SlideShare a Scribd company logo
1 of 154
THE NETWORK LAYER Chapter 5
OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],application transport network data link physical application transport network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical
NETWORK LAYER DESIGN ISSUES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],CONNECTIONLESS: DATAGRAM (1) 1. Send Data 2. Receive Data application transport network data link physical application transport network data link physical
CONNECTIONLESS: DATAGRAM (2) ,[object Object],The table of router A is changed because of some reasons! Management and update this tables for routing =  Routing algorithm   Store-and-Forward  packet  Subnet Routing tables
[object Object],[object Object],[object Object],VIRTUAL CIRCUITS (1) 1.  Initiate call 2. I ncoming call 3.  Accept call 4.  Call connected 5.  Data flow begins 6.  Receive data application transport network data link physical application transport network data link physical
VIRTUAL CIRCUITS (2) ,[object Object]
ATM (1) ,[object Object],[object Object],[object Object],[object Object]
ATM (2) ,[object Object],[object Object],[object Object]
COMPARISON OF VIRTUAL-CIRCUIT AND DATAGRAM Internet ATM
QUALITY OF SERVICE: QOS (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QUALITY OF SERVICE: QOS (2) ,[object Object],[object Object],[object Object]
ROUTING (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ROUTING (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DIJKSTRA ALGORITHM (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Non-Adaptive Algorithm
DIJKSTRA ALGORITHM (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],N: A, B, C, D, E, F C(A,C)=5; C(C,A)=5 C(B,D)=2; C(D,B)=3 … Source=A p(F): A-D-E-F D(F)=4 Example: A F D C E B 1 1 1 2 2 2 5 3 5 3 5 3
DIJKSTRA ALGORITHM (3) 1  Initialization:   2  N = {A}  3  For all nodes v  4  If v adjacent to A then 5  D(v) = c(A,v)  6  Else D(v) = infinity  8  Loop   9  Find w not in N such that D(w) is a minimum  10  Add w to N  11  Update D(v) for all v adjacent to w and not in N:  12  D(v) = min(  D(v),   D(w)  + c(w,v)  )  /* new cost to v is either old cost to v or known shortest path  cost to w plus cost from w to v */  13  until  all nodes in N  C version of this algorithm is available in book  v w D(v) c(w,v) D(w) A
DIJKSTRA ALGORITHM (4) ,[object Object],Step 0 1 2 3 4 5 start N A AD ADE ADEB ADEBC ADEBCF D(B),p(B) 2,A-B 2,A-B 2,A-B 2,A-B 2,A-B 2,A-B D(C),p(C) 5,A-C 4,A-D-C 3,A-D-E-C 3,A-D-E-C 3,A-D-E-C 3,A-D-E-C D(D),p(D) 1,A-D 1,A-D 1,A-D 1,A-D 1,A-D 1,A-D D(E),p(E) infinity 2,A-D-E 2,A-D-E 2,A-D-E 2,A-D-E 2,A-D-E D(F),p(F) infinity infinity 4,A-D-E-F 4,A-D-E-F 4,A-D-E-F 4,A-D-E-F D(v): Distance (cost) of A to v. P(v): nodes along path fromA to v. A F D C E B 1 1 1 2 2 2 5 3 5 3
DIJKSTRA'S SHORTEST PATH ALGORITHM ,[object Object],s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6        0 distance label S = {  } PQ = { s, 2, 3, 4, 5, 6, 7, t }
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6        0 distance label S = {  } PQ = { s, 2, 3, 4, 5, 6, 7, t } delmin
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 distance label S = { s } PQ = { 2, 3, 4, 5, 6, 7, t } decrease key  X   X X
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 distance label S = { s } PQ = { 2, 3, 4, 5, 6, 7, t }  X   X X delmin
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X decrease key X 33
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X X 33 delmin
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2, 6 } PQ = { 3, 4, 5, 7, t }  X   X X X 33 44 X X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6 } PQ = { 3, 4, 5, 7, t }  X   X X 44 X delmin  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6, 7 } PQ = { 3, 4, 5, t }  X   X X 44 X 35 X 59 X 24  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6, 7 } PQ = { 3, 4, 5, t }  X   X X 44 X 35 X 59 X delmin  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 6, 7 } PQ = { 4, 5, t }  X   X X 44 X 35 X 59 X X 51 X 34  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 6, 7 } PQ = { 4, 5, t }  X   X X 44 X 35 X 59 X X 51 X 34 delmin  X 33 X 32 24
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 5, 6, 7 } PQ = { 4, t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 5, 6, 7 } PQ = { 4, t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45 delmin  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7 } PQ = { t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7 } PQ = { t }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45 delmin  X 33 X 32 24
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7, t } PQ = { }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45  X 33 X 32
DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7, t } PQ = { }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45  X 33 X 32
DIJKSTRA'S ALGORITHM - PSEUDOCODE dist[s] ←0  (distance to source vertex is zero) for  all  v ∈ V–{s}         do   dist[v] ←∞  (set all other distances to infinity)  S←∅  (S, the set of visited vertices is initially empty)  Q←V    (Q, the queue initially contains all vertices)                 while  Q ≠∅  (while the queue is not empty)  do    u ←  mindistance (Q,dist) (select the element of Q with the min. distance)         S←S∪{u}  (add u to list of visited vertices)         for all  v ∈ neighbors[u]                 do  if    dist[v] > dist[u] + w(u, v)  (if new shortest path found)                          then       d[v] ←d[u] + w(u, v) (set new value of shortest path) (if desired, add traceback code) return  dist
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
DIJKSTRA ANIMATED EXAMPLE
One more Ex:
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],DIJKSTRA ALGORITHM (5)
FLOODING ALGORITHM (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Non-Adaptive Algorithm
FLOODING ALGORITHM (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DISTANCE VECTOR ROUTING (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Adaptive Algorithm
DISTANCE VECTOR ROUTING (3) ,[object Object],[object Object],[object Object],D J  (G,?)=  c(J,H)+min w {D H (G,w)}= 6+12= 18
[object Object],[object Object],[object Object],[object Object],[object Object]
DISTANCE VECTOR ROUTING (4) ,[object Object],[object Object],[object Object],[object Object],[object Object],Table for dest.=A There is no path to A In a subnet with longest subnet path=N, after N exchanges everyone will know
DISTANCE VECTOR ROUTING (5) ,[object Object],[object Object],[object Object],After this A goes down Counting will continuous to infinity   ,[object Object],[object Object],B thinks that there is a path to A thru C but C itself go to A via B!
LINK STATE ROUTING (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Adaptive Algorithm
LINK STATE ROUTING (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LINK STATE ROUTING (3) The link state packets for this subnet. The packet buffer for router B, Used in step  
THE NETWORK LAYER IN THE INTERNET (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NETWORK LAYER IN THE INTERNET (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NETWORK LAYER IN THE INTERNET (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NETWORK LAYER IN THE INTERNET (4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NETWORK LAYER IN THE INTERNET (5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP FRAGMENTATION AND REASSEMBLY (1) fragmentation:  in:  one large datagram out:  3 smaller datagrams reassembly
IP FRAGMENTATION AND REASSEMBLY (2) ID =x offset =0 fragflag =0 length =4000 ID =x offset =0 fragflag =1 length =1500 ID =x offset =1480 fragflag =1 length =1500 ID =x offset =2960 fragflag =0 length =1040 One large datagram becomes 3 smaller datagrams. ,[object Object],[object Object],[object Object],0……….3979 data 20 Byte 4000 Bytes 0……….1479 1480…2959
IP ADDRESSES (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],223.1.1 .1 223.1.1 .3 223.1.1 .4 223.1.2 .9 223.1.1.1 = 11011111 00000001 00000001 00000001 223 1 1 1 223.1.1 .2 223.1.2 .2 223.1.2 .1 223.1.3 .2 223.1.3 .1 223.1.3 .27
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP ADDRESSES (2) 223.1.1 .1 223.1.1 .2 223.1.1 .3 223.1.1 .4 223.1.2 .9 223.1.2 .2 223.1.2. 1 223.1.3 .2 223.1.3 .1 223.1.3 .27 network consisting of 3 IP networks LAN
[object Object],IP ADDRESSES (3) 223.1.1.1 223.1.1.3 223.1.1.4 223.1.2.2 223.1.2.1 223.1.2.6 223.1.3.2 223.1.3.1 223.1.3.27 223.1.1.2 223.1.7.0 223.1.7.1 223.1.8.0 223.1.8.1 223.1.9.1 223.1.9.2 Interconnected  system consisting of six networks.
[object Object],IP ADDRESSES (4) 0 network host A C D class 1.0.0.0  to 127.255.255.255 128.0.0.0  to 191.255.255.255 192.0.0.0  to 223.255.255.255 224.0.0.0  to 239.255.255.255 32  bits 65K Hosts 16K Networks 254 Hosts 4M Networks 16M Hosts 126 Networks 110 network host 10 network host B 1110 multicast address
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP ADDRESSES (5) class code network host
IP ADDRESSES (6) ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP ADDRESSES (7) ,[object Object],[object Object],[object Object]
IP ADDRESSES (8) ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP ADDRESSES (9) ,[object Object],[object Object],[object Object]
[object Object],GETTING A DATAGRAM FROM SOURCE TO DEST. (1) ,[object Object],[object Object],misc fields source IP addr dest IP addr data 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2 .9 223.1.2 .2 223.1.2 .1 223.1.3 .2 223.1.3 .1 223.1.3 .27 A E B Dest. Net.  Next Router  Nhops 223.1.1  1 223.1.2   223.1.1.4  2 223.1.3   223.1.1.4  2 forwarding table in A
GETTING A DATAGRAM FROM SOURCE TO DEST. (2) B ,[object Object],[object Object],[object Object],[object Object],[object Object],forwarding table in A A 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 E Dest. Net. Next Router  Nhops 223.1.1  1 223.1.2  223.1.1.4  2 223.1.3  223.1.1.4  2 misc fields 223.1.1.1 223.1.1.3 data
GETTING A DATAGRAM FROM SOURCE TO DEST. (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],forwarding table in A 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 E A B Dest. Net. Next Router  Nhops 223.1.1  1 223.1.2  223.1.1.4  2 223.1.3  223.1.1.4  2 misc fields 223.1.1.1 223.1.2.3 data
GETTING A DATAGRAM FROM SOURCE TO DEST. (4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],forwarding table in router 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 A E B misc fields 223.1.1.1 223.1.2.3 data Dest. Net Router  Nhops  Interface 223.1.1  -  1  223.1.1.4   223.1.2  -  1  223.1.2.9 223.1.3  -  1  223.1.3.27
[object Object],THE INTERNET NETWORK LAYER ,[object Object],[object Object],[object Object],forwarding table ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Transport layer: TCP, UDP Link layer physical layer Network layer
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP ADDRESSES: HOW TO GET ONE?
THE INTERNET NETWORK LAYER PROTOCOLS  (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE INTERNET NETWORK LAYER PROTOCOLS (2) ,[object Object]
THE INTERNET NETWORK LAYER PROTOCOLS (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MOBILE IP
 
 
 
 
 
 
Remote host and mobile host communication
Mobile IP has two addresses  for a mobile host:  one home address and one care-of address.  The home address is permanent;  the care-of address changes as the mobile  host moves from one network to another.
Registration request and reply
Data transfer
 
 
 
ROUTING FOR MOBILE HOSTS ,[object Object]
ROUTING IN AD HOC NETWORKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ROUTE DISCOVERY  USING  AODV – AD-HOC ON DEMAND DISTANCE VECTOR ROUTING PROTOCOL  ,[object Object],[object Object],[object Object],[object Object],[object Object]
ROUTE DISCOVERY (2) ,[object Object]
ROUTE DISCOVERY (3) ,[object Object]
ROUTE MAINTENANCE ,[object Object],[object Object]
CONGESTION
CONGESTION CONTROL ALGORITHMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONGESTION  ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GENERAL PRINCIPLES OF CONGESTION CONTROL ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Increase the resources or  Decrease the load . That is not always possible. So we have to apply some congestion prevention policy.
CONGESTION PREVENTION POLICIES ,[object Object],5-26
CONGESTION CONTROL IN VIRTUAL-CIRCUIT SUBNETS ,[object Object]
HOP-BY-HOP CHOKE PACKETS ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
JITTER CONTROL ,[object Object]
QUALITY OF SERVICE ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LABEL SWITCHING AND MPLS ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual-circuit routing  Traditional Method MPLS it is  not possible to group several distinct paths  with different end points onto the same virtual-circuit identifier because there would be no way to distinguish them at the final destination.  With MPLS, the packets still contain their  final destination address +  label ,  so that at the end of the labeled route the  label header can be removed and forwarding can continue the usual way , using the network layer destination address. forwarding table construction in VC when a user wants to establish a connection, a  setup packet is launched  into the network to create the path and make the forwarding table entries forwarding table construction in MPLS there is  no setup phase  for each connection instead there are two ways for the forwarding table entries to be created.  In the  data-driven approach ,  Control-driven approach
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HOW NETWORKS DIFFER ,[object Object],5-43
HOW NETWORKS CAN BE CONNECTED ,[object Object],[object Object]
CONCATENATED VIRTUAL CIRCUITS ,[object Object]
CONNECTIONLESS INTERNETWORKING ,[object Object]
TUNNELING ,[object Object]
THE NETWORK LAYER IN THE INTERNET ,[object Object],[object Object]
IP ADDRESSES ,[object Object]
IP ADDRESSES (2) ,[object Object]
SUBNETS (2) ,[object Object]
IPV6
IPV6  MAJOR GOALS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAJOR IMPROVEMENTS OVER IPV4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPV6 PLANNED SUPPORT LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640
ADDRESS SPACE AND NOTATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640
IPv4 Header IPv6  Header - field ’ s  name  kept from IPv4 to IPv6 - fields not kept in IPv6 -  Name & position changed in IPv6 -  New field in IPv6 Legend Version IHL Type of Service Total Length Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding Version Traffic Class Flow Label Payload Length Next Header Hop Limit Source Address Destination Address
PACKET FORMAT DETAILS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640
SUMMARY OF HEADER CHANGES BETWEEN IPV4 & IPV6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXTENSION HEADERS next header = TCP TCP header + data IPv6 header next header = Routing TCP header + data Routing header next header = TCP IPv6 header next header = Routing fragment of TCP header + data Routing header next header = Fragment Fragment header next header = TCP IPv6 header
EXTENSION HEADERS (CONT.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FRAGMENT HEADER ,[object Object],[object Object],[object Object],[object Object],Next Header Original Packet Identifier Reserved Fragment Offset 0 0 M
IPV6 TECHNOLOGY SCOPE IP Service IPv4 Solution IPv6 Solution Mobile IP   with Direct Routing DHCP Mobile IP IGMP/ PIM/Multicast BGP IP Multicast MLD/ PIM/Multicast  BGP, Scope Identifier Mobility Autoconfiguration Serverless , Reconfiguration , DHCP 32-bit, Network  Address Translation 128-bit , Multiple Scopes Addressing Range Quality-of-Service Differentiated Service, Integrated Service Differentiated Service, Integrated Service Security IPSec Mandated,   works End-to-End IPSec
SUMMARY OF MAIN IPV6 BENEFITS ,[object Object],[object Object],[object Object],[object Object],[object Object]
IPV6 ADVANCED FEATURES ,[object Object],[object Object],[object Object],[object Object],[object Object]
KEY DIFFERENCES IN HEADER ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640
ROUTING EXTENSION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CS 640 0 8 16 24 31 Next header Hd. Ext. Len 0 Segmnts left 1 – 24 addresses
THE MAIN IPV6 HEADER ,[object Object]
EXTENSION HEADERS ,[object Object],5-69
EXTENSION HEADERS (2) ,[object Object]
EXTENSION HEADERS (3) ,[object Object]

More Related Content

What's hot

What's hot (20)

Longest common subsequence
Longest common subsequenceLongest common subsequence
Longest common subsequence
 
DISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEMDISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEM
 
Applied Multivariate Statistical Analysis 6th Edition Johnson Solutions Manual
Applied Multivariate Statistical Analysis 6th Edition Johnson Solutions ManualApplied Multivariate Statistical Analysis 6th Edition Johnson Solutions Manual
Applied Multivariate Statistical Analysis 6th Edition Johnson Solutions Manual
 
linear transformation and rank nullity theorem
linear transformation and rank nullity theorem linear transformation and rank nullity theorem
linear transformation and rank nullity theorem
 
Reduced order observers
Reduced order observersReduced order observers
Reduced order observers
 
14 mecv14 dvd
14 mecv14 dvd14 mecv14 dvd
14 mecv14 dvd
 
String Matching with Finite Automata and Knuth Morris Pratt Algorithm
String Matching with Finite Automata and Knuth Morris Pratt AlgorithmString Matching with Finite Automata and Knuth Morris Pratt Algorithm
String Matching with Finite Automata and Knuth Morris Pratt Algorithm
 
Linear transformation.ppt
Linear transformation.pptLinear transformation.ppt
Linear transformation.ppt
 
6 radar range-doppler-angular loops
6 radar range-doppler-angular loops6 radar range-doppler-angular loops
6 radar range-doppler-angular loops
 
Direct current machine
Direct current machineDirect current machine
Direct current machine
 
Linear transformations-thestuffpoint.com
Linear transformations-thestuffpoint.comLinear transformations-thestuffpoint.com
Linear transformations-thestuffpoint.com
 
Clase 15 dsp
Clase 15 dspClase 15 dsp
Clase 15 dsp
 
Clase 16 dsp
Clase 16 dspClase 16 dsp
Clase 16 dsp
 
Bellmanford . montaser hamza.iraq
Bellmanford . montaser hamza.iraqBellmanford . montaser hamza.iraq
Bellmanford . montaser hamza.iraq
 
Matrix of linear transformation
Matrix of linear transformationMatrix of linear transformation
Matrix of linear transformation
 
Chapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier TransformChapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier Transform
 
Chapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic SignalsChapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic Signals
 
Chapter 6 indices
Chapter 6 indicesChapter 6 indices
Chapter 6 indices
 
Filter design and simulation
Filter design and simulationFilter design and simulation
Filter design and simulation
 
Floyd warshall-algorithm
Floyd warshall-algorithmFloyd warshall-algorithm
Floyd warshall-algorithm
 

Viewers also liked

Gaussian Elimination
Gaussian EliminationGaussian Elimination
Gaussian Elimination
ZunAib Ali
 
OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3
koolkampus
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
Miles Kevin Galario
 
Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11
koolkampus
 
Internet Access via Cable TV Network
Internet Access via Cable TV NetworkInternet Access via Cable TV Network
Internet Access via Cable TV Network
Sandesh Naik
 

Viewers also liked (20)

Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Gaussian Elimination
Gaussian EliminationGaussian Elimination
Gaussian Elimination
 
Single source stortest path bellman ford and dijkstra
Single source stortest path bellman ford and dijkstraSingle source stortest path bellman ford and dijkstra
Single source stortest path bellman ford and dijkstra
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
Dynamics
DynamicsDynamics
Dynamics
 
Interfaz dte dce
Interfaz dte dceInterfaz dte dce
Interfaz dte dce
 
Sistema de Señalización de Canal Común SS7
Sistema de Señalización de Canal Común SS7Sistema de Señalización de Canal Común SS7
Sistema de Señalización de Canal Común SS7
 
Ch06 1
Ch06 1Ch06 1
Ch06 1
 
Interfaz dte
Interfaz dteInterfaz dte
Interfaz dte
 
Modosdetransmisin
ModosdetransmisinModosdetransmisin
Modosdetransmisin
 
OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3
 
Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)Datacom module 5 (UART, USRT, Serial Interface, Modem)
Datacom module 5 (UART, USRT, Serial Interface, Modem)
 
CCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network LayerCCNAv5 - S1: Chapter 6 - Network Layer
CCNAv5 - S1: Chapter 6 - Network Layer
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
X.25 protocol
X.25 protocolX.25 protocol
X.25 protocol
 
Digital data transmission
Digital data transmissionDigital data transmission
Digital data transmission
 
Line coding
Line codingLine coding
Line coding
 
Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11
 
Internet Access via Cable TV Network
Internet Access via Cable TV NetworkInternet Access via Cable TV Network
Internet Access via Cable TV Network
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 

Similar to Jaimin chp-5 - network layer- 2011 batch

Dijkstra’s algorithm
Dijkstra’s algorithmDijkstra’s algorithm
Dijkstra’s algorithm
faisal2204
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithm
Srikrishnan Suresh
 
Session 13 - Single Source Shortest Path Method.pptx
Session 13 - Single Source Shortest Path Method.pptxSession 13 - Single Source Shortest Path Method.pptx
Session 13 - Single Source Shortest Path Method.pptx
SATHWIKCHAKRI
 
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
DKTaxation
 
24. Shortest Path Algorithm.pdf
24. Shortest Path Algorithm.pdf24. Shortest Path Algorithm.pdf
24. Shortest Path Algorithm.pdf
MohsinKhan970714
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
wellesleyterresa
 

Similar to Jaimin chp-5 - network layer- 2011 batch (20)

Dijkstra’s algorithm
Dijkstra’s algorithmDijkstra’s algorithm
Dijkstra’s algorithm
 
Bellman-Ford-Moore Algorithm and Dijkstra’s Algorithm
Bellman-Ford-Moore Algorithm and Dijkstra’s AlgorithmBellman-Ford-Moore Algorithm and Dijkstra’s Algorithm
Bellman-Ford-Moore Algorithm and Dijkstra’s Algorithm
 
dijkstras example.ppt
dijkstras example.pptdijkstras example.ppt
dijkstras example.ppt
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithm
 
12_Graph.pptx
12_Graph.pptx12_Graph.pptx
12_Graph.pptx
 
Single sourceshortestpath by emad
Single sourceshortestpath by emadSingle sourceshortestpath by emad
Single sourceshortestpath by emad
 
Network analysis
Network analysisNetwork analysis
Network analysis
 
Session 13 - Single Source Shortest Path Method.pptx
Session 13 - Single Source Shortest Path Method.pptxSession 13 - Single Source Shortest Path Method.pptx
Session 13 - Single Source Shortest Path Method.pptx
 
Symbolic Regression on Network Properties
Symbolic Regression on Network PropertiesSymbolic Regression on Network Properties
Symbolic Regression on Network Properties
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing Algorithms
 
Module 3- transport_layer .pptx
Module 3- transport_layer           .pptxModule 3- transport_layer           .pptx
Module 3- transport_layer .pptx
 
Branch and bounding : Data structures
Branch and bounding : Data structuresBranch and bounding : Data structures
Branch and bounding : Data structures
 
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
01-05-2023, SOL_DU_MBAFT_6202_Dijkstra’s Algorithm Dated 1st May 23.pdf
 
24. Shortest Path Algorithm.pdf
24. Shortest Path Algorithm.pdf24. Shortest Path Algorithm.pdf
24. Shortest Path Algorithm.pdf
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...
 
String kmp
String kmpString kmp
String kmp
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
 
4900514.ppt
4900514.ppt4900514.ppt
4900514.ppt
 

More from Jaimin Jani (8)

BE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdf
BE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdfBE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdf
BE_6_SEM_EE_MP_MC-_COMP._OF_8086_FAMILY-AMIT_THAKUR-converted-converted.pdf
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
Jaimin chp-2 - 2011 batch
Jaimin   chp-2  - 2011 batchJaimin   chp-2  - 2011 batch
Jaimin chp-2 - 2011 batch
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Jaimin chp-5 - network layer- 2011 batch

  • 1. THE NETWORK LAYER Chapter 5
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. COMPARISON OF VIRTUAL-CIRCUIT AND DATAGRAM Internet ATM
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. DIJKSTRA ALGORITHM (3) 1 Initialization: 2 N = {A} 3 For all nodes v 4 If v adjacent to A then 5 D(v) = c(A,v) 6 Else D(v) = infinity 8 Loop 9 Find w not in N such that D(w) is a minimum 10 Add w to N 11 Update D(v) for all v adjacent to w and not in N: 12 D(v) = min( D(v), D(w) + c(w,v) ) /* new cost to v is either old cost to v or known shortest path cost to w plus cost from w to v */ 13 until all nodes in N C version of this algorithm is available in book v w D(v) c(w,v) D(w) A
  • 18.
  • 19.
  • 20. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6        0 distance label S = { } PQ = { s, 2, 3, 4, 5, 6, 7, t }
  • 21. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6        0 distance label S = { } PQ = { s, 2, 3, 4, 5, 6, 7, t } delmin
  • 22. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 distance label S = { s } PQ = { 2, 3, 4, 5, 6, 7, t } decrease key  X   X X
  • 23. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 distance label S = { s } PQ = { 2, 3, 4, 5, 6, 7, t }  X   X X delmin
  • 24. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X
  • 25. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X decrease key X 33
  • 26. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2 } PQ = { 3, 4, 5, 6, 7, t }  X   X X X 33 delmin
  • 27. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9    14  0 S = { s, 2, 6 } PQ = { 3, 4, 5, 7, t }  X   X X X 33 44 X X 32
  • 28. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6 } PQ = { 3, 4, 5, 7, t }  X   X X 44 X delmin  X 33 X 32
  • 29. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6, 7 } PQ = { 3, 4, 5, t }  X   X X 44 X 35 X 59 X 24  X 33 X 32
  • 30. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 6, 7 } PQ = { 3, 4, 5, t }  X   X X 44 X 35 X 59 X delmin  X 33 X 32
  • 31. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 6, 7 } PQ = { 4, 5, t }  X   X X 44 X 35 X 59 X X 51 X 34  X 33 X 32
  • 32. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 6, 7 } PQ = { 4, 5, t }  X   X X 44 X 35 X 59 X X 51 X 34 delmin  X 33 X 32 24
  • 33. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 5, 6, 7 } PQ = { 4, t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45  X 33 X 32
  • 34. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 5, 6, 7 } PQ = { 4, t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45 delmin  X 33 X 32
  • 35. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7 } PQ = { t }  X   X X 44 X 35 X 59 X X 51 X 34 24 X 50 X 45  X 33 X 32
  • 36. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7 } PQ = { t }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45 delmin  X 33 X 32 24
  • 37. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7, t } PQ = { }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45  X 33 X 32
  • 38. DIJKSTRA'S SHORTEST PATH ALGORITHM s 3 t 2 6 7 4 5 24 18 2 9 14 15 5 30 20 44 16 11 6 19 6 15 9   14  0 S = { s, 2, 3, 4, 5, 6, 7, t } PQ = { }  X   X X 44 X 35 X 59 X X 51 X 34 X 50 X 45  X 33 X 32
  • 39. DIJKSTRA'S ALGORITHM - PSEUDOCODE dist[s] ←0 (distance to source vertex is zero) for  all v ∈ V–{s}         do  dist[v] ←∞ (set all other distances to infinity) S←∅ (S, the set of visited vertices is initially empty) Q←V  (Q, the queue initially contains all vertices)               while Q ≠∅ (while the queue is not empty) do   u ←  mindistance (Q,dist) (select the element of Q with the min. distance)        S←S∪{u} (add u to list of visited vertices)        for all v ∈ neighbors[u]               do  if   dist[v] > dist[u] + w(u, v) (if new shortest path found)                          then      d[v] ←d[u] + w(u, v) (set new value of shortest path) (if desired, add traceback code) return dist
  • 51.  
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. LINK STATE ROUTING (3) The link state packets for this subnet. The packet buffer for router B, Used in step 
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 89.  
  • 90.  
  • 91.  
  • 92.  
  • 93.  
  • 94.  
  • 95. Remote host and mobile host communication
  • 96. Mobile IP has two addresses for a mobile host: one home address and one care-of address. The home address is permanent; the care-of address changes as the mobile host moves from one network to another.
  • 99.  
  • 100.  
  • 101.  
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124. Virtual-circuit routing Traditional Method MPLS it is not possible to group several distinct paths with different end points onto the same virtual-circuit identifier because there would be no way to distinguish them at the final destination. With MPLS, the packets still contain their final destination address + label , so that at the end of the labeled route the label header can be removed and forwarding can continue the usual way , using the network layer destination address. forwarding table construction in VC when a user wants to establish a connection, a setup packet is launched into the network to create the path and make the forwarding table entries forwarding table construction in MPLS there is no setup phase for each connection instead there are two ways for the forwarding table entries to be created. In the data-driven approach , Control-driven approach
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135. IPV6
  • 136.
  • 137.
  • 138.
  • 139.
  • 140. IPv4 Header IPv6 Header - field ’ s name kept from IPv4 to IPv6 - fields not kept in IPv6 - Name & position changed in IPv6 - New field in IPv6 Legend Version IHL Type of Service Total Length Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding Version Traffic Class Flow Label Payload Length Next Header Hop Limit Source Address Destination Address
  • 141.
  • 142.
  • 143. EXTENSION HEADERS next header = TCP TCP header + data IPv6 header next header = Routing TCP header + data Routing header next header = TCP IPv6 header next header = Routing fragment of TCP header + data Routing header next header = Fragment Fragment header next header = TCP IPv6 header
  • 144.
  • 145.
  • 146. IPV6 TECHNOLOGY SCOPE IP Service IPv4 Solution IPv6 Solution Mobile IP with Direct Routing DHCP Mobile IP IGMP/ PIM/Multicast BGP IP Multicast MLD/ PIM/Multicast BGP, Scope Identifier Mobility Autoconfiguration Serverless , Reconfiguration , DHCP 32-bit, Network Address Translation 128-bit , Multiple Scopes Addressing Range Quality-of-Service Differentiated Service, Integrated Service Differentiated Service, Integrated Service Security IPSec Mandated, works End-to-End IPSec
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.

Editor's Notes

  1. In addition to the expanded address space, IPv6 offers other benefits: Autoconfiguration - similar to IPX If you deploy large number of appliances, you can’t expect to set an IP address, you need some auto-configuration mechanism which scales DHCP may not be the right way to manage thousands on clients Ipsec is mandated in the architecture Security - NAT compromises end-to-end security in today’s networks by requiring that you trust the end devices. Allows traffic to bypass home subnet - there is still work being done in this area to provide necessary security - similar to “skinny protocol” – imagine IP telephony with no call manager required! Mobile IPv6 removes the triangular issue QoS in IPv6 is the same as IPv4 in QoS and header compression features. Both areas benefited from the work on IPv6! Actually the IPv6 header compresses better than IPv4 header because there are fewer fields! Other features are equivalent but for few details, ie: scope address in multicast,...
  2. Note that Quality of Service is not one of the benefits of IPv6 over IPv4, despite what you may have heard. Both versions of IP have exactly the same QoS features defined. The only difference is the presence of the Flow Label field in IPv6, which allows more efficient packet classification by routers, but this is really a minor implementation optimization, rather than a significant new QoS feature.