.d+w(u,v)
2. v.d=u.d+w(u,v)
3. v.p=u
Here shortest path to reach V when use edge u->v
Here
1. v.d= distance from source to v.
2. w(u,v) = weight of edge u->v
3. v.p= predecessor of v.
79
80
81
82
83
84
DISTANCE-VECTOR ROUTING
PROTOCOL
Information
Stored at Node
Distance to Reach Node
A B C D E F G
A 0 1 1 ∞ 1 1 ∞
B 1 0 1 ∞ ∞ ∞ ∞
C 1 1 0 1 ∞ ∞ ∞
D ∞ ∞ 1 0 ∞ ∞ 1
E 1 ∞ ∞ ∞ 0 ∞ ∞
F 1 ∞ ∞ ∞ ∞ 0 1
G ∞ ∞ ∞ 1 ∞ 1 0
Information
Stored at Node
Distance to Reach Node
A B C D E F G
A 0 1 1 2 1 1 2
B 1 0 1 2 2 2 3
C 1 1 0 1 2 2 2
D 2 2 1 0 3 2 1
E 1 2 2 3 0 2 3
F 1 2 2 2 2 0 1
G 2 3 2 1 3 1 0 85
SUMMARY
Lecture-7 : Distance Vector Routing
Q.1 What is dynamic routing protocol?
Q.2 What is distance-vector routing protocol?
Q.3 What are the features of distance-vector routing
protocol?
Q.4 What is Bellman-Ford algorithm?
Q.5 Explain Bellman-ford algorithm.
86
ACTIVITY
Lecture-7 : Distance Vector Routing
Video:
Bellman-ford : Negative weights allowed but not
negative cycle
https://www.youtube.com/watch?v=YbbGemzQ5ok
87
LINK-STATE
ROUTING
• Classification
88
LECTURE – 8
Objectives
Limitation of DV Routing
Link-State Routing
LS Routing Features & limitations
Shortest path first Algorithm
Recap
• Distance-Vector Routing
• DV Routing Features
• Bellman-Ford Algorithm
Link-State Routing
89
LIMITATION OF DISTANCE VECTOR
PROTOCOL
Demerit
1. Slow covergence
2. Counting to infinity problrm
3. Lack of variety of metrics
4. No possibility of hierarchical routing
5. Bad performance in large network
90
LINK-STATE ROUTING PROTOCOL
Concept or Idea
1. Each node monitors neighbours/local links and
advertise them to the network.
2. Each node maintains : full graph
3. Each node responsible for learning/monitoring its
neighbours and their names.
4. Each router stores: most recently generated LSP
from other nodes.
5. Each router uses complete information on the
complete topology.
91
LINK-STATE ROUTING PROTOCOL
Characteristics
1. Maintains centralised database of whole network.
2. Calculation and routing are still distributed.
3. Exchange info only when there is change.
4. Each router maintains identical database.
5. Quick convergence
92
LINK-STATE ROUTING PROTOCOL
Limitation
1. More memory required
2. Complex procedure
93
DV-ROUTING VS LS-ROUTING
• Comaprison
Feature DV-Routing LS-Routing
Bandwidth Less More
Knowledge Local Knowledge Global Knowledge
Algorithm Bellman-Ford Algorithm Dijkstra Algorithm
Traffic Less More
Converges Slower Faster
Problem Count to infinity and
looping persist
No problem
Types RIP,IGRP OSPF,IS-IS
94
SUMMARY
Lecture-8 : Link-State Routing
Q.1 What is Link-state routing protocol?
Q.2 What are the limitations of distance-vector routing
protocol?
Q.3 What are the features of distance-routing
protocol?
Q.4 What is the basic idea behind link-state routing
protocol?
Q.5 What are the limitation of link-state routing
protocol?
95
ACTIVITY
Lecture-8 : Link-State Routing
video :
Routing types
https://www.youtube.com/watch?v=C3trPo6qVv4
96
CONGESTION
&
CONGESTION
CONTROL
• Problem and Solution
97
LECTURE – 9
Objectives
Congestion
Cause of Congestion
Effect of Congestion
Congestion Control
Recap
• Limitation of DV Routing
• Link-State Routing
• LS Routing Features & limitations
• Shortest path first Algorithm
Congestion & Congestion Control
98
WHAT IS CONGESTION?
Problem
1. A state occurring in network layer when the
message traffic is so heavy that it slows down
network response time.
2. Network congestion in data networking and
queuing theory is the reduced quality of service
that occurs when a network node or link is carrying
more data than it can handle.
99
CONGESTION IN NETWORK
• Example
100
CAUSES OF CONGESTION
Reason
1. No Buffer space.
2. Mismatch in Processing speed leading to data loss.
3. Slow transmission link and over load in
transmission link than it can handle (Transmission
link capacity = speed and load that it carry data) .
101
EFFECTS OF CONGESTION
Impact -1
1. As offered load in network increases delay also
increases.
2. No matter what technique is used for
congestion control, the delay grows without
bound as the load approaches the capacity of
the system.
102
EFFECTS OF CONGESTION
Impact -2
1. As response time decreases , performance also
decreases.
2. The two vital parameters of the network
performance, namely throughput and delay.
3. The throughput can be defined as the percentage
of utilization of the network capacity.
4. If delay increases, retransmission occurs, making
situation worse.
103
CONGESTION CONTROL
Solution
1. Refers to techniques and mechanisms that can
either prevent congestion, before it happens, or
remove congestion, after it has happened.
2. Congestion control mechanisms are divided into
two categories,
• Prevents the congestion from happening.
• Removes congestion after it has taken place.
104
SUMMARY
Lecture-9: Congestion & Congestion
Control
Q.1 What is congestion?
Q.2 What are the causes of congestion?
Q.3 What is the impact on network after congestion?
Q.4 What is congestion control?
Q.5 What are the types of congestion control?
105
ACTIVITY
Lecture-9: Congestion & Congestion
Control
Reading:
• How the performance of congestion control carried
out?
106
CONGESTION
CONTROL
• Network Layer Functionality
107
LECTURE – 10
Objectives
Congestion control Taxonomy
Open Loop congestion control
methods
Closed Loop congestion control
methods
Recap
• Congestion
• Cause of Congestion
• Effect of Congestion
• Congestion Control
Congestion Control
108
CONGESTION CONTROL SCHEMES
• Type-1 Congestion control scheme
Destination control
Source control Implicit Feedback Explicit feedback
Persistent
Local
Responsive
Global
Open Loop control Closed loop control
109
CONGESTION CONTROL
TAXONOMY
• Type-2
110
CONGESTION CONTROL METHODS
2 types
Open loop :
1. In this method, policies are used to prevent the
congestion before it happens.
2. Congestion control is handled either by the source
or by the destination.
Closed loop:
1. Closed loop congestion control mechanisms try to
remove the congestion after it happens.
111
OPEN LOOP CONGESTION
METHODS
Slide- 1
• Retransmission Policy:
It is the policy in which retransmission of the packets
are taken care.
• Window Policy:
The type of window at the sender side may also
affect the congestion.
• Acknowledgment Policy:
The acknowledgment policy imposed by the receiver
may also affect congestion.
112
OPEN LOOP CONGESTION
METHODS
Slide- 2
• Discarding Policy:
A good discarding policy by the routers may prevent
congestion and at the same time may not harm the
integrity of the transmission
• Admission Policy:
An admission policy, which is a quality-of-service
mechanism, can also prevent congestion in virtual-
circuit networks.
113
CLOSED LOOP CONGESTION
METHODS
Slide-1
• Backpressure
114
CLOSED LOOP CONGESTION
METHODS
Slide-2
• Choke Packet
115
CLOSED LOOP CONGESTION
METHODS
Slide- 3
• Implicit Signaling :In implicit signaling, there is no
communication between the congested node or
nodes and the source.
• Explicit Signaling :The node that experiences
congestion can explicitly send a signal to the source
or destination.
- Types : Backward Signaling , Forward Signaling
116
SUMMARY
Lecture-10 : Congestion Control
Q.1 What are the two variations of congestion control
taxonomy?
Q.2 What is open loop congestion control?
Q.3 What is closed loop congestion control?
Q.4 What are the methods used under open loop
congestion control ?
Q.5 What are the methods used under closed loop
congestion control?
117
ACTIVITY
Lecture-10 : Congestion Control
Exercise:
• Categorize the prevention and removal congestion
methods in network layer.
118
QUALITY OF
SERVICE
• Data traffic Management
119
LECTURE – 11
Objectives
Quality of Service
Traffic descriptor
Traffic profile
QoS Techniques
Recap
• Congestion control Taxonomy
• Open Loop congestion control methods
• Closed Loop congestion control methods
Quality of Service
120
QUALTY OF SERVICE
Concept
1. Description or measurement of over all
performance of service.
2. Refers to traffic control mechanism.
3. Purpose :
• Ex: Time-criticial applications , video and audio
conferencing / streaming : requires bounded delay
and loss rate
121
QOS REQUIRMENTS
Flow Characteristics
1. Delay
2. Delay Variation(Jitter)
3. Throughput
4. Error Rate
122
TRAFFIC DESCRIPTOR
• Qualitative values that represent a data flow
123
TRAFFIC PROFILE
• 3 types
124
QOS TECHNIQUES
4 types
1. Scheduling : queueing in fair manner .
2. Traffic shaping : mechanism to control the amount
and rate of traffic.
3. Resource reservation: resources for flow of data are
reserved.
4. Admission Control : mechanism implemented by
routers or switch
125
TRAFFIC SHAPING ALGORITHM
QoS
Traffic Shaping:
1. It is about regulating average rate of dataflow.
2. It is a method of congestion control by providing
shape to data flow before entering the packet into
the network.
3. At connection set-up time, the sender and carrier
negotiate a traffic pattern ( shape).
126
TRAFIIC SHAPING METHODS
2 types
1. Leaky-Bucket Algorithm
2. Token-Bucket Algorithm
127
SUMMARY
Lecture-11 : Quality of Service
Q.1 What is QoS in computer network?
Q.2 What are the techniques involved in QoS?
Q.3 What is traffic shaping ?
128
ACTIVITY
Lecture-11: Quality of Service
Reading:
Introduction to Quality of service
https://networklessons.com/cisco/ccna-routing-
switching-icnd2-200-105/introduction-qos-quality-
service
129
TRAFFIC
SHAPING
METHODS
• Data Traffic Management
130
LECTURE – 12
Objectives
Traffic shaping Methods
• Leaky –Bucket Algorithm
• Token-Bucket Algorithm
Recap
• Quality of Service
• Traffic descriptor
• Traffic profile
• QoS Techniques
Traffic Shaping Methods
131
WHAT IS LEAKY-BUCKET?
Traffic shaping
1. It is a traffic shaping mechanism that controls the
amount and the rate of the traffic sent to the
network.
2. A leaky bucket algorithm shapes busty traffic into
fixed rate traffic by averaging the data rate.
3. The rate at which the water is poured into the
bucket is not fixed and can vary but it leaks from
the bucket at a constant rate.
132
LEAKY-BUCKET
• Process
133
LEAKY-BUCKET ALGORITHM
Steps
The leaky Bucket used to control rate of flow of data
packets.
1. It is implemented as a single –server queue with
constant service time.
2. If the bucket ( buffer) overflows then packets are
discarded.
3. In this algorithm the input rate can vary but the o/p
rate remains constant .
4. This algorithm saves busty traffic. 134
WHAT IS TOKEN-BUCKET ?
Concept
1. The leaky bucket algorithm allows only an average
(constant) rate of data flow. Its major problem is
that it cannot deal with bursty data.
2. A leaky bucket algorithm does not consider the idle
time of the host.
3. To over come these issues token- Bucket concept
introduced where bucket contain tokens instead of
packets
135
TOKEN-BUCKET
• Process
136
LEAKY BUCKET VS TOKEN BUCKET
• Comparison
TOKEN - BUCKET LEAKY-BUCKET
Token dependent Token are independent or NO tokens.
Packets can only transmitted when there
are enough token.
If bucket is full packet or data is
discarded.
It allows large bursts to be sent@ faster
rate after that constant rate.
Packets are transmitted continuously.
If bucket is full token are discarded, but
not the packet.
It sends the packet @ constant rate
It saves token to send large bursts. Does not save token.
137
TOKEN-BUCKET ALGORITHM
Steps
1. The token Bucket Algorithm compare to leaky
bucket algorithm allow the output rate vary
depending on the size of burst.
2. In this algorithm the buckets holds token to
transmit a packet, the host must capture and
destroy or fetch one token.
3. Tokens are generated by a clock at the rate of on
token every @T sec
4. Idle hosts can capture and save up tokens ( up to
max size of the bucket) in order to send larger
bursts later.
138
SUMMARY
Lecture-12 : Traffic Shaping Methods
Q.1 What is leaky-bucket ?
Q.2 Explain leaky-bucket algorithm.
Q.3 What is Token-Bucket ?
Q.4 Explain token-bucket algorithm.
Q.5 Differences between leaky-bucket and token
bucket .
139
ACTIVITY
Lecture-12: Traffic Shaping Methods
Exercise problems and solution:
Leaky bucket Algorithm
http://site.iugaza.edu.ps/olatif/files/2010/03/Leaky-
Bucket-Additional-Problems-with-Solutions.pdf
140
INTERNET
PROTOCOL-
IPV4
• Concept & Format
141
LECTURE -13
Objectives
IPV4 concept
IPV4 header format & description
IPV4 Address
Subnet
CIDR
Recap
• Traffic shaping Methods
• Leaky –Bucket Algorithm
• Token-Bucket Algorithm
Internet Protocol-IPV4
142
INTERNET PROTOCOL VERSION 4
IPV4- Concept
1. IPv4 was the first version deployed for production
in the ARPANET in 1983.
2. Internet layer protocol of the TCP/IP model.
3. Dotted-decimal format : 4 numbers
4. 32 bit address
5. Composed: Network part + Host part
143
IPV4 HEADER
• Datagram format
144
FORMAT DESCRIPTION
Description-1
• Version: The IPv4 has the version number 4.
• Header length: It shows the size of the header.
• DSCP: type of service included.
• Total length: It denotes the size of the header plus
the size of the data packet.
• Identification: 3 fields used with IP fragmentation.
145
FORMAT DESCRIPTION
Description-2
• Flags: It is used to denote the fragmentation
procedure.
• Fragment offset: It indicates the fragment number
and source host.
• Time to leave: ensure that packet don't circulate
forever.
• Protocol: It denotes the protocol that it is using for
transmitting data.
146
FORMAT DESCRIPTION
Description-3
• Header Checksum: This field is used for error
detection.
• Source IP address: It saves the IP address of the
source end host. The length is 32-bit.
• Destination IP address: It saves the IP address of
the destination host. The length is 32-bit.
147
IPV4 ADDRESS
Concept
1. A number which identifies a device on a network.
2. Functions: identification of host and route .
3. The term subnet mask is only used within IPv4.
4. Uses both class and classless inter-domain (CIDR)
routing concept and notation.
5. Class address : range from 0- 255.
148
CIDR
Concept
1. Method for allocating IP addresses and IP routing.
2. The IETF introduced CIDR in 1993.
3. It is based on variable-length subnet
masking (VLSM).
4. Process of allocating address blocks to
organizations based on their actual and short-term
projected needs.
5. Format : x.y.z.t/n where x.y.z.t defines one address
and /n defines the mask.
149
IPV4
Example
Ex 1: Class address : Class A
• 127.255.255.255
Ex 2: CIDR address
• 192.0.2.0/24
150
SUBNET & SUPERNET
Concept
1. Dividing the large block in class A or B into several
group of smaller networks => Subnet
2. Merging the smaller block in class C into larger or
super network => Supernet
151
SUMMARY
Lecture-13 : Internet Protocol-IPV4
Q.1 What is IPv4?
Q.2 What is IPv4 header format?
Q.3 What is IPv4 class address?
Q.4 What is IPV4 CIDR address?
Q.5 What is subnet and super net?
152
ACTIVITY
Lecture-13: Internet Protocol-IPV4
Reading:
• History of IP protocol.
153
IPV4 CLASSFUL
ADDRESS
• Class types
154
LECTURE – 14
Objectives
Classful Address
Classful address range
Binary and decimal range
Conversion from decimal to binary
Conversion from binary to decimal
Recap
• IPV4 concept
• IPV4 header format & description
• IPV4 Address
• Subnet
• CIDR
IPV4 Classful Address
155
156
157
158
159
160
161
162
CLASSFUL ADDRESSING
• Size and Casting
Class Size Casting
163
CLASS ADDRESS RANGE
• Network scale
Class
164
ADDRESSING RANGE
• Decimal and Binary format
Decimal
165
COVERSION DECIMAL TO BINARY
IPV4
Given Decimal :
192.168.158.0
Solution in Binary format :
11000000.10101000.10011110.00000000
166
COVERSION BINARY TO DECIMAL
• IPV4
2^7
=128+64.128+32+8.128+16+8+4+2.0
=192.168.158.0
167
SUMMARY
Lecture-14 : IPV4 Classful Address
Q.1 What is range of IPV4 classful address in binary?
Q.2 What is the range of IPV4 classful address in
decimal?
Q.3 What is general size and type of casting of classful
address?
Q.4 How to convert IPV4 classful binary address to
decimal?
Q.5 How to convert IPV4 classful decimal address to
binary?
168
ACTIVITY
Lecture-14: IPV4 Classful Address
Evaluate:
• How to find min and max range of IPV4 classful
address?
169
INTERNET
PROTOCOL-
IPV6
• Currently used
170
LECTURE – 15
Objectives
Internet Protocol V6
IPV6 Address structure
IPV6 header Format
Comparison between IPV4 & IPV6
Recap
• Classful Address
• Classful address range
• Binary and decimal range
• Conversion from decimal to binary
• Conversion from binary to decimal
Internet Protocol-IPV6
171
INTERNET PROTOCOL V6
Recent version
1. Communication Protocol
2. Moto: provide Larger addressing space.
3. Function: Indentication, Location system & Routes.
4. IPv6 uses a 128-bit address.
5. IPv6 addresses are represented as eight groups,
separated by colons, of four hexadecimal digits.
6. Format: group1:group2: ……etc…. :group8
172
INTERNET PROTOCOL V6
Address parts
1. Network component - 64 bits
2. Node component – 64 bits
-----------------------------------------
Totals – 128 Bits
173
INTERNET PROTOCOL V6
• Example
174
NETWORK COMPONENT
• IPV6
175
IPV6 HEADER
• Datagram Format
176
FORMAT DESCRIPTION
Description -1
• Version: It is of 4 bits and contains the version of IP which is 6.
• Priority: 4 bits describes priority of the packet w.r.t traffic
congestion.
• Flow label: 24 bits (3-byte) is designed to provide special
handling for flow of data.
• Payload length: 16 bits (2-byte) payload length field defines
the length of the IP datagram. Excluding the base header.
177
FORMAT DESCRIPTION
Description - 2
• Next header: 8 bits field defining the header that follows the
base header in the datagram.
• Hop limit: 8-bit hop limit field serves the same purpose as the
TTL field in IPv4.
• Source address: 128-bits ( 16-byte) and denotes internet
address of original source host of the datagram.
• Destination address: It is also of 128 bits and denotes the
internet address of final destination of the datagram.
178
IPV4 VS IPV6
• Key Comparison
Feature
179
SUMMARY
Lecture-15 : Internet Protocol-IPV6
Q.1 What is IPV6?
Q.2 What are the components of IPV6?
Q.3 What is the format of IPv6?
Q.4 What is the IPV6 header format?
Q.5 Comparison between IPV4 and IPV6
180
ACTIVITY
Lecture-15: Internet Protocol-IPV6
Reading :
Types of IPV6 Addressing
http://www.steves-internet-guide.com/ipv6-guide/
181
IP
SUPPORTING
PROTOCOLS
• NAT,ARP,ICMP,DHCP
182
LECTURE – 16
Objectives
Network Address Protocol
Network Address Translation
Internet control message protocol
Dynamic Host configuration
Recap
• Internet Protocol V6
• IPV6 Address structure
• IPV6 header Format
• Comparison between IPV4 & IPV6
IP supporting Protocols
183
NETWORK ADDRESS
TRANSLATION
Concept
1. Service used in routers.
2. Over come IPV4 address shortage.
3. Method/process of remapping local IP address to
Global IP address and vice versa
4. Translating public IP address to private IP address
and vice versa
184
NETWORK ADDRESS
TRANSLATION
• Example
185
ADDRESS RESOLUTION
PROTOCOL
Concept
1. Function: to translate Logical address to physical
address.
2. Mapping: IP address to MAC address
3. Layer 2 protocol
186
ADDRESS RESOLUTION
PROTOCOL
• Example
187
WHY ICMP?
Concept
IP Limitation:
1.Error reporting or correcting mechanism.
2.No management of queries
188
IP SUPPORTING PROTCOLS
• Network layer protocols
ICMP,IGMP
IP
ARP,RA
RP
189
INTERNET CONTROL MESSAGE
PROTOCOL
Concept
1. It is a network layer protocol
2. It reports errors and provides information related to
IP packet processing.
3. Error example : that a requested service is not
available or that a host isn’t reachable.
4. Tool : ping or traceout
190
INTERNET CONTROL MESSAGE
PROTOCOL
• Example
191
DYNAMIC HOST CONFIGURATION
PROTOCOL
Concept
1. Application layer protocol.
2. Over the issues of manual IP configuration.
3. It allows the host to obtain an IP address
automatically.
4. Also refferred as : plug-and-play protocol.
5. Mechanism: DORA - Discover, Offer, Request, Ack
192
DYNAMIC HOST CONFIGURATION
PROTOCOL
• Example
193
SUMMARY
Lecture-16 : IP supporting Protocols
Q.1 What is NAT?
Q.2 What is public IP address & private IP address?
Q.3 What is ARP?
Q.4 What is ICMP?
Q.5 What is DHCP?
194
ACTIVITY
Lecture-16: IP supporting Protocols
Reading:
ARP
https://www.youtube.com/watch?v=zTWa2Pqlgp0
DHCP
https://www.youtube.com/watch?v=IUOVSIKj6GU
195
THANK YOU
196
197
198
199
200
201
202
203
Icons
Architecture Commerce Legal Studies Arts & Humanities
Performing Arts Management Studies Science & Tech Engineering

More Related Content

Similar to B21DA0201_03.ppt

Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
TharuniDiddekunta
 
21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf
Dr. Shivashankar
 
destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...
Ashish Gupta
 
Network_Layer.ppt
Network_Layer.pptNetwork_Layer.ppt
Network_Layer.ppt
RajSingh52036
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
SKS
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Pradnya Saval
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Pradnya Saval
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
Dr. Shivashankar
 
Computer Network
Computer NetworkComputer Network
Computer Network
Rubaya Mim
 
ITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdf
ssuser2d7235
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
itwkd
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
BharatiPatelPhDStude
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
Roman Brovko
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
Aksum Institute of Technology(AIT, @Letsgo)
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
sameernsn1
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Ccna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wirelessCcna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wirelesskratos2424
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
ushabarad142
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
suddenven
 

Similar to B21DA0201_03.ppt (20)

Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
 
21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf
 
destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...
 
Network_Layer.ppt
Network_Layer.pptNetwork_Layer.ppt
Network_Layer.ppt
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
 
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
21 SCHEME_21EC53_VTU_MODULE-4_COMPUTER COMMUNCATION NETWORK.pdf
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
ITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdf
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Ccna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wirelessCcna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wireless
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 

More from DrPreethiD1

Introduction to healthcare.pptx
Introduction to healthcare.pptxIntroduction to healthcare.pptx
Introduction to healthcare.pptx
DrPreethiD1
 
JAVA ALL 5 MODULE NOTES.pptx
JAVA ALL 5 MODULE NOTES.pptxJAVA ALL 5 MODULE NOTES.pptx
JAVA ALL 5 MODULE NOTES.pptx
DrPreethiD1
 
module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptx
DrPreethiD1
 
Module 1 CN -new.pptx
Module 1 CN -new.pptxModule 1 CN -new.pptx
Module 1 CN -new.pptx
DrPreethiD1
 
B19CA4020_SE_Unit3.pptx
B19CA4020_SE_Unit3.pptxB19CA4020_SE_Unit3.pptx
B19CA4020_SE_Unit3.pptx
DrPreethiD1
 
Introduction-to-Software-Engineering.ppt
Introduction-to-Software-Engineering.pptIntroduction-to-Software-Engineering.ppt
Introduction-to-Software-Engineering.ppt
DrPreethiD1
 
CCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfCCNA-lab-Manual.pdf
CCNA-lab-Manual.pdf
DrPreethiD1
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
DrPreethiD1
 
B21DA0201_01.ppt
B21DA0201_01.pptB21DA0201_01.ppt
B21DA0201_01.ppt
DrPreethiD1
 
138045890.pdf
138045890.pdf138045890.pdf
138045890.pdf
DrPreethiD1
 
Module 1 CN -new.pptx
Module 1 CN -new.pptxModule 1 CN -new.pptx
Module 1 CN -new.pptx
DrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
DrPreethiD1
 
SE-TEXT-BOOK_Material.doc
SE-TEXT-BOOK_Material.docSE-TEXT-BOOK_Material.doc
SE-TEXT-BOOK_Material.doc
DrPreethiD1
 
SE-TEXT-BOOK_Material.doc
SE-TEXT-BOOK_Material.docSE-TEXT-BOOK_Material.doc
SE-TEXT-BOOK_Material.doc
DrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
DrPreethiD1
 
138045890.pdf
138045890.pdf138045890.pdf
138045890.pdf
DrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
DrPreethiD1
 

More from DrPreethiD1 (17)

Introduction to healthcare.pptx
Introduction to healthcare.pptxIntroduction to healthcare.pptx
Introduction to healthcare.pptx
 
JAVA ALL 5 MODULE NOTES.pptx
JAVA ALL 5 MODULE NOTES.pptxJAVA ALL 5 MODULE NOTES.pptx
JAVA ALL 5 MODULE NOTES.pptx
 
module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptx
 
Module 1 CN -new.pptx
Module 1 CN -new.pptxModule 1 CN -new.pptx
Module 1 CN -new.pptx
 
B19CA4020_SE_Unit3.pptx
B19CA4020_SE_Unit3.pptxB19CA4020_SE_Unit3.pptx
B19CA4020_SE_Unit3.pptx
 
Introduction-to-Software-Engineering.ppt
Introduction-to-Software-Engineering.pptIntroduction-to-Software-Engineering.ppt
Introduction-to-Software-Engineering.ppt
 
CCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfCCNA-lab-Manual.pdf
CCNA-lab-Manual.pdf
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
 
B21DA0201_01.ppt
B21DA0201_01.pptB21DA0201_01.ppt
B21DA0201_01.ppt
 
138045890.pdf
138045890.pdf138045890.pdf
138045890.pdf
 
Module 1 CN -new.pptx
Module 1 CN -new.pptxModule 1 CN -new.pptx
Module 1 CN -new.pptx
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
SE-TEXT-BOOK_Material.doc
SE-TEXT-BOOK_Material.docSE-TEXT-BOOK_Material.doc
SE-TEXT-BOOK_Material.doc
 
SE-TEXT-BOOK_Material.doc
SE-TEXT-BOOK_Material.docSE-TEXT-BOOK_Material.doc
SE-TEXT-BOOK_Material.doc
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
138045890.pdf
138045890.pdf138045890.pdf
138045890.pdf
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 

Recently uploaded

Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
University of Maribor
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
ChetanK57
 
nodule formation by alisha dewangan.pptx
nodule formation by alisha dewangan.pptxnodule formation by alisha dewangan.pptx
nodule formation by alisha dewangan.pptx
alishadewangan1
 
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdfMudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
frank0071
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
yqqaatn0
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
kejapriya1
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
S.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary levelS.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary level
ronaldlakony0
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
silvermistyshot
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
Richard Gill
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Sérgio Sacani
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiologyBLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
NoelManyise1
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
Wasswaderrick3
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 

Recently uploaded (20)

Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 
nodule formation by alisha dewangan.pptx
nodule formation by alisha dewangan.pptxnodule formation by alisha dewangan.pptx
nodule formation by alisha dewangan.pptx
 
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdfMudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
S.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary levelS.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary level
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiologyBLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 

B21DA0201_03.ppt

  • 1. COMPUTER NETWORKS S c h o o l o f C o m p u t e r S c i e n c e & A p p l i c a t i o n s
  • 3. LECTURE -1 Introduction to Network Layer • Network layer • Network Layer Function • Routing • Forwarding 3
  • 4. WHAT IS NETWORK LAYER? Definition 1. Layer 3 of OSI Referenece model. 2. Resposible for the source-to-destination delivery of a packet. ( based on Network architecture) 3. End-to- End message delivery. 4
  • 6. NETWORK LAYER Features 1. It routes the signal through different channels from one node to other. 2. It acts as a network controller. It manages the Subnet traffic. 3. It decides by which route data should take. 4. It divides the outgoing messages into packets and assembles the incoming packets into messages for higher levels. 6
  • 7. NETWORK LAYER Function 1. Forwarding and Routing. 2. Logical addressing or IP addressing. 3. Internetworking: Communication between different types of network. 4. Connection setup 5. Fragmentation or Defragmentation 7
  • 8. FORWARDING • Definition Refers to routers-local action of transfering a packet from an input interface to the appropriate output link interface. 8
  • 9. ROUTING • Definition Refers to the network-wide process that determines the end- to-end paths that packets take from source to destination. 9
  • 11. SUMMARY Lecture-1 : Introduction to Network Layer Q.1 What is Network layer? Q.2 What are the features of network layer? Q.3 What are the function of network layer? Q.4 What is forwarding? Q.5 What is routing? Q.6 What is/are the differences between forwarding and routing? 11
  • 12. ACTIVITY Lecture-1 : Introduction to Network Layer Reading : Forwarding Techniques: http://www.brainkart.com/article/Forwarding- Techniques_13480/ 12
  • 14. LECTURE – 2 Objectives Network layer services Network layer architecture Connection Network layer services Connectionless Network layer services Recap • Network layer • Network Layer Function • Network layer Services Basic of computer network & Its Uses 14
  • 15. SERVICES OF NETWORK LAYER 1. Provides host-to-host services to the transport layer. 2. Provides either connection host-to-host service or connection-less host-to-host service but not both at a time. 3. Connection service in network layer is offered through – virtual circuit network. 4. Connectionless service in network layer is offered through- datagram network. 15
  • 16. TYPES OF PACKET SWITCHING NETWORK • Example 16
  • 17. NETWORK LAYER ARCHITECTURE 1. ATM : Vitual Circuit Network 2. Framerelay: Virtual Circuit Network 3. Internet : Datagram Network 17
  • 18. NETWORK LAYER Virtual Circuit - Services 1. Guaranteed delivery 2. Guaranteed delivery with bounded delay 3. In-order packet delivery 4. Guaranteed minimal bandwidth 5. Guaranteed maximum jitter 6. Security service 18
  • 19. NETWORK LAYER Datagram- Services Provides Best effort services ( Service model) 1. No Guaranteed delivery 2. No Guaranteed delivery with bounded delay 3. No In-order packet delivery 4. No Guaranteed minimal bandwidth 5. No Guaranteed maximum jitter 19
  • 20. SUMMARY Lecture-2 : Network Layer Services Q.1 What are the services offered by network layer in general? Q.2 What are the services offered by virtual circuit network ? Q.3 What are the services offered by datagram network ? Q.4 Give an example for virtual circuit network and datagram network? 20
  • 21. ACTIVITY Lecture-2 : Network Layer Services Reading: 1. What is the difference between function and service? 2. What are the additional functionalities of Network Layer? => Find the material/ collect points 21
  • 23. LECTURE - 3 Objectives Network layer design issues Virtual Circuit Vs Datagram Network Recap • Network layer services • Network layer architecture • Connection Network layer services • Connectionless Network layer services Network Layer Design Issues 23
  • 24. NETWORK LAYER DESIGN ISSUES Challenges 1. Store and Forward packet switching 2. Services provided to Transport layer 3. Implementation of Connectionless Service 4. Implementation of Connection Service 24
  • 25. STORE & FORWARD PACKET SWITCHING Challenge - 1 1. The host sends the packet to the nearest router. 2. This packet is stored there until it has fully arrived. 3. Once the link is fully processed by verifying the checksum then it is forwarded to the next router till it reaches the destination. 4. This mechanism is called “Store and Forward packet switching”. 25
  • 26. STORE & FORWARD PACKET SWITCHING • Problem 26
  • 27. SERVICES PROVIDED TO TRANSPORT LAYER Challenge-2 A discussion point is whether the service should be connection-oriented or connectionless. Major Argument : 1. Internet community: connectionless but hosts should do error control and flow control. 2. Telephone community: subnet should provide a reliable ( connection services). 27
  • 28. GOAL OF NETWORK LAYER SERVICE TO TRANSPORT LAYER Irrespective of connection or connectionless service: 1. Independent of the router technology. 2. The transport layer should be shielded from the number, type and topology of the subnets present. 3. The network addresses made available to the transport layer should use a uniform numbering plan, even across LAN's and WANs. 28
  • 29. IMPLEMENTATION OF CONNECTIONLESS SERVICE Challenges-3 1. Inconnectionless organisation • Packets : datagrams • Subnet : datagram subnet 2. Large packets : divided into manageable sized packets. 3. Each packet is associated with destination address. 4. Routed independently. 5. Routing algorithms in routers manages route table 29
  • 31. IMPLEMENTATION OF CONNECTION SERVICE Challenges-4 1. Connection setup between sourc e to destination 2. Route in chosen path between source and destination. 3. Achieved by : a) Circuit switch connection b) Virtual circuit switched connection 31
  • 33. DATAGRAM VS VIRTUAL CIRCUIT • Comparison Issue Datagram Subnet VC Subnet Circuit setup Not needed Required Addressing Each packet contains the full source and destination address Each packet contains a short VC number State information Subnet does not hold state information Each VC requires subnet table space Routing Each packet is routed independently Route chosen during setup; all packets of a VC follow this route Effects of router failures None except for packets lost during the crash All VC's that passed through the failed router are terminated Quality of service Difficult to guarantee Easy if enough resources can be allocated during the setup procedure Congestion control Difficult Easy if enough buffers can 33
  • 34. SUMMARY Lecture-3 : Network Layer Design Issues Q.1 What is store and forward in computer network? Q.2 What is the conflict between internet and telephone community? Q.3 What are the design issues of network layer? Q.4 How network layer connection service is implemented? Q.5 How network layer connectionless service is implemented? Q.6 What are the differences between datagram 34
  • 35. ACTIVITY Lecture-3 : Network Layer Design Issues Reading : What’s inside router? http://www2.ic.uff.br/~michael/kr1999/4- network/4_06-inside.htm Trade offs: • router memory space versus bandwidth • setup time versus address parsing time => Find the material / collect points 35
  • 36. ROUTING • Network layer Functionality 36
  • 37. LECTURE - 4 Objectives Routing Routing Activities Routing on Connection types Role of IP addressing in routing Recap • Network layer design issues • Virtual Circuit Vs Datagram Network Routing 37
  • 38. ROUTING Concept 1. Routing = building maps and giving direction. 2. Vs Routing is the act of moving information across an internetwork from a source to a destination. 3. Routers are networking devices which performs routing. 38
  • 39. ROUTING ACTIVITIES • 2 activities Determining optimal routing paths and transporting information groups (typically called packets) through an internetwork. Although packet switching is relatively straightforward, path determination can be very complex. 39
  • 40. ROUTING IS APPLIED TO WHAT TYPE OF CONNECTION? ROUTING=> WHEN APPLIED TO VC=> DECISION OF ROUTING ARE MADE WHEN CIRCUIT IS BEING SET UP ROUTING=> WHEN APPLIED TO DATAGRAM=> THEN ROUTING DECISION NEED TO MAKE FOR EACH ARRIVING PACKET. 40
  • 41. ROLE OF IP ADDRESSES IN ROUTING Location is represented by an IP address. Path choice is based on location. Unique addressing allows communication between end stations. 41
  • 42. PATH DETERMINATION Importance-1 • Routing protocols use metrics to evaluate what path will be the best for a packet to travel. • A metric is a standard of measurement, that is used by routing Protocols/algorithms to determine the optimal path to a destination. 42
  • 43. PATH DETERMINATION Importance- 2 • To aid the process of path determination, routing protocols/algorithms initialize and maintain routing tables, which contain route information. • Route information varies depending on the routing algorithm used. • Routers compare metrics to determine optimal routes, and these metrics differ depending on the design of the routing algorithm used. 43
  • 44. ROUTING METRICS Types 1. Hop count or path length : counts the number of routers a packet must traverse 2. Bandwidth: preferring the path with highest bandwidth 3. Load: traffic utilization on a link 4. Delay: time for a packet to traverse a path 5. Reliability: probability of a link failure 6. Cost: determined by IOS or administrator to indicate preference for a route 44
  • 45. SUMMARY Lecture - 4 : Routing Q.1 What is Routing? Q.2 What is Router ? Q.3 What are the activities of routing? Q.4 Routing is applied for what types of connection? Q.5 What is the role of IP addressing in routing? Q.6 How optimal path is determined by routing? Q.7 What are the parameters used for routing? 45
  • 46. ACTIVITY Lecture-4 : Routing Reading: Router Characteristics and Router Protocols https://ecomputernotes.com/computernetworkingnote s/communication-networks/routers 46
  • 47. TYPES OF ROUTING • Network layer Functionality 47
  • 48. LECTURE - 5 Objectives Routing Properties Types of Routing Static Routing Dynamic Routing Adaptive Vs Non-Adaptive Routing Recap • Routing • Routing Activities • Routing on Connection types • Role of IP addressing in routing Types of Routing 48
  • 49. ROUTING PROPERTIES Design Goals Routing algorithms often have one or more of the following design goals: 1. Correctness- routing done properly and reach their proper destination. 2. Simplicity - low overhead 3. Robustness – recover from h/w and s/w failures. 4. Stability – stable in all circumstances. 5. Optimality – throughput and minimizing packet delay. 6. Fairness – fair chance for every node to transmit packets. 7. Rapid convergence – Decrease delay-time. 49
  • 50. ROUTING ALGORITHM • Concept It’s a part of the network layer software responsible for deciding which output line an incominh packet should be transmiited on. 50
  • 51. TYPES OF ROUTING Categories 1. Adaptive versus Non-Adaptive 2. Static versus dynamic 3. Flat versus hierarchical 4. Intra-domain versus inter-domain 5. Cast Routing : unicast, broadcast, multicast, any cast 51
  • 52. STATIC ROUTING PROTOCOL Type -1 1. Configured manually 2. Specifies network address and subnet mask of remote network, and IP address of next hop router or exit interface 3. Use static routes when: – Network only consists of few routers – Network is connected to Internet only through one ISP 52
  • 53. MERITS OF STATIC ROUTING 1. Minimal CPU processing 2. Easy to configure 3. Easier for administrator to understand 53
  • 54. DEMERITS OF STATIC ROUTING 1. Configuration and maintenance is time consuming 2. Does not scale well with growing networks 3. Requires complete knowledge of the whole network for proper implementation 54
  • 55. DYNAMIC ROUTING PROTOCOL Type-2 Added to routing table by using a dynamic routing protocol 1. Used by routers to share information about the reach ability and status of remote networks 2. Perform several activities: – Network discovery – Updating and maintaining routing tables 55
  • 56. MERITS OF DYNAMIC ROUTING 1. Less administrative overhead when adding or deleting a network 2. Protocols automatically react to the topology changes 3. More scalable 56
  • 57. DEMERITS OF DYNAMIC ROUTING 1. Router resources are used (CPU cycles, memory and link bandwidth) 2. More administrator knowledge is required for configuration, verification and troubleshooting 57
  • 58. ADAPTIVE & NONADAPTIVE ROUTING • Comparison Feature Adaptive Non-Adaptive Define Constructs the routing table based on the network conditions. Constructs the static table Usage Dynamic routing Static routing Routing decision Based on network topology & traffic Based on static table Examples Distance-vector, Link- state, Centralized , Distributed etc Flooding Shortest path Complexity Complex Simple 58
  • 59. SUMMARY Lecture-5 : Types of Routing Q.1 What are the types of routing? Q.2 What is adaptive and non-adaptive routing algorithm? Q.3 What is static and dynamic routing algorithm? Q.4 Comparison between adaptive routing and non- adaptive routing. 59
  • 60. ACTIVITY Lecture-5 :Types of Routing Reading: 1. Centralized /Global versus Decentralized/ Distributed. 2. Single-path versus Multipath 3. Host-intelligent versus Router-intelligent 4. Ad-hoc Routing 60
  • 62. LECTURE - 6 Objectives Routing Taxonomy Flooding Shortest path Algorithm Dijkstra Algorithm Recap • Routing Properties • Types of Routing • Static Routing • Dynamic Routing • Adaptive Vs Non-Adaptive Routing Routing Taxonomy 62
  • 63. ROUTING TAXONOMY • Classification Wired Routing Algorithm Static Routing Interior Routing Exterior Routing Dynamic Routing DV Routing L-S Routing BGP RIP, IGRP Shortest Path, Flooding OSPF IS-IS Hybrid Routing EIGRP 63
  • 64. FLOODING Non-adaptive Routing - Concept 1. Requires no network information like topology, load condition ,cost of different path. 2. Every incoming packet to a node is sent out on every outgoing like except the one it arrived on. 64
  • 65. FLOODING Characteristics 1. All possible routes between Source and Destination is tried. A packet will always get through if path exists 2. As all routes are tried, there will be atleast one route which is the shortest 3. All nodes directly or indirectly connected are visited 65
  • 66. FLOODING Advantages 1. Highly Robust, emergency or immediate messages can be sent (eg military applications) 2. Set up route in virtual circuit 3. Flooding always chooses the shortest path 4. Broadcast messages to all the nodes 66
  • 67. FLOODING Limitations 1. Flooding generates vast number of duplicate pakects 2. Suitable damping mechanism must be used 67
  • 68. SHORTEST PATH ALGORITHM Concept 1. Classic Problem 2. Single shortest path : Dijkstra Algorithm 3. All-pair shortest path : Floyd’s Warshall’s Algorithm 4. Approach : Greedy approach 5. Implemented : weighted graph 68
  • 69. DIJKSTRA ALGORITHM: Slide-1 function Dijkstra(Graph, source): create vertex set Q for each vertex v in Graph: dist[v] ← INFINITY prev[v] ← UNDEFINED add v to Q dist[source] ← 0 69
  • 70. DIJKSTRA ALGORITHM: Slide-2 while Q is not empty: u ← vertex in Q with min dist[u] remove u from Q for each neighbor v of u: // only v that are still in Q alt ← dist[u] + length(u, v) if alt < dist[v]: dist[v] ← alt prev[v] ← u return dist[], prev[] 70
  • 71. SHORTEST PATH ALGORITHM • The first 5 steps used in computing the shortest path from A to D. The arrows indicate the working node. 71
  • 72. SUMMARY Lecture-6 : Routing Taxonomy Q.1 What is static routing protocol? Q.2 What is Flooding? Q.3 What is shortest path algorithm? Q.4 Explain Dijkstra Algorithm. 72
  • 73. ACTIVITY Lecture-6 : Routing Taxonomy Video: Shortest path routing algorithm • https://www.youtube.com/watch?v=nieg8XQQ7i0 • https://www.youtube.com/watch?v=OGsPQy-lM1w 73
  • 75. LECTURE - 7 Objectives Distance-Vector Routing DV Routing Features Bellman-Ford Algorithm Recap • Routing Taxonomy • Flooding • Shortest path Algorithm • Dijkstra Algorithm Distance Vector Routing 75
  • 76. DISTANCE-VECTOR ROUTING PROTOCOL Concept 1. Dynamic routing protocol. 2. Determines the best and most efficient routes for data packets 3. Parametres: distance & direction (Vector) 4. Distance: the number of steps or hosts 5. Direction: the point data leaving from port to data reaching to the port. 6. Algorithm: Bellman-Ford Algorithm or Ford- Fulkerson Algorithm. 76
  • 77. DISTANCE-VECTOR ROUTING PROTOCOL Features 1. Creates automatically routing tables. 2. Algorithm in router exchange its routing table with each of its neighbours. 3. Merges : existing routing table + received routing table 4. Performed dynamically after a fixed time interval by default. 5. Limitation => significant link overhead. 77
  • 78. BELLMAN-FORD ALGORITHM Single source shortest path • Bellman-Ford(G,w,s) 1. Intilialize single source (G,s) 2. for i=1 to |G.v|-1 3. for each edge (u,v) belongs to G.E 4. relax (u,v,w) =>function 5. for each edge(u,v) belongs to G.E 6. If v.d>u.d+w(u,w) 7. return false( no negative cycle) 8. return true. 78
  • 79. BELLMAN-FORD ALGORITHM Single source shortest path relax(u,v,w) => function 1. If v.d>u.d+w(u,v) 2. v.d=u.d+w(u,v) 3. v.p=u Here shortest path to reach V when use edge u->v Here 1. v.d= distance from source to v. 2. w(u,v) = weight of edge u->v 3. v.p= predecessor of v. 79
  • 80. 80
  • 81. 81
  • 82. 82
  • 83. 83
  • 84. 84
  • 85. DISTANCE-VECTOR ROUTING PROTOCOL Information Stored at Node Distance to Reach Node A B C D E F G A 0 1 1 ∞ 1 1 ∞ B 1 0 1 ∞ ∞ ∞ ∞ C 1 1 0 1 ∞ ∞ ∞ D ∞ ∞ 1 0 ∞ ∞ 1 E 1 ∞ ∞ ∞ 0 ∞ ∞ F 1 ∞ ∞ ∞ ∞ 0 1 G ∞ ∞ ∞ 1 ∞ 1 0 Information Stored at Node Distance to Reach Node A B C D E F G A 0 1 1 2 1 1 2 B 1 0 1 2 2 2 3 C 1 1 0 1 2 2 2 D 2 2 1 0 3 2 1 E 1 2 2 3 0 2 3 F 1 2 2 2 2 0 1 G 2 3 2 1 3 1 0 85
  • 86. SUMMARY Lecture-7 : Distance Vector Routing Q.1 What is dynamic routing protocol? Q.2 What is distance-vector routing protocol? Q.3 What are the features of distance-vector routing protocol? Q.4 What is Bellman-Ford algorithm? Q.5 Explain Bellman-ford algorithm. 86
  • 87. ACTIVITY Lecture-7 : Distance Vector Routing Video: Bellman-ford : Negative weights allowed but not negative cycle https://www.youtube.com/watch?v=YbbGemzQ5ok 87
  • 89. LECTURE – 8 Objectives Limitation of DV Routing Link-State Routing LS Routing Features & limitations Shortest path first Algorithm Recap • Distance-Vector Routing • DV Routing Features • Bellman-Ford Algorithm Link-State Routing 89
  • 90. LIMITATION OF DISTANCE VECTOR PROTOCOL Demerit 1. Slow covergence 2. Counting to infinity problrm 3. Lack of variety of metrics 4. No possibility of hierarchical routing 5. Bad performance in large network 90
  • 91. LINK-STATE ROUTING PROTOCOL Concept or Idea 1. Each node monitors neighbours/local links and advertise them to the network. 2. Each node maintains : full graph 3. Each node responsible for learning/monitoring its neighbours and their names. 4. Each router stores: most recently generated LSP from other nodes. 5. Each router uses complete information on the complete topology. 91
  • 92. LINK-STATE ROUTING PROTOCOL Characteristics 1. Maintains centralised database of whole network. 2. Calculation and routing are still distributed. 3. Exchange info only when there is change. 4. Each router maintains identical database. 5. Quick convergence 92
  • 93. LINK-STATE ROUTING PROTOCOL Limitation 1. More memory required 2. Complex procedure 93
  • 94. DV-ROUTING VS LS-ROUTING • Comaprison Feature DV-Routing LS-Routing Bandwidth Less More Knowledge Local Knowledge Global Knowledge Algorithm Bellman-Ford Algorithm Dijkstra Algorithm Traffic Less More Converges Slower Faster Problem Count to infinity and looping persist No problem Types RIP,IGRP OSPF,IS-IS 94
  • 95. SUMMARY Lecture-8 : Link-State Routing Q.1 What is Link-state routing protocol? Q.2 What are the limitations of distance-vector routing protocol? Q.3 What are the features of distance-routing protocol? Q.4 What is the basic idea behind link-state routing protocol? Q.5 What are the limitation of link-state routing protocol? 95
  • 96. ACTIVITY Lecture-8 : Link-State Routing video : Routing types https://www.youtube.com/watch?v=C3trPo6qVv4 96
  • 98. LECTURE – 9 Objectives Congestion Cause of Congestion Effect of Congestion Congestion Control Recap • Limitation of DV Routing • Link-State Routing • LS Routing Features & limitations • Shortest path first Algorithm Congestion & Congestion Control 98
  • 99. WHAT IS CONGESTION? Problem 1. A state occurring in network layer when the message traffic is so heavy that it slows down network response time. 2. Network congestion in data networking and queuing theory is the reduced quality of service that occurs when a network node or link is carrying more data than it can handle. 99
  • 101. CAUSES OF CONGESTION Reason 1. No Buffer space. 2. Mismatch in Processing speed leading to data loss. 3. Slow transmission link and over load in transmission link than it can handle (Transmission link capacity = speed and load that it carry data) . 101
  • 102. EFFECTS OF CONGESTION Impact -1 1. As offered load in network increases delay also increases. 2. No matter what technique is used for congestion control, the delay grows without bound as the load approaches the capacity of the system. 102
  • 103. EFFECTS OF CONGESTION Impact -2 1. As response time decreases , performance also decreases. 2. The two vital parameters of the network performance, namely throughput and delay. 3. The throughput can be defined as the percentage of utilization of the network capacity. 4. If delay increases, retransmission occurs, making situation worse. 103
  • 104. CONGESTION CONTROL Solution 1. Refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened. 2. Congestion control mechanisms are divided into two categories, • Prevents the congestion from happening. • Removes congestion after it has taken place. 104
  • 105. SUMMARY Lecture-9: Congestion & Congestion Control Q.1 What is congestion? Q.2 What are the causes of congestion? Q.3 What is the impact on network after congestion? Q.4 What is congestion control? Q.5 What are the types of congestion control? 105
  • 106. ACTIVITY Lecture-9: Congestion & Congestion Control Reading: • How the performance of congestion control carried out? 106
  • 108. LECTURE – 10 Objectives Congestion control Taxonomy Open Loop congestion control methods Closed Loop congestion control methods Recap • Congestion • Cause of Congestion • Effect of Congestion • Congestion Control Congestion Control 108
  • 109. CONGESTION CONTROL SCHEMES • Type-1 Congestion control scheme Destination control Source control Implicit Feedback Explicit feedback Persistent Local Responsive Global Open Loop control Closed loop control 109
  • 111. CONGESTION CONTROL METHODS 2 types Open loop : 1. In this method, policies are used to prevent the congestion before it happens. 2. Congestion control is handled either by the source or by the destination. Closed loop: 1. Closed loop congestion control mechanisms try to remove the congestion after it happens. 111
  • 112. OPEN LOOP CONGESTION METHODS Slide- 1 • Retransmission Policy: It is the policy in which retransmission of the packets are taken care. • Window Policy: The type of window at the sender side may also affect the congestion. • Acknowledgment Policy: The acknowledgment policy imposed by the receiver may also affect congestion. 112
  • 113. OPEN LOOP CONGESTION METHODS Slide- 2 • Discarding Policy: A good discarding policy by the routers may prevent congestion and at the same time may not harm the integrity of the transmission • Admission Policy: An admission policy, which is a quality-of-service mechanism, can also prevent congestion in virtual- circuit networks. 113
  • 116. CLOSED LOOP CONGESTION METHODS Slide- 3 • Implicit Signaling :In implicit signaling, there is no communication between the congested node or nodes and the source. • Explicit Signaling :The node that experiences congestion can explicitly send a signal to the source or destination. - Types : Backward Signaling , Forward Signaling 116
  • 117. SUMMARY Lecture-10 : Congestion Control Q.1 What are the two variations of congestion control taxonomy? Q.2 What is open loop congestion control? Q.3 What is closed loop congestion control? Q.4 What are the methods used under open loop congestion control ? Q.5 What are the methods used under closed loop congestion control? 117
  • 118. ACTIVITY Lecture-10 : Congestion Control Exercise: • Categorize the prevention and removal congestion methods in network layer. 118
  • 119. QUALITY OF SERVICE • Data traffic Management 119
  • 120. LECTURE – 11 Objectives Quality of Service Traffic descriptor Traffic profile QoS Techniques Recap • Congestion control Taxonomy • Open Loop congestion control methods • Closed Loop congestion control methods Quality of Service 120
  • 121. QUALTY OF SERVICE Concept 1. Description or measurement of over all performance of service. 2. Refers to traffic control mechanism. 3. Purpose : • Ex: Time-criticial applications , video and audio conferencing / streaming : requires bounded delay and loss rate 121
  • 122. QOS REQUIRMENTS Flow Characteristics 1. Delay 2. Delay Variation(Jitter) 3. Throughput 4. Error Rate 122
  • 123. TRAFFIC DESCRIPTOR • Qualitative values that represent a data flow 123
  • 124. TRAFFIC PROFILE • 3 types 124
  • 125. QOS TECHNIQUES 4 types 1. Scheduling : queueing in fair manner . 2. Traffic shaping : mechanism to control the amount and rate of traffic. 3. Resource reservation: resources for flow of data are reserved. 4. Admission Control : mechanism implemented by routers or switch 125
  • 126. TRAFFIC SHAPING ALGORITHM QoS Traffic Shaping: 1. It is about regulating average rate of dataflow. 2. It is a method of congestion control by providing shape to data flow before entering the packet into the network. 3. At connection set-up time, the sender and carrier negotiate a traffic pattern ( shape). 126
  • 127. TRAFIIC SHAPING METHODS 2 types 1. Leaky-Bucket Algorithm 2. Token-Bucket Algorithm 127
  • 128. SUMMARY Lecture-11 : Quality of Service Q.1 What is QoS in computer network? Q.2 What are the techniques involved in QoS? Q.3 What is traffic shaping ? 128
  • 129. ACTIVITY Lecture-11: Quality of Service Reading: Introduction to Quality of service https://networklessons.com/cisco/ccna-routing- switching-icnd2-200-105/introduction-qos-quality- service 129
  • 131. LECTURE – 12 Objectives Traffic shaping Methods • Leaky –Bucket Algorithm • Token-Bucket Algorithm Recap • Quality of Service • Traffic descriptor • Traffic profile • QoS Techniques Traffic Shaping Methods 131
  • 132. WHAT IS LEAKY-BUCKET? Traffic shaping 1. It is a traffic shaping mechanism that controls the amount and the rate of the traffic sent to the network. 2. A leaky bucket algorithm shapes busty traffic into fixed rate traffic by averaging the data rate. 3. The rate at which the water is poured into the bucket is not fixed and can vary but it leaks from the bucket at a constant rate. 132
  • 134. LEAKY-BUCKET ALGORITHM Steps The leaky Bucket used to control rate of flow of data packets. 1. It is implemented as a single –server queue with constant service time. 2. If the bucket ( buffer) overflows then packets are discarded. 3. In this algorithm the input rate can vary but the o/p rate remains constant . 4. This algorithm saves busty traffic. 134
  • 135. WHAT IS TOKEN-BUCKET ? Concept 1. The leaky bucket algorithm allows only an average (constant) rate of data flow. Its major problem is that it cannot deal with bursty data. 2. A leaky bucket algorithm does not consider the idle time of the host. 3. To over come these issues token- Bucket concept introduced where bucket contain tokens instead of packets 135
  • 137. LEAKY BUCKET VS TOKEN BUCKET • Comparison TOKEN - BUCKET LEAKY-BUCKET Token dependent Token are independent or NO tokens. Packets can only transmitted when there are enough token. If bucket is full packet or data is discarded. It allows large bursts to be sent@ faster rate after that constant rate. Packets are transmitted continuously. If bucket is full token are discarded, but not the packet. It sends the packet @ constant rate It saves token to send large bursts. Does not save token. 137
  • 138. TOKEN-BUCKET ALGORITHM Steps 1. The token Bucket Algorithm compare to leaky bucket algorithm allow the output rate vary depending on the size of burst. 2. In this algorithm the buckets holds token to transmit a packet, the host must capture and destroy or fetch one token. 3. Tokens are generated by a clock at the rate of on token every @T sec 4. Idle hosts can capture and save up tokens ( up to max size of the bucket) in order to send larger bursts later. 138
  • 139. SUMMARY Lecture-12 : Traffic Shaping Methods Q.1 What is leaky-bucket ? Q.2 Explain leaky-bucket algorithm. Q.3 What is Token-Bucket ? Q.4 Explain token-bucket algorithm. Q.5 Differences between leaky-bucket and token bucket . 139
  • 140. ACTIVITY Lecture-12: Traffic Shaping Methods Exercise problems and solution: Leaky bucket Algorithm http://site.iugaza.edu.ps/olatif/files/2010/03/Leaky- Bucket-Additional-Problems-with-Solutions.pdf 140
  • 142. LECTURE -13 Objectives IPV4 concept IPV4 header format & description IPV4 Address Subnet CIDR Recap • Traffic shaping Methods • Leaky –Bucket Algorithm • Token-Bucket Algorithm Internet Protocol-IPV4 142
  • 143. INTERNET PROTOCOL VERSION 4 IPV4- Concept 1. IPv4 was the first version deployed for production in the ARPANET in 1983. 2. Internet layer protocol of the TCP/IP model. 3. Dotted-decimal format : 4 numbers 4. 32 bit address 5. Composed: Network part + Host part 143
  • 145. FORMAT DESCRIPTION Description-1 • Version: The IPv4 has the version number 4. • Header length: It shows the size of the header. • DSCP: type of service included. • Total length: It denotes the size of the header plus the size of the data packet. • Identification: 3 fields used with IP fragmentation. 145
  • 146. FORMAT DESCRIPTION Description-2 • Flags: It is used to denote the fragmentation procedure. • Fragment offset: It indicates the fragment number and source host. • Time to leave: ensure that packet don't circulate forever. • Protocol: It denotes the protocol that it is using for transmitting data. 146
  • 147. FORMAT DESCRIPTION Description-3 • Header Checksum: This field is used for error detection. • Source IP address: It saves the IP address of the source end host. The length is 32-bit. • Destination IP address: It saves the IP address of the destination host. The length is 32-bit. 147
  • 148. IPV4 ADDRESS Concept 1. A number which identifies a device on a network. 2. Functions: identification of host and route . 3. The term subnet mask is only used within IPv4. 4. Uses both class and classless inter-domain (CIDR) routing concept and notation. 5. Class address : range from 0- 255. 148
  • 149. CIDR Concept 1. Method for allocating IP addresses and IP routing. 2. The IETF introduced CIDR in 1993. 3. It is based on variable-length subnet masking (VLSM). 4. Process of allocating address blocks to organizations based on their actual and short-term projected needs. 5. Format : x.y.z.t/n where x.y.z.t defines one address and /n defines the mask. 149
  • 150. IPV4 Example Ex 1: Class address : Class A • 127.255.255.255 Ex 2: CIDR address • 192.0.2.0/24 150
  • 151. SUBNET & SUPERNET Concept 1. Dividing the large block in class A or B into several group of smaller networks => Subnet 2. Merging the smaller block in class C into larger or super network => Supernet 151
  • 152. SUMMARY Lecture-13 : Internet Protocol-IPV4 Q.1 What is IPv4? Q.2 What is IPv4 header format? Q.3 What is IPv4 class address? Q.4 What is IPV4 CIDR address? Q.5 What is subnet and super net? 152
  • 155. LECTURE – 14 Objectives Classful Address Classful address range Binary and decimal range Conversion from decimal to binary Conversion from binary to decimal Recap • IPV4 concept • IPV4 header format & description • IPV4 Address • Subnet • CIDR IPV4 Classful Address 155
  • 156. 156
  • 157. 157
  • 158. 158
  • 159. 159
  • 160. 160
  • 161. 161
  • 162. 162
  • 163. CLASSFUL ADDRESSING • Size and Casting Class Size Casting 163
  • 164. CLASS ADDRESS RANGE • Network scale Class 164
  • 165. ADDRESSING RANGE • Decimal and Binary format Decimal 165
  • 166. COVERSION DECIMAL TO BINARY IPV4 Given Decimal : 192.168.158.0 Solution in Binary format : 11000000.10101000.10011110.00000000 166
  • 167. COVERSION BINARY TO DECIMAL • IPV4 2^7 =128+64.128+32+8.128+16+8+4+2.0 =192.168.158.0 167
  • 168. SUMMARY Lecture-14 : IPV4 Classful Address Q.1 What is range of IPV4 classful address in binary? Q.2 What is the range of IPV4 classful address in decimal? Q.3 What is general size and type of casting of classful address? Q.4 How to convert IPV4 classful binary address to decimal? Q.5 How to convert IPV4 classful decimal address to binary? 168
  • 169. ACTIVITY Lecture-14: IPV4 Classful Address Evaluate: • How to find min and max range of IPV4 classful address? 169
  • 171. LECTURE – 15 Objectives Internet Protocol V6 IPV6 Address structure IPV6 header Format Comparison between IPV4 & IPV6 Recap • Classful Address • Classful address range • Binary and decimal range • Conversion from decimal to binary • Conversion from binary to decimal Internet Protocol-IPV6 171
  • 172. INTERNET PROTOCOL V6 Recent version 1. Communication Protocol 2. Moto: provide Larger addressing space. 3. Function: Indentication, Location system & Routes. 4. IPv6 uses a 128-bit address. 5. IPv6 addresses are represented as eight groups, separated by colons, of four hexadecimal digits. 6. Format: group1:group2: ……etc…. :group8 172
  • 173. INTERNET PROTOCOL V6 Address parts 1. Network component - 64 bits 2. Node component – 64 bits ----------------------------------------- Totals – 128 Bits 173
  • 174. INTERNET PROTOCOL V6 • Example 174
  • 177. FORMAT DESCRIPTION Description -1 • Version: It is of 4 bits and contains the version of IP which is 6. • Priority: 4 bits describes priority of the packet w.r.t traffic congestion. • Flow label: 24 bits (3-byte) is designed to provide special handling for flow of data. • Payload length: 16 bits (2-byte) payload length field defines the length of the IP datagram. Excluding the base header. 177
  • 178. FORMAT DESCRIPTION Description - 2 • Next header: 8 bits field defining the header that follows the base header in the datagram. • Hop limit: 8-bit hop limit field serves the same purpose as the TTL field in IPv4. • Source address: 128-bits ( 16-byte) and denotes internet address of original source host of the datagram. • Destination address: It is also of 128 bits and denotes the internet address of final destination of the datagram. 178
  • 179. IPV4 VS IPV6 • Key Comparison Feature 179
  • 180. SUMMARY Lecture-15 : Internet Protocol-IPV6 Q.1 What is IPV6? Q.2 What are the components of IPV6? Q.3 What is the format of IPv6? Q.4 What is the IPV6 header format? Q.5 Comparison between IPV4 and IPV6 180
  • 181. ACTIVITY Lecture-15: Internet Protocol-IPV6 Reading : Types of IPV6 Addressing http://www.steves-internet-guide.com/ipv6-guide/ 181
  • 183. LECTURE – 16 Objectives Network Address Protocol Network Address Translation Internet control message protocol Dynamic Host configuration Recap • Internet Protocol V6 • IPV6 Address structure • IPV6 header Format • Comparison between IPV4 & IPV6 IP supporting Protocols 183
  • 184. NETWORK ADDRESS TRANSLATION Concept 1. Service used in routers. 2. Over come IPV4 address shortage. 3. Method/process of remapping local IP address to Global IP address and vice versa 4. Translating public IP address to private IP address and vice versa 184
  • 186. ADDRESS RESOLUTION PROTOCOL Concept 1. Function: to translate Logical address to physical address. 2. Mapping: IP address to MAC address 3. Layer 2 protocol 186
  • 188. WHY ICMP? Concept IP Limitation: 1.Error reporting or correcting mechanism. 2.No management of queries 188
  • 189. IP SUPPORTING PROTCOLS • Network layer protocols ICMP,IGMP IP ARP,RA RP 189
  • 190. INTERNET CONTROL MESSAGE PROTOCOL Concept 1. It is a network layer protocol 2. It reports errors and provides information related to IP packet processing. 3. Error example : that a requested service is not available or that a host isn’t reachable. 4. Tool : ping or traceout 190
  • 192. DYNAMIC HOST CONFIGURATION PROTOCOL Concept 1. Application layer protocol. 2. Over the issues of manual IP configuration. 3. It allows the host to obtain an IP address automatically. 4. Also refferred as : plug-and-play protocol. 5. Mechanism: DORA - Discover, Offer, Request, Ack 192
  • 194. SUMMARY Lecture-16 : IP supporting Protocols Q.1 What is NAT? Q.2 What is public IP address & private IP address? Q.3 What is ARP? Q.4 What is ICMP? Q.5 What is DHCP? 194
  • 195. ACTIVITY Lecture-16: IP supporting Protocols Reading: ARP https://www.youtube.com/watch?v=zTWa2Pqlgp0 DHCP https://www.youtube.com/watch?v=IUOVSIKj6GU 195
  • 197. 197
  • 198. 198
  • 199. 199
  • 200. 200
  • 201. 201
  • 202. 202
  • 203. 203
  • 204.
  • 205.
  • 206. Icons Architecture Commerce Legal Studies Arts & Humanities Performing Arts Management Studies Science & Tech Engineering

Editor's Notes

  1. Ref: https://www.ccnablog.com
  2. Implementation of service…!!!
  3. Other Service model: CBR & ABR.
  4. => And also Flexibility.
  5. Ref: https://en.wikipedia.org/wiki/Data_networking , https://en.wikipedia.org/wiki/Quality_of_service, https://en.wikipedia.org/wiki/Queueing_theory
  6. Note : The main focus of congestion control and Qos is data traffic
  7. Configure:Subnet Mask, Router Address, DNS Address, Vendor Class.