SlideShare a Scribd company logo
COMPUTER NETWORKSCOMPUTER NETWORKS
CS610
Lecture-16
Hammad Khalid Khan
Review Lecture 15
 Wide Area Networks
 Packet Switches
 Physical Addressing in a WAN
 Store and Forward
 Next Hop Forwarding
Choosing Next Hop
 Packet switch doesn't keep complete information about all
possible destination
 Just keeps next hop
 So, for each packet, packet switch looks up destination in
table and forwards through connection to next hop
Choosing Next Hop
Source Independence
 Next hop to destination does not depend on source of packet,
called Source Independence
 Allows fast, efficient routing
 Packet switch need not have complete information, just next
hop
– Reduces total information
– Increases dynamic robustness - network can continue to
function even if topology changes without notifying entire
network
Hierarchical Addressing and
Routing
The Process of forwarding the packets from one hop to
the next is known as Routing
Hierarchical Addressing and
Routing
Hierarchical Addressing and
Routing
 In particular, all destinations on same switch have same next
hop
 Thus, routing table can be collapsed:
Routing in a WAN
 More computers == more traffic
 Can add capacity to WAN by adding more links and packet
switches
 Packet switches need not have computers attached
 Interior switch - No attached computers
 Exterior switch - Attached computers
Routing in a WAN
 Both Interior and Exterior switches:
– Forward Packets
– Need Routing Tables
 Must have:
– Universal Routing - Next hop for each possible destination
– Optimal Routes - Next hop in table must be on shortest
path to destination

Modeling a WAN
 Use a graph:
– Nodes model switches
– Edges model direct connections between switches
 Captures essence of network, ignoring attached computers
Modeling a WAN
Route Computation with a Graph
 Can represent routing table with edges:
 Graph algorithms can be applied to find routes
Redundant Routing Information
 Notice duplication of information in routing table for node 1:
 Switch 1 has only one outgoing connection; all traffic must
traverse that connection
Default Routes
 Can collapse routing table entries with a Default Route
 If destination does not have an explicit routing table entry,
use the default route:
Default Routes
Summary
 Source Independence
 Hierarchical Addressing and Routing
 Routing in a WAN
 Default Routes

More Related Content

What's hot

Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
Rahul P
 
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
Rangaprasad Sampath
 
How Computer network Works?
How Computer network Works?How Computer network Works?
How Computer network Works?
priyavanimurugarajan
 
Lecture 04 networking
Lecture 04 networkingLecture 04 networking
Lecture 04 networking
HNDE Labuduwa Galle
 
Network switch
Network switchNetwork switch
Network switch
Tapan Khilar
 
Day 2.1 lan segmentation
Day 2.1 lan segmentationDay 2.1 lan segmentation
Day 2.1 lan segmentation
CYBERINTELLIGENTS
 
Network switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegeNetwork switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom college
jackmakani
 
Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)
Fleurati
 
3 Osi Architecture
3 Osi Architecture3 Osi Architecture
3 Osi Architecture
Ram Dutt Shukla
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layer
Sendhil Kumar
 
CN_Lec 8_Switching_Circuit
CN_Lec 8_Switching_CircuitCN_Lec 8_Switching_Circuit
CN_Lec 8_Switching_Circuit
Rijutha Kumar
 
Op Manager
Op ManagerOp Manager
Op Manageranti
 
Internet Protocol Routing
Internet Protocol RoutingInternet Protocol Routing
Internet Protocol RoutingMahmoud Hikmet
 

What's hot (19)

Lecture10
Lecture10Lecture10
Lecture10
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
Route Stability Prediction Using Machine Learning Modelling of Route Table Fe...
 
Network devices
Network devicesNetwork devices
Network devices
 
How Computer network Works?
How Computer network Works?How Computer network Works?
How Computer network Works?
 
Lecture 04 networking
Lecture 04 networkingLecture 04 networking
Lecture 04 networking
 
Theo's slides
Theo's slidesTheo's slides
Theo's slides
 
routing
routingrouting
routing
 
Network switch
Network switchNetwork switch
Network switch
 
Day 2.1 lan segmentation
Day 2.1 lan segmentationDay 2.1 lan segmentation
Day 2.1 lan segmentation
 
Network switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegeNetwork switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom college
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)
 
3 Osi Architecture
3 Osi Architecture3 Osi Architecture
3 Osi Architecture
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layer
 
CN_Lec 8_Switching_Circuit
CN_Lec 8_Switching_CircuitCN_Lec 8_Switching_Circuit
CN_Lec 8_Switching_Circuit
 
Op Manager
Op ManagerOp Manager
Op Manager
 
Internet Protocol Routing
Internet Protocol RoutingInternet Protocol Routing
Internet Protocol Routing
 

Viewers also liked

Fdfs for cnblogs 1th
Fdfs for cnblogs 1thFdfs for cnblogs 1th
Fdfs for cnblogs 1th
kevin zhang
 
モバイルとビッグデータで加速する公共交通の情報化
モバイルとビッグデータで加速する公共交通の情報化モバイルとビッグデータで加速する公共交通の情報化
モバイルとビッグデータで加速する公共交通の情報化
Masaki Ito
 
ビッグデータがもたらすバス利用者向けサービスの未来像
ビッグデータがもたらすバス利用者向けサービスの未来像ビッグデータがもたらすバス利用者向けサービスの未来像
ビッグデータがもたらすバス利用者向けサービスの未来像
Masaki Ito
 
ABC and Risk Management PUG Seminar 10 Juni 2010 V1.2
ABC and Risk Management PUG Seminar 10 Juni 2010 V1.2ABC and Risk Management PUG Seminar 10 Juni 2010 V1.2
ABC and Risk Management PUG Seminar 10 Juni 2010 V1.2
Douweb
 
20111227gakuto presentation
20111227gakuto presentation20111227gakuto presentation
20111227gakuto presentation
Fukuji Imai
 
成和文化研究プロジェクト 茨城
成和文化研究プロジェクト 茨城成和文化研究プロジェクト 茨城
成和文化研究プロジェクト 茨城Takayuki Hatada
 
Calculator Sederhana Delphi
Calculator Sederhana DelphiCalculator Sederhana Delphi
Calculator Sederhana DelphiPrima Wisesa
 
Mtek dax turn_around_team_websiteDAX, Dynamics AX, Dynamics 4.0, Microsoft Dy...
Mtek dax turn_around_team_websiteDAX, Dynamics AX, Dynamics 4.0, Microsoft Dy...Mtek dax turn_around_team_websiteDAX, Dynamics AX, Dynamics 4.0, Microsoft Dy...
Mtek dax turn_around_team_websiteDAX, Dynamics AX, Dynamics 4.0, Microsoft Dy...
davidcosgrove
 
La noticia de hoy 13 11 2011
La noticia de hoy  13 11 2011La noticia de hoy  13 11 2011
La noticia de hoy 13 11 2011megaradioexpress
 
Couch DB in 15minutes
Couch DB in 15minutesCouch DB in 15minutes
Couch DB in 15minutes
Yohei Sasaki
 
サービス作る系」のVision
サービス作る系」のVisionサービス作る系」のVision
サービス作る系」のVisiongenroku
 
EXCURSIÓN A MANZANARES DEL REAL
EXCURSIÓN A MANZANARES DEL REALEXCURSIÓN A MANZANARES DEL REAL
EXCURSIÓN A MANZANARES DEL REAL
patricia.aguilar
 
云内容管理
云内容管理云内容管理
云内容管理panjunyong
 
図書館総合展2011俺カジチーム発表スライド
図書館総合展2011俺カジチーム発表スライド図書館総合展2011俺カジチーム発表スライド
図書館総合展2011俺カジチーム発表スライドSTUDIO POT SD Inc.
 
2009 unicef open everything nyc
2009 unicef open everything nyc2009 unicef open everything nyc
2009 unicef open everything nyc
Robert David Steele Vivas
 
WxHaskell
WxHaskellWxHaskell
WxHaskell
ina job
 
Dear tim-hope-group
Dear tim-hope-groupDear tim-hope-group
Dear tim-hope-groupjimlarsen
 
Menú
MenúMenú
Menúseo
 

Viewers also liked (20)

Fdfs for cnblogs 1th
Fdfs for cnblogs 1thFdfs for cnblogs 1th
Fdfs for cnblogs 1th
 
モバイルとビッグデータで加速する公共交通の情報化
モバイルとビッグデータで加速する公共交通の情報化モバイルとビッグデータで加速する公共交通の情報化
モバイルとビッグデータで加速する公共交通の情報化
 
ビッグデータがもたらすバス利用者向けサービスの未来像
ビッグデータがもたらすバス利用者向けサービスの未来像ビッグデータがもたらすバス利用者向けサービスの未来像
ビッグデータがもたらすバス利用者向けサービスの未来像
 
ABC and Risk Management PUG Seminar 10 Juni 2010 V1.2
ABC and Risk Management PUG Seminar 10 Juni 2010 V1.2ABC and Risk Management PUG Seminar 10 Juni 2010 V1.2
ABC and Risk Management PUG Seminar 10 Juni 2010 V1.2
 
20111227gakuto presentation
20111227gakuto presentation20111227gakuto presentation
20111227gakuto presentation
 
成和文化研究プロジェクト 茨城
成和文化研究プロジェクト 茨城成和文化研究プロジェクト 茨城
成和文化研究プロジェクト 茨城
 
Calculator Sederhana Delphi
Calculator Sederhana DelphiCalculator Sederhana Delphi
Calculator Sederhana Delphi
 
Diagnostic odoc
Diagnostic odocDiagnostic odoc
Diagnostic odoc
 
Mtek dax turn_around_team_websiteDAX, Dynamics AX, Dynamics 4.0, Microsoft Dy...
Mtek dax turn_around_team_websiteDAX, Dynamics AX, Dynamics 4.0, Microsoft Dy...Mtek dax turn_around_team_websiteDAX, Dynamics AX, Dynamics 4.0, Microsoft Dy...
Mtek dax turn_around_team_websiteDAX, Dynamics AX, Dynamics 4.0, Microsoft Dy...
 
La noticia de hoy 13 11 2011
La noticia de hoy  13 11 2011La noticia de hoy  13 11 2011
La noticia de hoy 13 11 2011
 
Couch DB in 15minutes
Couch DB in 15minutesCouch DB in 15minutes
Couch DB in 15minutes
 
サービス作る系」のVision
サービス作る系」のVisionサービス作る系」のVision
サービス作る系」のVision
 
Cap16
Cap16Cap16
Cap16
 
EXCURSIÓN A MANZANARES DEL REAL
EXCURSIÓN A MANZANARES DEL REALEXCURSIÓN A MANZANARES DEL REAL
EXCURSIÓN A MANZANARES DEL REAL
 
云内容管理
云内容管理云内容管理
云内容管理
 
図書館総合展2011俺カジチーム発表スライド
図書館総合展2011俺カジチーム発表スライド図書館総合展2011俺カジチーム発表スライド
図書館総合展2011俺カジチーム発表スライド
 
2009 unicef open everything nyc
2009 unicef open everything nyc2009 unicef open everything nyc
2009 unicef open everything nyc
 
WxHaskell
WxHaskellWxHaskell
WxHaskell
 
Dear tim-hope-group
Dear tim-hope-groupDear tim-hope-group
Dear tim-hope-group
 
Menú
MenúMenú
Menú
 

Similar to Cn lec-08

Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
Roshan Karunarathna
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
Haripritha
 
CN WEEK 11.pdf
CN WEEK 11.pdfCN WEEK 11.pdf
CN WEEK 11.pdf
ssuser06fbd31
 
Interior Routing Protocols Chapter 15
Interior Routing Protocols Chapter 15Interior Routing Protocols Chapter 15
Interior Routing Protocols Chapter 15
daniel ayalew
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
Munnakumar518378
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
Nishant Munjal
 
An Insight on Routing
An Insight on RoutingAn Insight on Routing
An Insight on Routing
E-Lins Technology Co. Ltd.
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
sazia7
 
Interconnecting devies
Interconnecting deviesInterconnecting devies
Interconnecting devies
SARAVANAN GOPALAKRISHNAN
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
dada827350
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
mrcopyxerox
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
ngusyirga
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
GirT2
 
network hardware
network hardwarenetwork hardware
network hardware
tumetr1
 

Similar to Cn lec-08 (20)

Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
 
Notes
NotesNotes
Notes
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
CN WEEK 11.pdf
CN WEEK 11.pdfCN WEEK 11.pdf
CN WEEK 11.pdf
 
Interior Routing Protocols Chapter 15
Interior Routing Protocols Chapter 15Interior Routing Protocols Chapter 15
Interior Routing Protocols Chapter 15
 
Routing
RoutingRouting
Routing
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
An Insight on Routing
An Insight on RoutingAn Insight on Routing
An Insight on Routing
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
Routing
RoutingRouting
Routing
 
Interconnecting devies
Interconnecting deviesInterconnecting devies
Interconnecting devies
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
 
network hardware
network hardwarenetwork hardware
network hardware
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Cn lec-08

  • 2. Review Lecture 15  Wide Area Networks  Packet Switches  Physical Addressing in a WAN  Store and Forward  Next Hop Forwarding
  • 3. Choosing Next Hop  Packet switch doesn't keep complete information about all possible destination  Just keeps next hop  So, for each packet, packet switch looks up destination in table and forwards through connection to next hop
  • 5. Source Independence  Next hop to destination does not depend on source of packet, called Source Independence  Allows fast, efficient routing  Packet switch need not have complete information, just next hop – Reduces total information – Increases dynamic robustness - network can continue to function even if topology changes without notifying entire network
  • 6. Hierarchical Addressing and Routing The Process of forwarding the packets from one hop to the next is known as Routing
  • 8. Hierarchical Addressing and Routing  In particular, all destinations on same switch have same next hop  Thus, routing table can be collapsed:
  • 9. Routing in a WAN  More computers == more traffic  Can add capacity to WAN by adding more links and packet switches  Packet switches need not have computers attached  Interior switch - No attached computers  Exterior switch - Attached computers
  • 10. Routing in a WAN  Both Interior and Exterior switches: – Forward Packets – Need Routing Tables  Must have: – Universal Routing - Next hop for each possible destination – Optimal Routes - Next hop in table must be on shortest path to destination 
  • 11. Modeling a WAN  Use a graph: – Nodes model switches – Edges model direct connections between switches  Captures essence of network, ignoring attached computers
  • 13. Route Computation with a Graph  Can represent routing table with edges:  Graph algorithms can be applied to find routes
  • 14. Redundant Routing Information  Notice duplication of information in routing table for node 1:  Switch 1 has only one outgoing connection; all traffic must traverse that connection
  • 15. Default Routes  Can collapse routing table entries with a Default Route  If destination does not have an explicit routing table entry, use the default route:
  • 17. Summary  Source Independence  Hierarchical Addressing and Routing  Routing in a WAN  Default Routes