SlideShare a Scribd company logo
1 of 63
Network Layer, Switched WAN 
Deepak John 
SJCET-Pala
Network Layer
functions 
 Providing Services to Transport Layer: Network layer provides services to transport layer at 
the network layer/transport layer interface. 
 Routing: Implements routing of frames (packets) through the network. Defines the most 
optimum path the packet should take from the source to the destination. 
 Congestion Control
Implementation 
 2 packet switching techniques are used: 
i. Datagrams 
ii. Virtual Circuits 
 2 types of services are provided to the transport layer: 
i. Connectionless Service: Sender and receiver treat each transmitted message as an 
independent unit 
ii. Connection-oriented Service: Sender and receiver see data as traveling on a logical 
connection. Receiver receives data in the same order in which they are transmitted. 
 Connectionless service and connection-oriented service can be reliable or unreliable 
 Reliable = Delivery of all data is ensured. The receiver acknowledges data and sender 
retransmits data that was not received 
 Unreliable = No acknowledgments or retransmission of data
Datagram 
 Each packet is routed independently
1 
3 2 
0111 
value in arriving 
packet’s header 
routing algorithm 
local forwarding table 
header value output link 
0100 
0101 
0111 
1001 
3 
2 
2 
1 
Datagram forwarding table
Advantages 
 connectionless 
Disadvantages 
 Every switch/router knows about every destination 
 Potentially huge tables 
 Need routing protocol to fill table
Virtual Circuit 
 All packets of a VC follow the same route. 
 every router on source-dest path maintains “state” 
for each passing connection. 
 consists of: 
1. Path from source to destination 
2. VC numbers, one number for each link along 
path 
3. Entries in forwarding tables in routers along 
path
Advantages 
 Efficient lookup (simple table lookup)/ 
 Can reserve bandwidth at connection setup 
 easier for hardware implementations 
Disadvantages 
 need route connection setup request. 
 More complex failure recovery – must recreate connection state
Connectionless Service 
 Each packet is transmitted independently
Connection-oriented Service 
 Logical connection is established
ROUTING
Routing 
 One of the important functions of the network layer is to route the packets from source 
machine to destination machine 
 The network layer at the source creates a packet from the data coming from transport layer 
 The header of the packet contains, the logical addresses of the source and destination 
 The network layer is responsible for checking its routing table to find the routing 
information. 
 The network layer at the destination is responsible for address verification 
 It makes sure that the destination address on the packet is the same as the address of the 
host. 
 If the packet is a fragment, the network layer waits until all fragments have arrived, 
 It then reassembles them and delivers the reassembled packet to the transport layer.
Performance Criteria 
 The selection of a route is generally based on some performance criterion. 
 The simplest criterion is to choose the minimum-hop route 
 a cost is associated with each link 
 And, for any pair of attached stations, the route through the network that accumulates the 
least cost is to be selected(highest throughput and minimum delay).
 Routing algorithm:: that part of the Network Layer responsible for deciding on which output 
line to transmit an incoming packet. 
 Properties: Correctness, Simplicity, Robustness, Stability ,Fairness and Optimality 
 Routing strategies 
Four key strategies are: 
1. Fixed routing 
2. Flooding 
3. Random routing 
4. Adaptive routing
Fixed routing 
 A single, permanent route is configured for each source-destination pair of nodes in the 
network. 
 To implement fixed routing A central routing matrix is created, to be stored at a network 
control centre. 
 The matrix shows, for each source-destination pair of nodes, the identity of the next node on 
the route. 
 There is no difference between routing for datagrams and virtual circuits. 
 All packets from a given source to a given destination follow the same route 
 The advantage of fixed routing is its simplicity and disadvantage is its lack of flexibility
Fixed Routing Tables
Flooding 
 No network info required 
 Packet sent by node to every neighbor 
 Incoming packets retransmitted on every link except incoming link 
 Eventually a number of copies will arrive at destination 
 Each packet is uniquely numbered so duplicates can be discarded 
 Nodes can remember packets already forwarded to keep network load in bounds 
 One problem with this method is that packets may go in a loop 
 A simpler technique is to include a hop count field with each packet 
 The count can originally be set to some maximum value. 
 Each time a node passes on a packet, it decrements the count by one 
 When the count reaches zero, the packet is discarded
 The flooding technique has three remarkable properties: 
 All possible routes between source and destination are tried. So a packet will always get 
through if at least one path between source and destination exists. 
 Because all routes are tried, at least one copy of the packet to arrive at the destination will 
have used a minimum-hop route. 
 All nodes that are directly or indirectly connected to the source node are visited 
 The principal disadvantage of flooding is the high traffic load that it generates, which is 
directly proportional to the connectivity of the network.
Random Routing 
 A node selects only one outgoing path for retransmission of an incoming packet 
 The outgoing link is chosen at random or round robin fashion, excluding the link on which 
the packet arrived. 
 A refinement of this technique is to assign a probability to each outgoing link and to select 
the link based on that probability 
 The probability could be based on data rate, in which case we have
Adaptive Routing 
 Used by almost all packet switching networks. 
 Adaptive routing is the process of locating a clear path from a source to destination across a 
network of nodes that could change at any point. 
 It ensure that data packets can move from one point in the network to another, even if the 
one or more nodes in between are unavailable. 
 Requires information about the network, which will be updated from time to time to enable 
the routing decision to adapt to changing conditions. 
 Routing decisions change as conditions on the network change 
 Failure 
 Congestion
 There are several drawbacks associated with the use of adaptive routing: 
 Routing decisions more complex 
 Reacting too quickly can cause congestion 
 A convenient way to classify adaptive routing strategies is on the basis of information source: 
 local 
 adjacent nodes 
 all nodes 
 adaptive strategies can be either distributed or centralized 
 In the distributed case, each node exchanges delay information with other nodes. Based on 
incoming information, a node tries to estimate the delay situation throughout the network, and 
applies a least-cost routing algorithm 
 In the centralized case, each node reports its link delay status to a central node, which designs 
routes based on this incoming information and sends the routing information back to the nodes
CONGESTION CONTROL
Congestion control 
 An important issue in a packet-switched network is congestion 
 Congestion occurs when the number of packets being transmitted through a network begins 
to approach the packet-handling capacity of the network 
 Congestion will lead to a large queue length, which results in buffer overflow and loss of 
packets 
 The objective of congestion control is to maintain the number of packets within the network 
below the level at which performance falls off dramatically. 
 congestion affects vital parameters of the network performance .. 
1. Through put 
2. Delay
Effects of 
Congestion
Causes of Congestion 
 Congestion in a network or internetwork occurs because routers and switches have buffers 
that hold the packets before and after processing 
 A router has an input queue and an output queue for each interface. If the rate of packet 
arrival is higher than the packet processing rate, the input queues become longer and longer. 
 If the packet departure rate is less than the packet processing rate, the output queues become 
longer and longer.
Congestion Control Techniques 
 Congestion control refers to the techniques and mechanisms which can prevent congestion 
from happening or remove congestion after it has taken place 
 divided into two categories 
1. Open loop: prevent or avoid congestion by ensuring that the system never enters a Congested 
State. 
2. Close loop: allow system to enter congested state, detect it, and remove it.
Open-loop Congestion Control 
 In open-loop congestion control, policies are applied to prevent congestion before it happens 
 Congestion control is handled by either the source or the destination 
 List of policies that can prevent congestion are: 
 Retransmission Policy 
 Window Policy 
 Acknowledgment Policy 
 Discarding Policy 
 Admission Policy 
1. Retransmission policy 
 Retransmission in general may increase congestion in the network 
 The retransmission policy and the retransmission timers must be designed to optimize 
efficiency and at the same time prevent congestion.
2.Window Policy 
 The type of window at the sender may also affect congestion 
 The Selective Repeat window is better than the Go-Back-N window for congestion control. 
3. Acknowledgement Policy 
 If the receiver does not acknowledge every packet it receives, it may slow down the sender 
and help prevent congestion. 
Several approaches are used in this case: 
 A receiver may send an acknowledgment only if a special timer expires. 
 A receiver may decide to acknowledge only N packets at a time. 
4. Discarding policy 
 A good discarding policy by the routers may prevent congestion and at the same time may 
not harm the integrity of the transmission.
5. Admission Policy 
 An admission policy, which is a quality-of-service mechanism, can also prevent congestion 
in virtual-circuit networks 
 Routers first check the resource requirement of a flow before admitting it to the network 
 A router can deny establishing a virtual circuit connection if there is congestion in the 
network or if there is a possibility of future congestion.
Closed-Loop Congestion Control 
 Closed-loop congestion control mechanisms try to alleviate congestion after it happens. 
 Few of the mechanisms used are 
 Backpressure 
 Choke Packet 
 Implicit Signalling 
 Explicit Signalling
Backpressure 
 Backpressure is a node-to-node congestion control that starts with a node and propagates, in 
the opposite direction of data flow, to the source. 
 This technique can be applied only to virtual circuit networks, in which each node knows the 
upstream node from which a flow of data is coming
Choke packets 
 A choke packet(warning) is a packet sent by a node , which has encountered congestion, to 
the source station directly to inform it of congestion.
Implicit Signaling 
 There is no communication between the congested node or nodes and the source 
 The source guesses that there is a congestion somewhere in the network from other symptoms 
 For example, when a source sends several packets and there is no acknowledgment for a 
while, one assumption is that the network is congested 
 The delay in receiving an acknowledgment is interpreted as congestion in the network; the 
source should slow down.
Explicit Signaling 
 The node that experiences congestion can explicitly send a signal to the source or destination. 
 can occur in either the forward or the backward direction. 
Backward Signaling 
 A bit can be set in a packet moving in the direction opposite to the congestion 
 This bit can warn the source that there is congestion and that it needs to slow down to avoid 
the discarding of packets. 
Forward Signaling 
 A bit can be set in a packet moving in the direction of the congestion. 
 This bit can warn the destination that there is congestion. 
 The receiver in this case can use policies, such as slowing down the acknowledgments, to 
alleviate the congestion.
SWITCHED WAN
3.3 Switched WANs 
Switched WAN 
 Two different technologies are used in wide area switched networks: circuit switching and 
packet switching. 
 The backbone networks in the Internet are usually switchedWANs. 
 A switched WAN is a wide area network that covers a large area (a state or a country) and 
provides access at several points to the users. 
 Inside the network, there is a mesh of point-to-point networks that connects switches. 
Wide area network and switching methods
VIRTUAL CIRCUIT SWITCHING 
 It is a packet switching methodology where a pre planned route is established and all the 
packets between a pair of communicating parties follow this same route through the network. 
 Each packet contains a virtual circuit identifier as well as data. 
 The switching or routing in a virtual-circuit network is based on the virtual circuit identifier, It 
determines the next link along the path. 
 The table associated with switch contains four pieces of information specific to a virtual circuit: 
input port, input virtual circuit number, output port, and output virtual circuit number 
 When a packet arrives at a switch in a virtual circuit network, the pair (input port, input VCI) 
can uniquely determined how the packet is to be routed 
 A transmitted packet is buffered at each node.
VIRTUAL CIRCUIT SWITCHING
ADDRESSING 
 In a virtual-circuit network, two types of addressing are involved: global and local (virtual-circuit 
identifier). 
Global Addressing: 
 A source or a destination needs to have a global address-that can be unique in the network. 
Virtual-Circuit Identifier: 
 It is an identifier that is actually used for data transfer 
 Unlike a global address, it is a small number that has only switch scope. 
 It is used by a packet between two switches. When a packet arrives at a switch, it has a VCI; 
when it leaves, it has a different VCl.
VCI Phases 
 A source and destination need to go through three phases in a virtual-circuit network: 
1. Setup 
2. Data transfer 
3. Teardown
1.Setup phase 
 a switch creates an entry for a virtual 
circuit. 
 Two steps are required for this: 
 Setup Request 
 Acknowledgment 
 A setup request frame is sent from 
the source to the destination. 
Setup Request
Steps in Setup Request 
1. Source A sends a setup frame to switch 1. 
2. Switch 1 receives the setup request frame. It knows the output port through which the frame 
will proceed. 
3. The switch creates an entry in its table for this virtual circuit, ie. It enters value of the input 
port, input VCI and output port. 
4. The frame is forwarded to the switch 2 through the specific output port. 
5. The same process repeats at switch 2 and switch 3. 
6. Destination B receives the setup frame, and if it is ready to receive frames from A, it assigns 
a VCI to the incoming frames that come from A.
Acknowledgment 
 acknowledgment frame, completes the entries in the switching tables 
 The destination sends an acknowledgment to switch 3. 
 The acknowledgment carries the global source and destination addresses so the switch knows 
which entry in the table is to be completed. 
 The frame also carries VCI chosen by the destination as the incoming VCI for frames from A 
 Switch 3 uses this VCI to complete the outgoing VCI column for this entry. 
 Switch 3 sends an acknowledgment to switch 2 that contains its incoming VCI in the table 
 Switch 2 uses this as the outgoing VCI in the table. 
 The above mentioned procedure is repeated for switch 2 and the table is filled 
 Finally switch 1 sends an acknowledgment to source A that contains its incoming VCI in the 
table, chosen in the previous step. 
 The source uses this as the outgoing VCI for the data frames to be sent to destination B.
Acknowledgment
2.Data transfer phase 
 To transfer a frame from a 
source to its destination, all 
switches need to have a table 
entry for this virtual circuit 
 The source sends a packet with 
VCI attached to the switch 1. 
 Switch 1 consults it table and 
find the specific output port 
and output VCI. 
 The data transfer phase is 
active until the source sends all 
its frames to the destination.
3.Tear down phase 
 In this phase, source A, after sending all frames to B, sends a special frame called a 
teardown request. 
 Destination B responds with a teardown confirmation frame. 
 All switches delete the corresponding entry from their tables.
Classification of Virtual Circuits 
 Two types of virtual circuits exist: 
 Permanent Virtual Circuits (PVC) 
 Switched Virtual Circuits (SVC)
Permanent virtual circuit (PVC) 
established as an option to provide a dedicated circuit link between two facilities. 
the connection setup is simple. 
table entry is recorded for all switches by the administrator. 
The administrator determines a complete path from source to destination. 
A connection is created from one source to one single destination. 
 If a source needs connections with several destinations, it needs a PVC for each 
connection. 
It can established for repeated/continuous use between the same source & 
destination and eliminate the need for repeated connection set-up and clearing.
Switched Virtual Circuit SVC 
 SVC creates a temporary, short connection that exists only when data are being 
transferred between source and destination. 
 SVC requires a connection setup phase. 
 First you need to establish a connection between the required source and 
destination 
 After that data is transferred 
 Once data transfer is completed the connection is removed
X.25
X.25 
 is a packet switched technology used inWide Area Networks 
 designed to operate effectively regardless of the type of systems connected to the 
network. 
 It defines standard for establishing, maintaining and terminating connections 
between devices. 
 X.25 network devices fall into three general categories: 
 Data terminal equipment (DTE). 
 Data circuit-terminating equipment (DCE). 
 Packet switching exchange (PSE). 
 an interface between DTE and DCE
 DTE devices are end systems that communicate across the X.25 network 
 DCE devices are communications devices such as modems and packet switches; 
provide the interface between DTE devices and a PSE. 
 PSE is a switch in x.25 WAN network located at the vendor’s site.The customer’s 
DCE is connected to a vendor’s PSE through a high speed tele-communication 
line.
 Layers 
Physical layer 
 deals with the physical interface between a station (computer, terminal) and a 
packet-switching node. 
 specifies the physical, electrical, functional and procedural characteristics to 
control the physical link between a DTE and a DCE
 X.21bis is a physical layer protocol used in X.25 that defines the electrical and 
mechanical procedures for using the physical medium. 
 X.21bis handles the activation and deactivation of the physical medium 
connecting to DTE and DCE devices. 
 It supports point-to-point and synchronous connections, full-duplex transmission 
over four-wire media
Link layer 
 ensures reliable transfer of data between the DTE and DCE by transmitting data 
as a sequence of frames. 
 The functions performed by link layer include 
Transfer of data in an efficient and timely manner 
Synchronization with the receiver and transmitter 
Detection of transmission errors and recovery from such errors 
Identification and reporting of procedural errors to higher levels for recovery.
Link Access Protocol Balanced 
 is a data link layer protocol that manages communication and framing between 
DTE and DCE devices 
 It is a bit-oriented protocol that ensures that frames are correctly ordered and 
error-free.
Packet Layer 
 Responsible for creating a virtual circuit between two DTEs. 
 make up a packet that include a header and user data. 
 Functions performed by packet Layer are: 
 Establishing Connection 
 Transferring data 
 Terminating a connection 
 With the help of X.25 packet layer, data are transmitted in 
packets over external virtual circuits
Packet Layer Protocol(PLP ) 
 network layer Protocol which manages the packet exchange between DTE 
devices . 
 It runs in 5 different modes 
1. Call Setup 
 used to establish switched virtual circuits between DTE devices. 
 Uses SVC 
2. Data transfer 
 used for transferring data b/w two DTE devices across a virtual circuit. 
 In this mode PLP handles segmentation & reassembly, bit padding and flow & 
error control
3. Idle Mode 
 used when a virtual circuit is established, but data transfer is not occurring. 
 used only with SVCs. 
4. Call Clearing Mode 
 Used to end communication sessions between DTE devices and is used only 
with SVCs. 
5. Restarting Mode 
 used to synchronize transmission b/w a DTE device and a locally connected 
DCE device
 PLP packet fields 
i. General Format Identifier (GFI) 
 Identifies packet parameters(whether the packet carries user data or control 
information, kind of windowing used, etc) 
ii. Logical Channel Identifier (LCI) 
 Identifies the virtual circuit across the local DTE/DCE interface.
iii. Packet Type Identifier (PTI) 
Identifies the packet types. 
iv. User Data 
Contains encapsulated upper-layer information. This field is present only in data 
packets

More Related Content

What's hot

Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and materialSDMCET DHARWAD
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp windowpriya Nithya
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)ymghorpade
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switchingDr Rajiv Srivastava
 
Manchester & Differential Manchester encoding scheme
Manchester & Differential Manchester encoding schemeManchester & Differential Manchester encoding scheme
Manchester & Differential Manchester encoding schemeArunabha Saha
 
Information and network security 8 security mechanisms
Information and network security 8 security mechanismsInformation and network security 8 security mechanisms
Information and network security 8 security mechanismsVaibhav Khanna
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 

What's hot (20)

Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp window
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Manchester & Differential Manchester encoding scheme
Manchester & Differential Manchester encoding schemeManchester & Differential Manchester encoding scheme
Manchester & Differential Manchester encoding scheme
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Information and network security 8 security mechanisms
Information and network security 8 security mechanismsInformation and network security 8 security mechanisms
Information and network security 8 security mechanisms
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 

Viewers also liked

Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static RoutingYaser Rahmati
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routingphanleson
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 

Viewers also liked (6)

Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 
Routing
RoutingRouting
Routing
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 

Similar to Computer networks network layer,routing

Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
switching techniques
switching techniques switching techniques
switching techniques ziaulhaq96
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxBHAVYPATEL34
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Mugabo4
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1Hossam El-Deen Osama
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector RoutingShouvikDhali
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptanushaj46
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
CSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxCSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxNoraNjepuome3
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
CCN Unit-4 Network Layer by Dr. K. Adisesha
CCN Unit-4 Network Layer by Dr. K. AdiseshaCCN Unit-4 Network Layer by Dr. K. Adisesha
CCN Unit-4 Network Layer by Dr. K. AdiseshaProf. Dr. K. Adisesha
 

Similar to Computer networks network layer,routing (20)

Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
switching techniques
switching techniques switching techniques
switching techniques
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
 
CSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxCSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptx
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
CCN Unit-4 Network Layer by Dr. K. Adisesha
CCN Unit-4 Network Layer by Dr. K. AdiseshaCCN Unit-4 Network Layer by Dr. K. Adisesha
CCN Unit-4 Network Layer by Dr. K. Adisesha
 

More from Deepak John

Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fiDeepak John
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentationDeepak John
 
Information management
Information managementInformation management
Information managementDeepak John
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendarDeepak John
 
Module 2 instruction set
Module 2 instruction set Module 2 instruction set
Module 2 instruction set Deepak John
 
introduction to computers
 introduction to computers introduction to computers
introduction to computersDeepak John
 
Registers and counters
Registers and counters Registers and counters
Registers and counters Deepak John
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4Deepak John
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer securityDeepak John
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-Deepak John
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3Deepak John
 
Module 4 registers and counters
Module 4 registers and counters Module 4 registers and counters
Module 4 registers and counters Deepak John
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer securityDeepak John
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2Deepak John
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1Deepak John
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer securityDeepak John
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logicDeepak John
 
Module 2 logic gates
Module 2  logic gatesModule 2  logic gates
Module 2 logic gatesDeepak John
 

More from Deepak John (20)

Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fi
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentation
 
Information management
Information managementInformation management
Information management
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendar
 
Module 1 8086
Module 1 8086Module 1 8086
Module 1 8086
 
Module 2 instruction set
Module 2 instruction set Module 2 instruction set
Module 2 instruction set
 
introduction to computers
 introduction to computers introduction to computers
introduction to computers
 
Registers and counters
Registers and counters Registers and counters
Registers and counters
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer security
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3
 
Module 4 registers and counters
Module 4 registers and counters Module 4 registers and counters
Module 4 registers and counters
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer security
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logic
 
Module 2 logic gates
Module 2  logic gatesModule 2  logic gates
Module 2 logic gates
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Computer networks network layer,routing

  • 1. Network Layer, Switched WAN Deepak John SJCET-Pala
  • 3. functions  Providing Services to Transport Layer: Network layer provides services to transport layer at the network layer/transport layer interface.  Routing: Implements routing of frames (packets) through the network. Defines the most optimum path the packet should take from the source to the destination.  Congestion Control
  • 4. Implementation  2 packet switching techniques are used: i. Datagrams ii. Virtual Circuits  2 types of services are provided to the transport layer: i. Connectionless Service: Sender and receiver treat each transmitted message as an independent unit ii. Connection-oriented Service: Sender and receiver see data as traveling on a logical connection. Receiver receives data in the same order in which they are transmitted.  Connectionless service and connection-oriented service can be reliable or unreliable  Reliable = Delivery of all data is ensured. The receiver acknowledges data and sender retransmits data that was not received  Unreliable = No acknowledgments or retransmission of data
  • 5. Datagram  Each packet is routed independently
  • 6. 1 3 2 0111 value in arriving packet’s header routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1 Datagram forwarding table
  • 7. Advantages  connectionless Disadvantages  Every switch/router knows about every destination  Potentially huge tables  Need routing protocol to fill table
  • 8. Virtual Circuit  All packets of a VC follow the same route.  every router on source-dest path maintains “state” for each passing connection.  consists of: 1. Path from source to destination 2. VC numbers, one number for each link along path 3. Entries in forwarding tables in routers along path
  • 9.
  • 10. Advantages  Efficient lookup (simple table lookup)/  Can reserve bandwidth at connection setup  easier for hardware implementations Disadvantages  need route connection setup request.  More complex failure recovery – must recreate connection state
  • 11. Connectionless Service  Each packet is transmitted independently
  • 12. Connection-oriented Service  Logical connection is established
  • 14. Routing  One of the important functions of the network layer is to route the packets from source machine to destination machine  The network layer at the source creates a packet from the data coming from transport layer  The header of the packet contains, the logical addresses of the source and destination  The network layer is responsible for checking its routing table to find the routing information.  The network layer at the destination is responsible for address verification  It makes sure that the destination address on the packet is the same as the address of the host.  If the packet is a fragment, the network layer waits until all fragments have arrived,  It then reassembles them and delivers the reassembled packet to the transport layer.
  • 15. Performance Criteria  The selection of a route is generally based on some performance criterion.  The simplest criterion is to choose the minimum-hop route  a cost is associated with each link  And, for any pair of attached stations, the route through the network that accumulates the least cost is to be selected(highest throughput and minimum delay).
  • 16.  Routing algorithm:: that part of the Network Layer responsible for deciding on which output line to transmit an incoming packet.  Properties: Correctness, Simplicity, Robustness, Stability ,Fairness and Optimality  Routing strategies Four key strategies are: 1. Fixed routing 2. Flooding 3. Random routing 4. Adaptive routing
  • 17. Fixed routing  A single, permanent route is configured for each source-destination pair of nodes in the network.  To implement fixed routing A central routing matrix is created, to be stored at a network control centre.  The matrix shows, for each source-destination pair of nodes, the identity of the next node on the route.  There is no difference between routing for datagrams and virtual circuits.  All packets from a given source to a given destination follow the same route  The advantage of fixed routing is its simplicity and disadvantage is its lack of flexibility
  • 19. Flooding  No network info required  Packet sent by node to every neighbor  Incoming packets retransmitted on every link except incoming link  Eventually a number of copies will arrive at destination  Each packet is uniquely numbered so duplicates can be discarded  Nodes can remember packets already forwarded to keep network load in bounds  One problem with this method is that packets may go in a loop  A simpler technique is to include a hop count field with each packet  The count can originally be set to some maximum value.  Each time a node passes on a packet, it decrements the count by one  When the count reaches zero, the packet is discarded
  • 20.  The flooding technique has three remarkable properties:  All possible routes between source and destination are tried. So a packet will always get through if at least one path between source and destination exists.  Because all routes are tried, at least one copy of the packet to arrive at the destination will have used a minimum-hop route.  All nodes that are directly or indirectly connected to the source node are visited  The principal disadvantage of flooding is the high traffic load that it generates, which is directly proportional to the connectivity of the network.
  • 21. Random Routing  A node selects only one outgoing path for retransmission of an incoming packet  The outgoing link is chosen at random or round robin fashion, excluding the link on which the packet arrived.  A refinement of this technique is to assign a probability to each outgoing link and to select the link based on that probability  The probability could be based on data rate, in which case we have
  • 22. Adaptive Routing  Used by almost all packet switching networks.  Adaptive routing is the process of locating a clear path from a source to destination across a network of nodes that could change at any point.  It ensure that data packets can move from one point in the network to another, even if the one or more nodes in between are unavailable.  Requires information about the network, which will be updated from time to time to enable the routing decision to adapt to changing conditions.  Routing decisions change as conditions on the network change  Failure  Congestion
  • 23.  There are several drawbacks associated with the use of adaptive routing:  Routing decisions more complex  Reacting too quickly can cause congestion  A convenient way to classify adaptive routing strategies is on the basis of information source:  local  adjacent nodes  all nodes  adaptive strategies can be either distributed or centralized  In the distributed case, each node exchanges delay information with other nodes. Based on incoming information, a node tries to estimate the delay situation throughout the network, and applies a least-cost routing algorithm  In the centralized case, each node reports its link delay status to a central node, which designs routes based on this incoming information and sends the routing information back to the nodes
  • 25. Congestion control  An important issue in a packet-switched network is congestion  Congestion occurs when the number of packets being transmitted through a network begins to approach the packet-handling capacity of the network  Congestion will lead to a large queue length, which results in buffer overflow and loss of packets  The objective of congestion control is to maintain the number of packets within the network below the level at which performance falls off dramatically.  congestion affects vital parameters of the network performance .. 1. Through put 2. Delay
  • 27. Causes of Congestion  Congestion in a network or internetwork occurs because routers and switches have buffers that hold the packets before and after processing  A router has an input queue and an output queue for each interface. If the rate of packet arrival is higher than the packet processing rate, the input queues become longer and longer.  If the packet departure rate is less than the packet processing rate, the output queues become longer and longer.
  • 28. Congestion Control Techniques  Congestion control refers to the techniques and mechanisms which can prevent congestion from happening or remove congestion after it has taken place  divided into two categories 1. Open loop: prevent or avoid congestion by ensuring that the system never enters a Congested State. 2. Close loop: allow system to enter congested state, detect it, and remove it.
  • 29. Open-loop Congestion Control  In open-loop congestion control, policies are applied to prevent congestion before it happens  Congestion control is handled by either the source or the destination  List of policies that can prevent congestion are:  Retransmission Policy  Window Policy  Acknowledgment Policy  Discarding Policy  Admission Policy 1. Retransmission policy  Retransmission in general may increase congestion in the network  The retransmission policy and the retransmission timers must be designed to optimize efficiency and at the same time prevent congestion.
  • 30. 2.Window Policy  The type of window at the sender may also affect congestion  The Selective Repeat window is better than the Go-Back-N window for congestion control. 3. Acknowledgement Policy  If the receiver does not acknowledge every packet it receives, it may slow down the sender and help prevent congestion. Several approaches are used in this case:  A receiver may send an acknowledgment only if a special timer expires.  A receiver may decide to acknowledge only N packets at a time. 4. Discarding policy  A good discarding policy by the routers may prevent congestion and at the same time may not harm the integrity of the transmission.
  • 31. 5. Admission Policy  An admission policy, which is a quality-of-service mechanism, can also prevent congestion in virtual-circuit networks  Routers first check the resource requirement of a flow before admitting it to the network  A router can deny establishing a virtual circuit connection if there is congestion in the network or if there is a possibility of future congestion.
  • 32. Closed-Loop Congestion Control  Closed-loop congestion control mechanisms try to alleviate congestion after it happens.  Few of the mechanisms used are  Backpressure  Choke Packet  Implicit Signalling  Explicit Signalling
  • 33. Backpressure  Backpressure is a node-to-node congestion control that starts with a node and propagates, in the opposite direction of data flow, to the source.  This technique can be applied only to virtual circuit networks, in which each node knows the upstream node from which a flow of data is coming
  • 34. Choke packets  A choke packet(warning) is a packet sent by a node , which has encountered congestion, to the source station directly to inform it of congestion.
  • 35. Implicit Signaling  There is no communication between the congested node or nodes and the source  The source guesses that there is a congestion somewhere in the network from other symptoms  For example, when a source sends several packets and there is no acknowledgment for a while, one assumption is that the network is congested  The delay in receiving an acknowledgment is interpreted as congestion in the network; the source should slow down.
  • 36. Explicit Signaling  The node that experiences congestion can explicitly send a signal to the source or destination.  can occur in either the forward or the backward direction. Backward Signaling  A bit can be set in a packet moving in the direction opposite to the congestion  This bit can warn the source that there is congestion and that it needs to slow down to avoid the discarding of packets. Forward Signaling  A bit can be set in a packet moving in the direction of the congestion.  This bit can warn the destination that there is congestion.  The receiver in this case can use policies, such as slowing down the acknowledgments, to alleviate the congestion.
  • 38. 3.3 Switched WANs Switched WAN  Two different technologies are used in wide area switched networks: circuit switching and packet switching.  The backbone networks in the Internet are usually switchedWANs.  A switched WAN is a wide area network that covers a large area (a state or a country) and provides access at several points to the users.  Inside the network, there is a mesh of point-to-point networks that connects switches. Wide area network and switching methods
  • 39. VIRTUAL CIRCUIT SWITCHING  It is a packet switching methodology where a pre planned route is established and all the packets between a pair of communicating parties follow this same route through the network.  Each packet contains a virtual circuit identifier as well as data.  The switching or routing in a virtual-circuit network is based on the virtual circuit identifier, It determines the next link along the path.  The table associated with switch contains four pieces of information specific to a virtual circuit: input port, input virtual circuit number, output port, and output virtual circuit number  When a packet arrives at a switch in a virtual circuit network, the pair (input port, input VCI) can uniquely determined how the packet is to be routed  A transmitted packet is buffered at each node.
  • 41. ADDRESSING  In a virtual-circuit network, two types of addressing are involved: global and local (virtual-circuit identifier). Global Addressing:  A source or a destination needs to have a global address-that can be unique in the network. Virtual-Circuit Identifier:  It is an identifier that is actually used for data transfer  Unlike a global address, it is a small number that has only switch scope.  It is used by a packet between two switches. When a packet arrives at a switch, it has a VCI; when it leaves, it has a different VCl.
  • 42. VCI Phases  A source and destination need to go through three phases in a virtual-circuit network: 1. Setup 2. Data transfer 3. Teardown
  • 43. 1.Setup phase  a switch creates an entry for a virtual circuit.  Two steps are required for this:  Setup Request  Acknowledgment  A setup request frame is sent from the source to the destination. Setup Request
  • 44. Steps in Setup Request 1. Source A sends a setup frame to switch 1. 2. Switch 1 receives the setup request frame. It knows the output port through which the frame will proceed. 3. The switch creates an entry in its table for this virtual circuit, ie. It enters value of the input port, input VCI and output port. 4. The frame is forwarded to the switch 2 through the specific output port. 5. The same process repeats at switch 2 and switch 3. 6. Destination B receives the setup frame, and if it is ready to receive frames from A, it assigns a VCI to the incoming frames that come from A.
  • 45. Acknowledgment  acknowledgment frame, completes the entries in the switching tables  The destination sends an acknowledgment to switch 3.  The acknowledgment carries the global source and destination addresses so the switch knows which entry in the table is to be completed.  The frame also carries VCI chosen by the destination as the incoming VCI for frames from A  Switch 3 uses this VCI to complete the outgoing VCI column for this entry.  Switch 3 sends an acknowledgment to switch 2 that contains its incoming VCI in the table  Switch 2 uses this as the outgoing VCI in the table.  The above mentioned procedure is repeated for switch 2 and the table is filled  Finally switch 1 sends an acknowledgment to source A that contains its incoming VCI in the table, chosen in the previous step.  The source uses this as the outgoing VCI for the data frames to be sent to destination B.
  • 47. 2.Data transfer phase  To transfer a frame from a source to its destination, all switches need to have a table entry for this virtual circuit  The source sends a packet with VCI attached to the switch 1.  Switch 1 consults it table and find the specific output port and output VCI.  The data transfer phase is active until the source sends all its frames to the destination.
  • 48. 3.Tear down phase  In this phase, source A, after sending all frames to B, sends a special frame called a teardown request.  Destination B responds with a teardown confirmation frame.  All switches delete the corresponding entry from their tables.
  • 49. Classification of Virtual Circuits  Two types of virtual circuits exist:  Permanent Virtual Circuits (PVC)  Switched Virtual Circuits (SVC)
  • 50. Permanent virtual circuit (PVC) established as an option to provide a dedicated circuit link between two facilities. the connection setup is simple. table entry is recorded for all switches by the administrator. The administrator determines a complete path from source to destination. A connection is created from one source to one single destination.  If a source needs connections with several destinations, it needs a PVC for each connection. It can established for repeated/continuous use between the same source & destination and eliminate the need for repeated connection set-up and clearing.
  • 51. Switched Virtual Circuit SVC  SVC creates a temporary, short connection that exists only when data are being transferred between source and destination.  SVC requires a connection setup phase.  First you need to establish a connection between the required source and destination  After that data is transferred  Once data transfer is completed the connection is removed
  • 52. X.25
  • 53. X.25  is a packet switched technology used inWide Area Networks  designed to operate effectively regardless of the type of systems connected to the network.  It defines standard for establishing, maintaining and terminating connections between devices.  X.25 network devices fall into three general categories:  Data terminal equipment (DTE).  Data circuit-terminating equipment (DCE).  Packet switching exchange (PSE).  an interface between DTE and DCE
  • 54.  DTE devices are end systems that communicate across the X.25 network  DCE devices are communications devices such as modems and packet switches; provide the interface between DTE devices and a PSE.  PSE is a switch in x.25 WAN network located at the vendor’s site.The customer’s DCE is connected to a vendor’s PSE through a high speed tele-communication line.
  • 55.  Layers Physical layer  deals with the physical interface between a station (computer, terminal) and a packet-switching node.  specifies the physical, electrical, functional and procedural characteristics to control the physical link between a DTE and a DCE
  • 56.  X.21bis is a physical layer protocol used in X.25 that defines the electrical and mechanical procedures for using the physical medium.  X.21bis handles the activation and deactivation of the physical medium connecting to DTE and DCE devices.  It supports point-to-point and synchronous connections, full-duplex transmission over four-wire media
  • 57. Link layer  ensures reliable transfer of data between the DTE and DCE by transmitting data as a sequence of frames.  The functions performed by link layer include Transfer of data in an efficient and timely manner Synchronization with the receiver and transmitter Detection of transmission errors and recovery from such errors Identification and reporting of procedural errors to higher levels for recovery.
  • 58. Link Access Protocol Balanced  is a data link layer protocol that manages communication and framing between DTE and DCE devices  It is a bit-oriented protocol that ensures that frames are correctly ordered and error-free.
  • 59. Packet Layer  Responsible for creating a virtual circuit between two DTEs.  make up a packet that include a header and user data.  Functions performed by packet Layer are:  Establishing Connection  Transferring data  Terminating a connection  With the help of X.25 packet layer, data are transmitted in packets over external virtual circuits
  • 60. Packet Layer Protocol(PLP )  network layer Protocol which manages the packet exchange between DTE devices .  It runs in 5 different modes 1. Call Setup  used to establish switched virtual circuits between DTE devices.  Uses SVC 2. Data transfer  used for transferring data b/w two DTE devices across a virtual circuit.  In this mode PLP handles segmentation & reassembly, bit padding and flow & error control
  • 61. 3. Idle Mode  used when a virtual circuit is established, but data transfer is not occurring.  used only with SVCs. 4. Call Clearing Mode  Used to end communication sessions between DTE devices and is used only with SVCs. 5. Restarting Mode  used to synchronize transmission b/w a DTE device and a locally connected DCE device
  • 62.  PLP packet fields i. General Format Identifier (GFI)  Identifies packet parameters(whether the packet carries user data or control information, kind of windowing used, etc) ii. Logical Channel Identifier (LCI)  Identifies the virtual circuit across the local DTE/DCE interface.
  • 63. iii. Packet Type Identifier (PTI) Identifies the packet types. iv. User Data Contains encapsulated upper-layer information. This field is present only in data packets