SlideShare a Scribd company logo
Computer Networks - Network Layer 1
The Network Layer
Computer Networks: RoutingComputer Networks: Routing 22
Network Layer issues -Network Layer issues -

Concerned with getting packets from source
to destination.

The network layer must know the topology of
the subnet and choose appropriate paths
through it.

When source and destination are in different
networks, the network layer (IP) must deal
with these differences.
* Key issue: what service does the network
layer provide to the transport layer
(connection-oriented or connectionless).
Computer Networks: RoutingComputer Networks: Routing 33
Network Layer Design GoalsNetwork Layer Design Goals
1. The services provided by the network layer
should be independent of the subnet
topology.
2. The Transport Layer should be shielded
from the number, type and topology of the
subnets present.
3. The network addresses available to the
Transport Layer should use a uniform
numbering plan (even across LANs and
WANs).
Computer Networks: RoutingComputer Networks: Routing 44
Figure 7.2
Physical
layer
Data link
layer
Physical
layer
Data link
layer
End system
α
Network
layer
Physical
layer
Data link
layer
Physical
layer
Data link
layer
Transport
layer
Transport
layer
Messages
Messages
Segments
End system
β
Network
service
Network
service
Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks
Network
layer
Network
layer
Network
layer
Computer Networks: RoutingComputer Networks: Routing 55
Application
Transport
Internet
Network
Interface
Application
Transport
InternetInternet
Network 1 Network 2
Machine A Machine B
Router/Gateway
Network
Interface
Network
Interface
Figure 8.3
Computer Networks: RoutingComputer Networks: Routing 66
R
R
R
R
S
SS
s
ss
s
ss
s
ss
s
R
s
R
Backbone
To internet or
wide area
network
Organization
Servers
Gateway
Departmental
Server
Figure 7.6
Copyright ©2000 The McGraw Hill Companies
Leon-Garcia & Widjaja: Communication Networks
Metropolitan Area
Network (MAN)
Computer Networks: RoutingComputer Networks: Routing 77
Interdomain level
Intradomain level
LAN level
Autonomous system
or domain
Border routers
Border routers
Figure 7.7
Internet service
provider
Copyright ©2000 The McGraw Hill Companies
Leon-Garcia & Widjaja: Communication Networks
Wide Area Network
(WAN)
Computer Networks: RoutingComputer Networks: Routing 88
RA
RB
RC
Route
server
NAP
National service provider A
National service provider B
National service provider C
LAN
NAP
NAP
(a)
(b)
Figure 7.8
Copyright ©2000 The McGraw Hill Companies
Leon-Garcia & Widjaja: Communication Networks
National ISPs
Network Access
Point
Computer Networks: RoutingComputer Networks: Routing 99
Packet 2
Packet 1
Packet 1
Packet 2
Packet 2
Figure 7.15Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks
Computer Networks - Network Layer 10
Goals of the Network Layer

The network layer is concerned with getting
packets from the source all the way to the
destination

the network layer must
− know the topology of the communication subnet
− choose route to avoid overloading some of the
communication lines and routers while leaving
others idle
− deal with problems when the source and
destination are in different networks
Computer Networks - Network Layer 11
Services Provided to the Transport
Layer

Connectionless (unreliable) services
− each packet must carry the full destination
address
− no packet ordering and flow control should be
done

Connection-oriented (reliable) services
− a network layer process on the sending site must set up a
connection to its peer on the receiving side
− when a connection is set up, two processes can enter a
negotiation about service parameters
− packets are delivered in sequence
− flow control is provided automatically
Computer Networks - Network Layer 12
International Organization of the
Network Layer

virtual circuit
− a route from the source to the destination is
chosen as part of the connection setup
− primarily for connection-oriented service

datagrams
− each packet sent is routed independently of its
predecessors
− for connection-oriented and connectionless
services
Computer Networks - Network Layer 13
Datagram Vs. Virtual Circuit
Issue Datagram Virtual Circuit (VC)
Circuit Setup Not needed Required
Addressing Each packet contains the full
source and destination address
Each packet contains a short
VC number
State
information
Subnet does not hold state
information
Each VC requires subnet table
space
Routing Each packet is routed
independently
Route chosen when a VC is set
up; all packets follow this route
Effect of router
failures
None, except for packets lost
during the crash
All VCs that passed through the
failed router are terminated
Congestion
control
Difficult Easy if enough buffers can be
allocated in advance for each
VC
Computer Networks - Network Layer 14
Routing

Packets are often routed from the source to
the destination hop by hop.

Two networks are connected by at least a
router. The network is defined from the
point of view of the network layer.
Computer Networks - Network Layer 15
Types of Routing

Static Routing (Nonadaptive Routing)
− Routes to destinations are predetermined and are
not dependent on the current state (traffic,
topology etc.) of the network.

Dynamic Routing (Adaptive Routing)
− Routes being learned via exchange of routing
information to reflect changes in the topology and
traffic.

Default Routing:
− Traffic to destinations that are unknown to the
router is sent to a default “outlet”.
Computer Networks - Network Layer 16
The Optimality Principle

If router J is on the optimal path from router I
to router K, then the optimal path from J to K
also falls along the same route.
 the set of optimal routes from all sources to a
destination form a tree, called a sink tree, rooted
at the destination.

The goal of all routing algorithms is to
discover and use the sink trees for all
routers.
I
J
Kr1
r2
Computer Networks - Network Layer 17
Sink Tree
Computer Networks - Network Layer 18
Routing Algorithms

Static Routing Algorithms
− Shortest Path Routing
− Flooding
− Flow-Based Routing

Dynamic Routing Algorithms
− Distance Vector Routing
− Link State Routing

Hierarchical Routing

Routing for Mobile Hosts

Broadcast Routing

Multicast Routing
Computer Networks - Network Layer 19
Shortest Path Routing

Find the shortest path between a given pair
of routers.

Cost of a link may be a function of the
distance, bandwidth, average traffic,
communication cost, mean queue length,
delay, etc.

The Dijkstra’s algorithm is used.
Computer Networks - Network Layer 20
Flooding

Every incoming packet is sent out on every
outgoing line except the one it arrived on.

Vast numbers of duplicate packets are
generated.

Application:
− Concurrent updates of all distributed databases

Always choose the shortest path
I
J
K
L
M
Computer Networks - Network Layer 21
Flow-Based Routing

For a given line, if the capacity and average
flow are known in advance, it is possible to
compute the mean packet delay on that line
from queuing theory.

The routing problem then reduces to finding
a routing algorithm that produces the
minimum average delay for the subnet.
Computer Networks - Network Layer 22
Distance Vector Routing

RIP, the distributed Bellman-Ford routing
algorithm, the Ford-Fulkerson algorithm

Each router maintains a routing table giving
the best known distance to each destination
and which line to use to get there.

These tables are updated by exchanging
information with the neighbors.
Computer Networks - Network Layer 23
Computer Networks - Network Layer 24
Distance Vector

Each node maintains a set of triples
− (Destination, Cost, NextHop)

Exchange updates directly connected neighbors
− periodically (on the order of several seconds)
− whenever table changes (called triggered update)

Each update is a list of pairs:
− (Destination, Cost)

Update local table if receive a “better” route
− smaller cost
− came from next-hop

Refresh existing routes; delete if they time out
Computer Networks - Network Layer 25
Distance Vector Routing

Metric used to measure the “distance”
− number of hops
− time delay
− queue length

Drawback
− Count-to-infinity problem
− it reacts rapidly to good news, but leisurely to
bad news.
Computer Networks - Network Layer 26
Traffic may oscillate between the
two links
Computer Networks - Network Layer 27
Hierarchical Routing

When hierarchical routing is used, the
routers are divided into regions
− each router knows all the details about how to
route packets to destinations within its own
region
− each router knows nothing about the internal
structure of other regions.
Computer Networks - Network Layer 28
Broadcast Routing

To simply send a distinct packet to each
destination

Flooding

Multidestination Routing

Spanning Tree Routing

Reverse Path Forwarding
Computer Networks - Network Layer 29
Multidestination Routing

Each packet contains a list of desired
destinations.

When a packet arrives, the router checks all
the destinations to determine the set of
output lines for forwarding the packet. An
output line is selected if it is the best route to
at least one of the destinations.

The router generates a new copy of the
packet for selected output line, with a set of
destinations that are to use the line.
Computer Networks - Network Layer 30
Spanning Tree Routing

Assume each router has knowledge of a
spanning tree (e.q. a sink tree) in the
network.

Each router copies an incoming broadcast
packet onto all the spanning tree lines
except the one it arrives on.

Use minimum number of packets.
Computer Networks - Network Layer 31
Reverse Path Forwarding

Without knowing any spanning tree
if a packet arrives at the line that is normally
used for sending packets to the source of
the broadcast
the router forwards copies of it onto all lines
except the one it arrived on.
otherwise
the packet is discarded
Computer Networks - Network Layer 32
Multicasting

Send a message to all the other members of
the group

group management
− create and destroy groups
− for processes to join and leave groups

routers knows which of their hosts belong to
which group

routers tell their neighbors, so the information
propagates through the subnet
Computer Networks - Network Layer 33
Multicast Routing

Each router computes a spanning tree
covering all other routers in the subnet.

When a multicast packet for a group arrives,
the first router examines its spanning tree
and prunes it, removing all lines that do not
lead to hosts in the group.

Multicast packets are forwarded only along
the pruned tree.

mn trees is needed with n groups, each with
an average of m members.
Computer Networks - Network Layer 34
Core-based Tree for Multicast
Routing

A single spanning tree,called core-based
tree, for a group is computed, with the root
(core) near the middle of the group.

A host first sends a multicasting message to
the core, which then does the multicasting
along the spanning tree.

The tree is not optimal. However only n trees
need to be stored.
Computer Networks - Network Layer 35
Congestion

When too many packets are present in (a
part of) a subnet, performance degrades.
This situation is called congestion.
Packetdelivered
Packet sent
Maximun carrying
capacity of subnet
Perfect
Desirable
Congested
Computer Networks - Network Layer 36
Congestion Control

goal
− make sure the subnet is able to carry the
offered traffic

Congestion causes
− bursty data
− insufficient memory
− slow processor
− low-bandwidth line
Computer Networks - Network Layer 37
Flow Control vs. Congestion Control

Congestion control
− Make sure the subnet is able to carry the
offered traffic
− It is a global issue, involving the behavior of all
the hosts, all the routers, and etc.

Flow Control
− Relate to the point-to-point traffic between a
given sender and a given receiver.
Computer Networks - Network Layer 38
Flow Control vs. Congestion Control
1 Gbps
1000 Gbps
PC
Super
Computer
100 Kbps
1 Mbps 1000
1000
Flow
Control
Congestion
Control
Computer Networks - Network Layer 39
General Principles

Open Loop
− make sure congestion does not occur in the first
place
− Deciding when to accept new traffic, deciding
when to discard packets and which ones, …

Make decision without regard to the current state of the
network

Closed Loop
− monitor the system to detect congestion (where
and when)
− pass this information to places where action can
be taken
− adjust system operation to correct the problem
Computer Networks - Network Layer 40
Congestion Control Algorithm
Taxonomy (closed loop)

explicit feedback
− Packets are sent back from the point of
congestion to warn the source.

implicit feedback
− The source deduces the existence of
congestion by making local observations, such
as the acknowledgement time.
Computer Networks - Network Layer 41
Load Shedding

when routers are being inundated by
packets that they can not handle, they just
throw them away.

Packet discarding policy
− Wine: Old is better than new.
− Milk: New is better than old.
− Priority Control
Computer Networks - Network Layer 42
Jitter Control

The jitter is the amount of variation in the
end-to-end packet transit time.

The jitter can be bounded by computing the
expected transit time for each hop along the
path.
− When a packet arrives at a router, the router
checks to see how much the packet is behind or
ahead of its schedule. This information is stored
in the packet and updated at each hop. If the
packet is ahead of schedule, it may be held just
enough to get it back on schedule. If it is behind
schedule, the router tries to get it out the door
quickly.
Computer Networks - Network Layer 43
Congestion Control for Multicasting

Multicast flows from multiple sources to
multiple destinations (cable television)

if it is the sender that reserves bandwidth
− each sender should track membership changes
− regenerate the spanning tree at each change

RSVP (Resource reSerVation Protocol)
− it is the receiver that reserves bandwidth
Computer Networks - Network Layer 44
Bandwidth Reservation
Senders
Receivers
1 2
3 4 5
Senders
Receivers
1 2
3 4 5
Senders
1 2
3 4 5
Bandwidth
reserved
for source 1
Bandwidth
reserved
for source 1
Bandwidth
reserved
for source 2
Computer Networks - Network Layer 45
X.25
Internetworking
B
802.4 LAN802.3 LAN
802.5 LAN
R
DECnet
R
SNA
R
R
Computer Networks - Network Layer 46
Internetworking
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Presentation
Session
Transport
Network
Data Link
Physical
7
6
5
4
3
2
1
Layer
APDU
PPDU
SPDU
TPDU
Packet
Frame
Bit
Application Protocol
Presentation Protocol
Session Protocol
Transport Protocol
Host A Host B
Network
Data Link
Physical
Network
Data Link
Physical
Router Router
Internal Subnet Protocol
Computer Networks - Network Layer 47
How Networks Differ

Service offered
− Connection-oriented versus Connectionless

Protocol
− IP, IPX, CLNP, AppleTalk, DECnet, etc.

Addressing
− Flat (802) versus hierarchical (IP, PDN, PSTN,
ISDN, etc.)

Multicasting/Broadcasting
− Present or absent
Computer Networks - Network Layer 48
How Networks Differ (Cont.)

Packet size
− Every network has its own maximum

Quality of service
− Present or absent

Error handling
− Reliable, ordered, and unordered delivery

Flow control
− Sliding window, rate control, others, or none
Computer Networks - Network Layer 49
How Networks Differ (Cont.)

Congestion control
− Leaky bucket, choke packets, etc.

Security
− Privacy rules, encryption, etc.

Parameters
− Different timeouts, flow specifications, etc.

Accounting
− By connection time, by packet, by byte, or not at
all
Computer Networks - Network Layer 50
Tunneling
EthernetEthernet
RR
WAN
IP
Ethernet header
Ethernet frame
IP
WAN packet header
WAN packet
IP
Ethernet header
Ethernet frame
Using encapsulation of IP packets
The same type
of network
Computer Networks - Network Layer 51
Firewalls

Packet filter router is a router equipped with
some extra functionality that allows every
incoming or outgoing packet to be inspected.

Application gateway (e.g.a mail gateway)
may examine headers and/or contents of
messages.
Application
Gateway
Packet
Filtering
Router
Packet
Filtering
Router
Inside
Outside
Computer Networks - Network Layer 52
Internet Network Layer Protocol

The IP (Internal Protocol) Protocol

IP Addressing

Subnets

Internet Control Protocols
− The Internet Control Message Protocol (ICMP)
− The Address Resolution Protocol (ARP)
− The Reverse Address Resolution Protocol
(RARP)
Computer Networks - Network Layer 53
Internet Network Layer Protocol

The Interior Gateway Routing Protocol:
Open Shortest Path First (OSPF)

The Exterior Gateway Routing Protocol:
Border Gateway Protocol (BGP)

Internet Multicasting

Mobile IP

Classless InterDomain Routing (CIDR)

IPv4

IPv6
54
IPv4 Header Format
• Version – The IP version number, 4.
• Header length – The length of the datagram
header in 32-bit words.
• Type of service – Contains five subfields that
specify the precedence, delay, throughput,
reliability, and cost desired for a packet. (The
Internet does not guarantee this request.) This
field is not widely used on the Internet.
• Total length – The length of the datagram in
bytes including the header, options, and the
appended transport protocol segment or packet.
The maximum length is 65535 bytes.
55
IPv4 header format
• MF – More Fragments. All fragments except the
last one have this bit set.
• Fragment offset – The relative position of this
fragment measured from the beginning of the
original datagram in units of 8 bytes.
• Time to live – How many routers a datagram
can pass through. Each router decrements this
value by 1 until it reaches 0 when the datagram
is discarded. This keeps misrouted datagrams
from remaining on the Internet forever.
• Protocol – The high-level protocol type.
56
IPv4 header format
• Header checksum – A number that is
computed to ensure the integrity of the header
values.
• Source address – The 32-bit IPv4 address of
the sending host.
• Destination address – The 32-bit IPv4 address
of the receiving host.
• Options – A list of optional specifications for
security restrictions, route recording, and source
routing. Not every datagram specifies an
options field.
• Padding – Null bytes which are added to make
57
The IP Protocol
The IPv4 (Internet Protocol) header.
58
The IP Protocol
Some of the IP options.
5-54
• http://www.iana.org/assignments/ip-parameters
59
IP Addresses
• An IP address really refers to a network
interface, so if a hosts are on two network, it
must have two IP addresses.
• Traditionally, IP addresses were divided into the
five categories: A, B, C, D, E.
• Network numbers are managed by a nonprofit
corporation called ICANN (Internet Corporation
for Assigned Names and Numbers) to avoid
conflicts.
• Network address, which are 32-bit numbers, are
usually written in dotted decimal notation. In
this format, each of the 4 bytes is written in
60
IP Addresses
IP address formats.
61
IP Addresses
• The value 0 means this network or this host. The
value of -1 (all 1s) is used as a broadcast address
to mean all hosts on the indicated network.
• 0.0.0.0 is used by hosts when booted.
• IP addresses with 0 as network number refer to
the current network. 156.26.10.0.
• 255.255.255.255 broadcast on local network
• The addresses with a network number and all 1s
in the host field allow machines to broadcast to
remote LANs.
• 127.0.0.1, loopback
62
IP Addresses
Special IP addresses.
63
IP Addresses
• dig - DNS lookup utility
cs742@kirk:~$ dig www
; <<>> DiG 9.2.1 <<>> www
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28011
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;www. IN A
;; AUTHORITY SECTION:
. 10800 IN SOA A.ROOT-SERVERS.NET. NSTLD.VERISIGN-
GRS.COM. 2003110201 1800 900 604800 86400
;; Query time: 139 msec
;; SERVER: 156.26.10.130#53(156.26.10.130)
;; WHEN: Sun Nov 2 21:32:40 2003
;; MSG SIZE rcvd: 96
64
IP Addresses
• nslookup – query Internet name servers
interactively
cs742@kirk:~$ nslookup www.wichita.edu
Note: nslookup is deprecated and may be removed from future releases.
Consider using the `dig' or `host' programs instead. Run nslookup with
the `-sil[ent]' option to prevent this message from appearing.
Server: 156.26.10.130
Address: 156.26.10.130#53
www.wichita.edu canonical name = BLANCA.wichita.edu.
Name: BLANCA.wichita.edu
Address: 156.26.1.160
• Find out the address in Windows: ipconfig/all
65
What is IPv6?
• IPv6 stands for "Internet Protocol Version 6“ and
is also referred to as IPng (IP next generation).
• IPv6 is the protocol designed by the IETF (The
Internet Engineering Task Force) to replace the
current version Internet Protocol, IP Version 4
(IPv4).
• The core set of IPv6 protocols were made an
IETF Draft Standard on August 10, 1998.
• For more information about IPv6, refer to
http://www.ipv6.org/.
66
Why is IPv6? More Addresses!
• IP address allocation history:
1981 ~ IPv4 protocol published
1985 ~ 1/16 total space
1990 ~ 1/8 total space
1995 ~ 1/4 total space
2000 ~ 1/2 total space
• More addresses are needed despite increasingly
intense conservation efforts
– CIDR (classless inter-domain routing)
– PPP address sharing
– NAT (network address translation)
• Theoretical limit of 32-bit space: ~4 billion
devices
Practical limit of 32-bit space: ~250 million
devices
67
IPv6
• IPv6 major goals were:
– Support billions of hosts, even with inefficient address
space allocation.
– Reduce the size of the routing tables.
– Simplify the protocol, to allow routers to process packets
faster.
– Provide better security (authentication and privacy) than
current IP.
– Pay more attention to type of service, particularly for
real-time data.
– Aid multicasting by allowing scopes to be specified.
– Make it possible for a host to roam without changing its
address.
– Allow the protocol to evolve in the future.
– Permit the old and new protocols to coexist for years.
68
IPv6
• SIPP (Simple Internet Protocol Plus) was
selected and given the designation IPv6.
• The main features of IPv6:
– IPv6 has longer addresses than IPv4.
– Improved header processing with better support for
options and enhanced routing functionality
– Auto-configuration
– Better security support
– Better support for Quality of Service (QoS)
69
What’s new in IPv6
• Bigger Address Space
– 128 bits: solving the address shortage issue: 232
(4.2
billion) to 2128
(340 undecillion or 3.4 x 1038
)
– There are enough IPv6 address to assign
• 1 million networks per human
• A separate IPv6 address on every square inch of every
planet in the solar system
• Improved Header Processing and Enhanced
routing functionality
– Redefinition of IP options in header (7 versus 13 in IPv4)
• Format is improved for quicker processing
• Some fields are classified such that they may be ignored
by intermediate nodes
– Inclusion of flow label
– Elimination of checksum (let higher layer to compute
their own checksum)
– Enhanced routing functionality such as roaming a host
70
What’s new in IPv6
• Auto-configuration
– Reduced Administrative Overhead
• Much of the administrative load for IPv4 nodes involves
allocating and managing their IPv4 addresses
• IPv6 nodes are able to configure their addresses
automatically (Plug and play)
– Support renumbering
• Experience has shown that Internet nodes don’t keep the
same IP address for their life time
• A network (e.g., an enterprise intranet) will need renumber
based on topology change (wholesale reconnection to
another ISP)
• An IPv6 node discovers the need for configuring a new
IPv6 address for itself.
71
What’s new in IPv6
• Better security support
– Reduced Administrative Overhead
• Much of the administrative load for IPv4 nodes involves
allocating and managing their IPv4 addresses
• IPv6 nodes are able to configure their addresses
automatically (Plug and play)
• Support renumbering
– Experience has shown that Internet nodes don’t keep
the same IP address for their life time
– A network (e.g., an enterprise intranet) will need
renumber based on topology change (wholesale
reconnection to another ISP)
– An IPv6 node discovers the need for configuring a new
IPv6 address for itself.
72
Why isn't IPv6 here now?
• Why isn't IPv6 here now?
– The situation of lack of address spaces are different
in different countries.
– Some transition solutions such as NAT (Network
Address Translation) are there.
– There are still not so many applications available for
IPv6.
– But mobile phones have pushed fast deployment of
IPv6.
73
The Main IPv6 Header
The IPv6 fixed header (required).
74
The Main IPv6 Header
• Version. 4 bits. - IPv6 version number.
• Traffic Class. 8 bits. - Internet traffic priority
delivery value.
• Flow Label. 20 bits. - Used for specifying special
router handling from source to destination(s) for a
sequence of packets.
• Payload Length. 16 bits, unsigned. - Specifies
the length of the data in the packet. When set to
zero, the option is a hop-by-hop Jumbo payload.
• Next Header. 8 bits. - Specifies the next
encapsulated protocol. The values are compatible
with those specified for the IPv4 protocol field.
75
The Main IPv6 Header
• Hop Limit. 8 bits, unsigned. -For each router that
forwards the packet, the hop limit is decremented
by 1. When the hop limit field reaches zero, the
packet is discarded. This replaces the TTL field in
the IPv4 header that was originally intended to be
used as a time based hop limit.
• Source address. 16 bytes. - The IPv6 address of
the sending node.
• Destination address. 16 bytes. -The IPv6
address of the destination node.
76
How Was IPv6 Address Size Chosen?
• Some wanted fixed-length, 64-bit addresses
– easily good for 1012
sites, 1015
nodes, at .0001
allocation efficiency
– minimizes growth of per-packet header overhead
– efficient for software processing
• Some wanted variable-length, up to 160 bits
– compatible with OSI NSAP addressing plans
– big enough for auto-configuration using IEEE 802
addresses
– could start with addresses shorter than 64 bits & grow
later
• Settled on fixed-length, 128-bit addresses
(340,282,366,920,938,463,463,374,607,431,768,211,45
6 in all!)
77
IPv6 Addresses
• Classless addressing/routing (similar to CIDR)
• Notation: x:x:x:x:x:x:x:x (x = 16-bit hex number)
– Contiguous 0s are compressed: 47CD::A456:0124 =
47CD:0000:0000:0000:0000:0000:A456:0124
– IPv6 compatible IPv4 address: ::128.42.1.87
• Address assignment
– provider-based (can’t change provider easily)
– Geographic
• IPv6 has many different kinds of addresses
– unicast, anycast, multicast, loopback, IPv4-embedded,
care-of, manually-assigned, DHCP-assigned, self-
assigned, solicited-node, and more.
– One simplification: no broadcast addresses in IPv6! –
uses multicast to achieve same effects
78
Prefix
0000 0000
0000 0001
0000 001
0000 010
0000 011
0000 1
0001
001
010
011
100
101
110
1110
1111 0
1111 10
1111 110
1111 1110 0
1111 1110 10
1111 1110 11
1111 1111
Use
Reserved
Unassigned
Reserved for NSAP Allocation
Reserved for IPX Allocation
Unassigned
Unassigned
Unassigned
Unassigned
Provider-Based Unicast Address IPV4-like
Unassigned
Reserved for Geographic-Based Unicast Addresses
Unassigned
Unassigned
Unassigned
Unassigned
Unassigned
Unassigned
Unassigned
Link Local Use Addresses no global uniqueness
Site Local Use Addresses no global uniqueness
79
IPv6 – Multicast and Anycast
• IPv6 describes rules for three types of
addressing: unicast (one host to one other
host), anycast (one host to at least one of
multiple hosts), and multicast (one host to
multiple hosts).
• The introduction of an "anycast" address
provides the possibility of sending a message
to the nearest of several possible gateway
hosts with the idea that any one of them can
manage the forwarding of the packet to
others.
• Anycast messages can be used to update
80
IP version 6 – Future Evolution
• The next header field provides for future
evolution.
• If non-zero, it specifies an extension header type
in the packet.
• The extension header types include the services
for router information, route definition, fragment
handling, authentication, encryption information,
and destination information.
• Each extension header type has a specific size
and format and is transmitted after the basic
header and before the payload.
81
Extension Headers
IPv6 extension headers.
5-69
82
Extension Headers
The hop-by-hop extension header for large datagrams
(jumbograms).
The extension header for routing.
83
IPv6 Security and Evolution
• The advantage of implementing security at the IP
level is that it can be applied without the need for
security-aware implementations of application
programs.
• Security in IPv6 is implemented through the
authentication and encrypted security payload
extension header types , for ensuring data
integrity, and for ensuring privacy.
• Instead, isolated “island” of IPv6 will converted,
initially communicating via tunnels. As the IPv6
islands grow, they will merge into bigger islands.
Eventually, all the islands will merge, and the
Internet will be fully converted.

More Related Content

What's hot

Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
Network Layer
Network LayerNetwork Layer
Network Layer
Rutwik Jadhav
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
Kashyap Davariya
 
Network Layer
Network LayerNetwork Layer
Network Layer
Rutwik Jadhav
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
Narendra Singh Yadav
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
Deepak John
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
Hossam El-Deen Osama
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
Gaurav Dalvi
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
cairo university
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
Amin Omi
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
Fathin Fakhriah Abdul Aziz
 
Packet switching
Packet switchingPacket switching
Packet switching
Sabyasachi Upadhyay
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Pranjal Das
 
Routing and routing algorithms
Routing and routing algorithmsRouting and routing algorithms
Routing and routing algorithms
Bhatt Aadil
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
vtunotesbysree
 

What's hot (20)

Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
 
Packet switching
Packet switchingPacket switching
Packet switching
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
 
Routing and routing algorithms
Routing and routing algorithmsRouting and routing algorithms
Routing and routing algorithms
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 

Viewers also liked

Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
James Wong
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
COPYRIGHT-SEO-PTY-LTD
 
Siswa korban kekerasan pidana
Siswa korban kekerasan pidanaSiswa korban kekerasan pidana
Siswa korban kekerasan pidana
Suyanto Suyanto
 
Hypotenuse-Leg Theroem.pdf
Hypotenuse-Leg Theroem.pdfHypotenuse-Leg Theroem.pdf
Hypotenuse-Leg Theroem.pdf
bwlomas
 
Guru dalam pembelajaran
Guru dalam pembelajaranGuru dalam pembelajaran
Guru dalam pembelajaran
Suyanto Suyanto
 
Data preparation
Data preparationData preparation
Data preparation
James Wong
 
Res epre59 13
Res epre59 13Res epre59 13
Res epre59 13
EPRE
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
James Wong
 
La pepa
La pepaLa pepa
La pepa
jonatancamba
 
Overview prolog
Overview prologOverview prolog
Overview prolog
Young Alista
 
Data preparation
Data preparationData preparation
Data preparation
Young Alista
 
Data and assessment
Data and assessmentData and assessment
Data and assessment
Young Alista
 
Exception
ExceptionException
Exception
Young Alista
 

Viewers also liked (14)

Object oriented analysis
Object oriented analysisObject oriented analysis
Object oriented analysis
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Adidaya pendidikan
Adidaya pendidikan Adidaya pendidikan
Adidaya pendidikan
 
Siswa korban kekerasan pidana
Siswa korban kekerasan pidanaSiswa korban kekerasan pidana
Siswa korban kekerasan pidana
 
Hypotenuse-Leg Theroem.pdf
Hypotenuse-Leg Theroem.pdfHypotenuse-Leg Theroem.pdf
Hypotenuse-Leg Theroem.pdf
 
Guru dalam pembelajaran
Guru dalam pembelajaranGuru dalam pembelajaran
Guru dalam pembelajaran
 
Data preparation
Data preparationData preparation
Data preparation
 
Res epre59 13
Res epre59 13Res epre59 13
Res epre59 13
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
 
La pepa
La pepaLa pepa
La pepa
 
Overview prolog
Overview prologOverview prolog
Overview prolog
 
Data preparation
Data preparationData preparation
Data preparation
 
Data and assessment
Data and assessmentData and assessment
Data and assessment
 
Exception
ExceptionException
Exception
 

Similar to QSpiders - Good to Know Network Concepts

destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...
Ashish Gupta
 
Network_Layer.ppt
Network_Layer.pptNetwork_Layer.ppt
Network_Layer.ppt
RajSingh52036
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
Answer sheet of switching &amp; routing
Answer sheet of switching &amp; routingAnswer sheet of switching &amp; routing
Answer sheet of switching &amp; routing
Md. Mashiur Rahman
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
BharatiPatelPhDStude
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
IndrajaMeghavathula
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
mrcopyxerox
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
JPINFOTECH JAYAPRAKASH
 
unit-4
unit-4 unit-4
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
Munnakumar518378
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
Aksum Institute of Technology(AIT, @Letsgo)
 
1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdf
1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdf1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdf
1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdf
sadoyah492
 
Datagram vs. virtual circuit
Datagram vs. virtual circuitDatagram vs. virtual circuit
Datagram vs. virtual circuit
Vikash Gangwar
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
Haripritha
 
UNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptxUNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptx
satvikpatil5
 
Module_3_Part_3.pptx
Module_3_Part_3.pptxModule_3_Part_3.pptx
Module_3_Part_3.pptx
KPDDRAVIDIAN
 
ip routing and troubleshooting algorithms
ip routing and troubleshooting algorithmsip routing and troubleshooting algorithms
ip routing and troubleshooting algorithms
Vo Cong Minh
 
Tcil_Concept of Routing_n_protocols.pptx
Tcil_Concept of Routing_n_protocols.pptxTcil_Concept of Routing_n_protocols.pptx
Tcil_Concept of Routing_n_protocols.pptx
VINAYTANWAR18
 
An adaptive opportunistic routing scheme for wireless ad hoc networks
An adaptive opportunistic routing scheme for wireless ad hoc networksAn adaptive opportunistic routing scheme for wireless ad hoc networks
An adaptive opportunistic routing scheme for wireless ad hoc networks
anish9291
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
Chandra Meena
 

Similar to QSpiders - Good to Know Network Concepts (20)

destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...destination. The network layer must know the topology of the subnet and choos...
destination. The network layer must know the topology of the subnet and choos...
 
Network_Layer.ppt
Network_Layer.pptNetwork_Layer.ppt
Network_Layer.ppt
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Answer sheet of switching &amp; routing
Answer sheet of switching &amp; routingAnswer sheet of switching &amp; routing
Answer sheet of switching &amp; routing
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
unit-4
unit-4 unit-4
unit-4
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
 
1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdf
1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdf1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdf
1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdf
 
Datagram vs. virtual circuit
Datagram vs. virtual circuitDatagram vs. virtual circuit
Datagram vs. virtual circuit
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
UNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptxUNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptx
 
Module_3_Part_3.pptx
Module_3_Part_3.pptxModule_3_Part_3.pptx
Module_3_Part_3.pptx
 
ip routing and troubleshooting algorithms
ip routing and troubleshooting algorithmsip routing and troubleshooting algorithms
ip routing and troubleshooting algorithms
 
Tcil_Concept of Routing_n_protocols.pptx
Tcil_Concept of Routing_n_protocols.pptxTcil_Concept of Routing_n_protocols.pptx
Tcil_Concept of Routing_n_protocols.pptx
 
An adaptive opportunistic routing scheme for wireless ad hoc networks
An adaptive opportunistic routing scheme for wireless ad hoc networksAn adaptive opportunistic routing scheme for wireless ad hoc networks
An adaptive opportunistic routing scheme for wireless ad hoc networks
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 

More from Qspiders - Software Testing Training Institute

QSpiders - Unix Operating Systems and Commands
QSpiders - Unix Operating Systems  and CommandsQSpiders - Unix Operating Systems  and Commands
QSpiders - Unix Operating Systems and Commands
Qspiders - Software Testing Training Institute
 
QSpiders - Variable Length-Subnet-Masks
QSpiders - Variable Length-Subnet-MasksQSpiders - Variable Length-Subnet-Masks
QSpiders - Variable Length-Subnet-Masks
Qspiders - Software Testing Training Institute
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
Qspiders - Software Testing Training Institute
 
QSpiders - Dod Model
QSpiders - Dod ModelQSpiders - Dod Model
QSpiders - Day1 Network Basics
QSpiders - Day1 Network BasicsQSpiders - Day1 Network Basics
QSpiders - Day1 Network Basics
Qspiders - Software Testing Training Institute
 
QSpiders - Aptitude Assignments
QSpiders - Aptitude AssignmentsQSpiders - Aptitude Assignments
QSpiders - Aptitude Assignments
Qspiders - Software Testing Training Institute
 
QSpiders - SQL (Data Base)
QSpiders - SQL (Data Base)QSpiders - SQL (Data Base)
QSpiders - Chapter 7 Debugging
QSpiders - Chapter 7 DebuggingQSpiders - Chapter 7 Debugging
QSpiders - Chapter 7 Debugging
Qspiders - Software Testing Training Institute
 
QSpiders - Chapter 4 Checkpoints
QSpiders - Chapter 4 CheckpointsQSpiders - Chapter 4 Checkpoints
QSpiders - Chapter 4 Checkpoints
Qspiders - Software Testing Training Institute
 
QSpiders - Simple Recording and Configuration of recording options for HP Loa...
QSpiders - Simple Recording and Configuration of recording options for HP Loa...QSpiders - Simple Recording and Configuration of recording options for HP Loa...
QSpiders - Simple Recording and Configuration of recording options for HP Loa...
Qspiders - Software Testing Training Institute
 
QSpiders - Wonderlic Sample Question
QSpiders - Wonderlic Sample QuestionQSpiders - Wonderlic Sample Question
QSpiders - Wonderlic Sample Question
Qspiders - Software Testing Training Institute
 
QSpiders - Chapter- 3 Synchronization point
QSpiders - Chapter- 3 Synchronization pointQSpiders - Chapter- 3 Synchronization point
QSpiders - Chapter- 3 Synchronization point
Qspiders - Software Testing Training Institute
 
QSpiders - Presentation JMeter
QSpiders - Presentation JMeterQSpiders - Presentation JMeter
QSpiders - Presentation JMeter
Qspiders - Software Testing Training Institute
 
QSpiders - Memory (JVM architecture)
QSpiders - Memory (JVM architecture)QSpiders - Memory (JVM architecture)
QSpiders - Memory (JVM architecture)
Qspiders - Software Testing Training Institute
 
QSpiders - Jdk Jvm Jre and Jit
QSpiders - Jdk Jvm Jre and JitQSpiders - Jdk Jvm Jre and Jit
QSpiders - Jdk Jvm Jre and Jit
Qspiders - Software Testing Training Institute
 
QSpiders - Simple replay and run time settings Loadrunner
QSpiders - Simple replay and run time settings LoadrunnerQSpiders - Simple replay and run time settings Loadrunner
QSpiders - Simple replay and run time settings Loadrunner
Qspiders - Software Testing Training Institute
 
QSpiders - Major difference
QSpiders - Major differenceQSpiders - Major difference
QSpiders - Introduction to HP Load Runner
QSpiders - Introduction to HP Load RunnerQSpiders - Introduction to HP Load Runner
QSpiders - Introduction to HP Load Runner
Qspiders - Software Testing Training Institute
 
QSpiders - Interacting with My SQL Database
QSpiders - Interacting with My SQL DatabaseQSpiders - Interacting with My SQL Database
QSpiders - Interacting with My SQL Database
Qspiders - Software Testing Training Institute
 
QSpiders - Automation using Selenium
QSpiders - Automation using SeleniumQSpiders - Automation using Selenium
QSpiders - Automation using Selenium
Qspiders - Software Testing Training Institute
 

More from Qspiders - Software Testing Training Institute (20)

QSpiders - Unix Operating Systems and Commands
QSpiders - Unix Operating Systems  and CommandsQSpiders - Unix Operating Systems  and Commands
QSpiders - Unix Operating Systems and Commands
 
QSpiders - Variable Length-Subnet-Masks
QSpiders - Variable Length-Subnet-MasksQSpiders - Variable Length-Subnet-Masks
QSpiders - Variable Length-Subnet-Masks
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
 
QSpiders - Dod Model
QSpiders - Dod ModelQSpiders - Dod Model
QSpiders - Dod Model
 
QSpiders - Day1 Network Basics
QSpiders - Day1 Network BasicsQSpiders - Day1 Network Basics
QSpiders - Day1 Network Basics
 
QSpiders - Aptitude Assignments
QSpiders - Aptitude AssignmentsQSpiders - Aptitude Assignments
QSpiders - Aptitude Assignments
 
QSpiders - SQL (Data Base)
QSpiders - SQL (Data Base)QSpiders - SQL (Data Base)
QSpiders - SQL (Data Base)
 
QSpiders - Chapter 7 Debugging
QSpiders - Chapter 7 DebuggingQSpiders - Chapter 7 Debugging
QSpiders - Chapter 7 Debugging
 
QSpiders - Chapter 4 Checkpoints
QSpiders - Chapter 4 CheckpointsQSpiders - Chapter 4 Checkpoints
QSpiders - Chapter 4 Checkpoints
 
QSpiders - Simple Recording and Configuration of recording options for HP Loa...
QSpiders - Simple Recording and Configuration of recording options for HP Loa...QSpiders - Simple Recording and Configuration of recording options for HP Loa...
QSpiders - Simple Recording and Configuration of recording options for HP Loa...
 
QSpiders - Wonderlic Sample Question
QSpiders - Wonderlic Sample QuestionQSpiders - Wonderlic Sample Question
QSpiders - Wonderlic Sample Question
 
QSpiders - Chapter- 3 Synchronization point
QSpiders - Chapter- 3 Synchronization pointQSpiders - Chapter- 3 Synchronization point
QSpiders - Chapter- 3 Synchronization point
 
QSpiders - Presentation JMeter
QSpiders - Presentation JMeterQSpiders - Presentation JMeter
QSpiders - Presentation JMeter
 
QSpiders - Memory (JVM architecture)
QSpiders - Memory (JVM architecture)QSpiders - Memory (JVM architecture)
QSpiders - Memory (JVM architecture)
 
QSpiders - Jdk Jvm Jre and Jit
QSpiders - Jdk Jvm Jre and JitQSpiders - Jdk Jvm Jre and Jit
QSpiders - Jdk Jvm Jre and Jit
 
QSpiders - Simple replay and run time settings Loadrunner
QSpiders - Simple replay and run time settings LoadrunnerQSpiders - Simple replay and run time settings Loadrunner
QSpiders - Simple replay and run time settings Loadrunner
 
QSpiders - Major difference
QSpiders - Major differenceQSpiders - Major difference
QSpiders - Major difference
 
QSpiders - Introduction to HP Load Runner
QSpiders - Introduction to HP Load RunnerQSpiders - Introduction to HP Load Runner
QSpiders - Introduction to HP Load Runner
 
QSpiders - Interacting with My SQL Database
QSpiders - Interacting with My SQL DatabaseQSpiders - Interacting with My SQL Database
QSpiders - Interacting with My SQL Database
 
QSpiders - Automation using Selenium
QSpiders - Automation using SeleniumQSpiders - Automation using Selenium
QSpiders - Automation using Selenium
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 

QSpiders - Good to Know Network Concepts

  • 1. Computer Networks - Network Layer 1 The Network Layer
  • 2. Computer Networks: RoutingComputer Networks: Routing 22 Network Layer issues -Network Layer issues -  Concerned with getting packets from source to destination.  The network layer must know the topology of the subnet and choose appropriate paths through it.  When source and destination are in different networks, the network layer (IP) must deal with these differences. * Key issue: what service does the network layer provide to the transport layer (connection-oriented or connectionless).
  • 3. Computer Networks: RoutingComputer Networks: Routing 33 Network Layer Design GoalsNetwork Layer Design Goals 1. The services provided by the network layer should be independent of the subnet topology. 2. The Transport Layer should be shielded from the number, type and topology of the subnets present. 3. The network addresses available to the Transport Layer should use a uniform numbering plan (even across LANs and WANs).
  • 4. Computer Networks: RoutingComputer Networks: Routing 44 Figure 7.2 Physical layer Data link layer Physical layer Data link layer End system α Network layer Physical layer Data link layer Physical layer Data link layer Transport layer Transport layer Messages Messages Segments End system β Network service Network service Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Network layer Network layer Network layer
  • 5. Computer Networks: RoutingComputer Networks: Routing 55 Application Transport Internet Network Interface Application Transport InternetInternet Network 1 Network 2 Machine A Machine B Router/Gateway Network Interface Network Interface Figure 8.3
  • 6. Computer Networks: RoutingComputer Networks: Routing 66 R R R R S SS s ss s ss s ss s R s R Backbone To internet or wide area network Organization Servers Gateway Departmental Server Figure 7.6 Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Metropolitan Area Network (MAN)
  • 7. Computer Networks: RoutingComputer Networks: Routing 77 Interdomain level Intradomain level LAN level Autonomous system or domain Border routers Border routers Figure 7.7 Internet service provider Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Wide Area Network (WAN)
  • 8. Computer Networks: RoutingComputer Networks: Routing 88 RA RB RC Route server NAP National service provider A National service provider B National service provider C LAN NAP NAP (a) (b) Figure 7.8 Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks National ISPs Network Access Point
  • 9. Computer Networks: RoutingComputer Networks: Routing 99 Packet 2 Packet 1 Packet 1 Packet 2 Packet 2 Figure 7.15Copyright ©2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks
  • 10. Computer Networks - Network Layer 10 Goals of the Network Layer  The network layer is concerned with getting packets from the source all the way to the destination  the network layer must − know the topology of the communication subnet − choose route to avoid overloading some of the communication lines and routers while leaving others idle − deal with problems when the source and destination are in different networks
  • 11. Computer Networks - Network Layer 11 Services Provided to the Transport Layer  Connectionless (unreliable) services − each packet must carry the full destination address − no packet ordering and flow control should be done  Connection-oriented (reliable) services − a network layer process on the sending site must set up a connection to its peer on the receiving side − when a connection is set up, two processes can enter a negotiation about service parameters − packets are delivered in sequence − flow control is provided automatically
  • 12. Computer Networks - Network Layer 12 International Organization of the Network Layer  virtual circuit − a route from the source to the destination is chosen as part of the connection setup − primarily for connection-oriented service  datagrams − each packet sent is routed independently of its predecessors − for connection-oriented and connectionless services
  • 13. Computer Networks - Network Layer 13 Datagram Vs. Virtual Circuit Issue Datagram Virtual Circuit (VC) Circuit Setup Not needed Required Addressing Each packet contains the full source and destination address Each packet contains a short VC number State information Subnet does not hold state information Each VC requires subnet table space Routing Each packet is routed independently Route chosen when a VC is set up; all packets follow this route Effect of router failures None, except for packets lost during the crash All VCs that passed through the failed router are terminated Congestion control Difficult Easy if enough buffers can be allocated in advance for each VC
  • 14. Computer Networks - Network Layer 14 Routing  Packets are often routed from the source to the destination hop by hop.  Two networks are connected by at least a router. The network is defined from the point of view of the network layer.
  • 15. Computer Networks - Network Layer 15 Types of Routing  Static Routing (Nonadaptive Routing) − Routes to destinations are predetermined and are not dependent on the current state (traffic, topology etc.) of the network.  Dynamic Routing (Adaptive Routing) − Routes being learned via exchange of routing information to reflect changes in the topology and traffic.  Default Routing: − Traffic to destinations that are unknown to the router is sent to a default “outlet”.
  • 16. Computer Networks - Network Layer 16 The Optimality Principle  If router J is on the optimal path from router I to router K, then the optimal path from J to K also falls along the same route.  the set of optimal routes from all sources to a destination form a tree, called a sink tree, rooted at the destination.  The goal of all routing algorithms is to discover and use the sink trees for all routers. I J Kr1 r2
  • 17. Computer Networks - Network Layer 17 Sink Tree
  • 18. Computer Networks - Network Layer 18 Routing Algorithms  Static Routing Algorithms − Shortest Path Routing − Flooding − Flow-Based Routing  Dynamic Routing Algorithms − Distance Vector Routing − Link State Routing  Hierarchical Routing  Routing for Mobile Hosts  Broadcast Routing  Multicast Routing
  • 19. Computer Networks - Network Layer 19 Shortest Path Routing  Find the shortest path between a given pair of routers.  Cost of a link may be a function of the distance, bandwidth, average traffic, communication cost, mean queue length, delay, etc.  The Dijkstra’s algorithm is used.
  • 20. Computer Networks - Network Layer 20 Flooding  Every incoming packet is sent out on every outgoing line except the one it arrived on.  Vast numbers of duplicate packets are generated.  Application: − Concurrent updates of all distributed databases  Always choose the shortest path I J K L M
  • 21. Computer Networks - Network Layer 21 Flow-Based Routing  For a given line, if the capacity and average flow are known in advance, it is possible to compute the mean packet delay on that line from queuing theory.  The routing problem then reduces to finding a routing algorithm that produces the minimum average delay for the subnet.
  • 22. Computer Networks - Network Layer 22 Distance Vector Routing  RIP, the distributed Bellman-Ford routing algorithm, the Ford-Fulkerson algorithm  Each router maintains a routing table giving the best known distance to each destination and which line to use to get there.  These tables are updated by exchanging information with the neighbors.
  • 23. Computer Networks - Network Layer 23
  • 24. Computer Networks - Network Layer 24 Distance Vector  Each node maintains a set of triples − (Destination, Cost, NextHop)  Exchange updates directly connected neighbors − periodically (on the order of several seconds) − whenever table changes (called triggered update)  Each update is a list of pairs: − (Destination, Cost)  Update local table if receive a “better” route − smaller cost − came from next-hop  Refresh existing routes; delete if they time out
  • 25. Computer Networks - Network Layer 25 Distance Vector Routing  Metric used to measure the “distance” − number of hops − time delay − queue length  Drawback − Count-to-infinity problem − it reacts rapidly to good news, but leisurely to bad news.
  • 26. Computer Networks - Network Layer 26 Traffic may oscillate between the two links
  • 27. Computer Networks - Network Layer 27 Hierarchical Routing  When hierarchical routing is used, the routers are divided into regions − each router knows all the details about how to route packets to destinations within its own region − each router knows nothing about the internal structure of other regions.
  • 28. Computer Networks - Network Layer 28 Broadcast Routing  To simply send a distinct packet to each destination  Flooding  Multidestination Routing  Spanning Tree Routing  Reverse Path Forwarding
  • 29. Computer Networks - Network Layer 29 Multidestination Routing  Each packet contains a list of desired destinations.  When a packet arrives, the router checks all the destinations to determine the set of output lines for forwarding the packet. An output line is selected if it is the best route to at least one of the destinations.  The router generates a new copy of the packet for selected output line, with a set of destinations that are to use the line.
  • 30. Computer Networks - Network Layer 30 Spanning Tree Routing  Assume each router has knowledge of a spanning tree (e.q. a sink tree) in the network.  Each router copies an incoming broadcast packet onto all the spanning tree lines except the one it arrives on.  Use minimum number of packets.
  • 31. Computer Networks - Network Layer 31 Reverse Path Forwarding  Without knowing any spanning tree if a packet arrives at the line that is normally used for sending packets to the source of the broadcast the router forwards copies of it onto all lines except the one it arrived on. otherwise the packet is discarded
  • 32. Computer Networks - Network Layer 32 Multicasting  Send a message to all the other members of the group  group management − create and destroy groups − for processes to join and leave groups  routers knows which of their hosts belong to which group  routers tell their neighbors, so the information propagates through the subnet
  • 33. Computer Networks - Network Layer 33 Multicast Routing  Each router computes a spanning tree covering all other routers in the subnet.  When a multicast packet for a group arrives, the first router examines its spanning tree and prunes it, removing all lines that do not lead to hosts in the group.  Multicast packets are forwarded only along the pruned tree.  mn trees is needed with n groups, each with an average of m members.
  • 34. Computer Networks - Network Layer 34 Core-based Tree for Multicast Routing  A single spanning tree,called core-based tree, for a group is computed, with the root (core) near the middle of the group.  A host first sends a multicasting message to the core, which then does the multicasting along the spanning tree.  The tree is not optimal. However only n trees need to be stored.
  • 35. Computer Networks - Network Layer 35 Congestion  When too many packets are present in (a part of) a subnet, performance degrades. This situation is called congestion. Packetdelivered Packet sent Maximun carrying capacity of subnet Perfect Desirable Congested
  • 36. Computer Networks - Network Layer 36 Congestion Control  goal − make sure the subnet is able to carry the offered traffic  Congestion causes − bursty data − insufficient memory − slow processor − low-bandwidth line
  • 37. Computer Networks - Network Layer 37 Flow Control vs. Congestion Control  Congestion control − Make sure the subnet is able to carry the offered traffic − It is a global issue, involving the behavior of all the hosts, all the routers, and etc.  Flow Control − Relate to the point-to-point traffic between a given sender and a given receiver.
  • 38. Computer Networks - Network Layer 38 Flow Control vs. Congestion Control 1 Gbps 1000 Gbps PC Super Computer 100 Kbps 1 Mbps 1000 1000 Flow Control Congestion Control
  • 39. Computer Networks - Network Layer 39 General Principles  Open Loop − make sure congestion does not occur in the first place − Deciding when to accept new traffic, deciding when to discard packets and which ones, …  Make decision without regard to the current state of the network  Closed Loop − monitor the system to detect congestion (where and when) − pass this information to places where action can be taken − adjust system operation to correct the problem
  • 40. Computer Networks - Network Layer 40 Congestion Control Algorithm Taxonomy (closed loop)  explicit feedback − Packets are sent back from the point of congestion to warn the source.  implicit feedback − The source deduces the existence of congestion by making local observations, such as the acknowledgement time.
  • 41. Computer Networks - Network Layer 41 Load Shedding  when routers are being inundated by packets that they can not handle, they just throw them away.  Packet discarding policy − Wine: Old is better than new. − Milk: New is better than old. − Priority Control
  • 42. Computer Networks - Network Layer 42 Jitter Control  The jitter is the amount of variation in the end-to-end packet transit time.  The jitter can be bounded by computing the expected transit time for each hop along the path. − When a packet arrives at a router, the router checks to see how much the packet is behind or ahead of its schedule. This information is stored in the packet and updated at each hop. If the packet is ahead of schedule, it may be held just enough to get it back on schedule. If it is behind schedule, the router tries to get it out the door quickly.
  • 43. Computer Networks - Network Layer 43 Congestion Control for Multicasting  Multicast flows from multiple sources to multiple destinations (cable television)  if it is the sender that reserves bandwidth − each sender should track membership changes − regenerate the spanning tree at each change  RSVP (Resource reSerVation Protocol) − it is the receiver that reserves bandwidth
  • 44. Computer Networks - Network Layer 44 Bandwidth Reservation Senders Receivers 1 2 3 4 5 Senders Receivers 1 2 3 4 5 Senders 1 2 3 4 5 Bandwidth reserved for source 1 Bandwidth reserved for source 1 Bandwidth reserved for source 2
  • 45. Computer Networks - Network Layer 45 X.25 Internetworking B 802.4 LAN802.3 LAN 802.5 LAN R DECnet R SNA R R
  • 46. Computer Networks - Network Layer 46 Internetworking Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical 7 6 5 4 3 2 1 Layer APDU PPDU SPDU TPDU Packet Frame Bit Application Protocol Presentation Protocol Session Protocol Transport Protocol Host A Host B Network Data Link Physical Network Data Link Physical Router Router Internal Subnet Protocol
  • 47. Computer Networks - Network Layer 47 How Networks Differ  Service offered − Connection-oriented versus Connectionless  Protocol − IP, IPX, CLNP, AppleTalk, DECnet, etc.  Addressing − Flat (802) versus hierarchical (IP, PDN, PSTN, ISDN, etc.)  Multicasting/Broadcasting − Present or absent
  • 48. Computer Networks - Network Layer 48 How Networks Differ (Cont.)  Packet size − Every network has its own maximum  Quality of service − Present or absent  Error handling − Reliable, ordered, and unordered delivery  Flow control − Sliding window, rate control, others, or none
  • 49. Computer Networks - Network Layer 49 How Networks Differ (Cont.)  Congestion control − Leaky bucket, choke packets, etc.  Security − Privacy rules, encryption, etc.  Parameters − Different timeouts, flow specifications, etc.  Accounting − By connection time, by packet, by byte, or not at all
  • 50. Computer Networks - Network Layer 50 Tunneling EthernetEthernet RR WAN IP Ethernet header Ethernet frame IP WAN packet header WAN packet IP Ethernet header Ethernet frame Using encapsulation of IP packets The same type of network
  • 51. Computer Networks - Network Layer 51 Firewalls  Packet filter router is a router equipped with some extra functionality that allows every incoming or outgoing packet to be inspected.  Application gateway (e.g.a mail gateway) may examine headers and/or contents of messages. Application Gateway Packet Filtering Router Packet Filtering Router Inside Outside
  • 52. Computer Networks - Network Layer 52 Internet Network Layer Protocol  The IP (Internal Protocol) Protocol  IP Addressing  Subnets  Internet Control Protocols − The Internet Control Message Protocol (ICMP) − The Address Resolution Protocol (ARP) − The Reverse Address Resolution Protocol (RARP)
  • 53. Computer Networks - Network Layer 53 Internet Network Layer Protocol  The Interior Gateway Routing Protocol: Open Shortest Path First (OSPF)  The Exterior Gateway Routing Protocol: Border Gateway Protocol (BGP)  Internet Multicasting  Mobile IP  Classless InterDomain Routing (CIDR)  IPv4  IPv6
  • 54. 54 IPv4 Header Format • Version – The IP version number, 4. • Header length – The length of the datagram header in 32-bit words. • Type of service – Contains five subfields that specify the precedence, delay, throughput, reliability, and cost desired for a packet. (The Internet does not guarantee this request.) This field is not widely used on the Internet. • Total length – The length of the datagram in bytes including the header, options, and the appended transport protocol segment or packet. The maximum length is 65535 bytes.
  • 55. 55 IPv4 header format • MF – More Fragments. All fragments except the last one have this bit set. • Fragment offset – The relative position of this fragment measured from the beginning of the original datagram in units of 8 bytes. • Time to live – How many routers a datagram can pass through. Each router decrements this value by 1 until it reaches 0 when the datagram is discarded. This keeps misrouted datagrams from remaining on the Internet forever. • Protocol – The high-level protocol type.
  • 56. 56 IPv4 header format • Header checksum – A number that is computed to ensure the integrity of the header values. • Source address – The 32-bit IPv4 address of the sending host. • Destination address – The 32-bit IPv4 address of the receiving host. • Options – A list of optional specifications for security restrictions, route recording, and source routing. Not every datagram specifies an options field. • Padding – Null bytes which are added to make
  • 57. 57 The IP Protocol The IPv4 (Internet Protocol) header.
  • 58. 58 The IP Protocol Some of the IP options. 5-54 • http://www.iana.org/assignments/ip-parameters
  • 59. 59 IP Addresses • An IP address really refers to a network interface, so if a hosts are on two network, it must have two IP addresses. • Traditionally, IP addresses were divided into the five categories: A, B, C, D, E. • Network numbers are managed by a nonprofit corporation called ICANN (Internet Corporation for Assigned Names and Numbers) to avoid conflicts. • Network address, which are 32-bit numbers, are usually written in dotted decimal notation. In this format, each of the 4 bytes is written in
  • 61. 61 IP Addresses • The value 0 means this network or this host. The value of -1 (all 1s) is used as a broadcast address to mean all hosts on the indicated network. • 0.0.0.0 is used by hosts when booted. • IP addresses with 0 as network number refer to the current network. 156.26.10.0. • 255.255.255.255 broadcast on local network • The addresses with a network number and all 1s in the host field allow machines to broadcast to remote LANs. • 127.0.0.1, loopback
  • 63. 63 IP Addresses • dig - DNS lookup utility cs742@kirk:~$ dig www ; <<>> DiG 9.2.1 <<>> www ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28011 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;www. IN A ;; AUTHORITY SECTION: . 10800 IN SOA A.ROOT-SERVERS.NET. NSTLD.VERISIGN- GRS.COM. 2003110201 1800 900 604800 86400 ;; Query time: 139 msec ;; SERVER: 156.26.10.130#53(156.26.10.130) ;; WHEN: Sun Nov 2 21:32:40 2003 ;; MSG SIZE rcvd: 96
  • 64. 64 IP Addresses • nslookup – query Internet name servers interactively cs742@kirk:~$ nslookup www.wichita.edu Note: nslookup is deprecated and may be removed from future releases. Consider using the `dig' or `host' programs instead. Run nslookup with the `-sil[ent]' option to prevent this message from appearing. Server: 156.26.10.130 Address: 156.26.10.130#53 www.wichita.edu canonical name = BLANCA.wichita.edu. Name: BLANCA.wichita.edu Address: 156.26.1.160 • Find out the address in Windows: ipconfig/all
  • 65. 65 What is IPv6? • IPv6 stands for "Internet Protocol Version 6“ and is also referred to as IPng (IP next generation). • IPv6 is the protocol designed by the IETF (The Internet Engineering Task Force) to replace the current version Internet Protocol, IP Version 4 (IPv4). • The core set of IPv6 protocols were made an IETF Draft Standard on August 10, 1998. • For more information about IPv6, refer to http://www.ipv6.org/.
  • 66. 66 Why is IPv6? More Addresses! • IP address allocation history: 1981 ~ IPv4 protocol published 1985 ~ 1/16 total space 1990 ~ 1/8 total space 1995 ~ 1/4 total space 2000 ~ 1/2 total space • More addresses are needed despite increasingly intense conservation efforts – CIDR (classless inter-domain routing) – PPP address sharing – NAT (network address translation) • Theoretical limit of 32-bit space: ~4 billion devices Practical limit of 32-bit space: ~250 million devices
  • 67. 67 IPv6 • IPv6 major goals were: – Support billions of hosts, even with inefficient address space allocation. – Reduce the size of the routing tables. – Simplify the protocol, to allow routers to process packets faster. – Provide better security (authentication and privacy) than current IP. – Pay more attention to type of service, particularly for real-time data. – Aid multicasting by allowing scopes to be specified. – Make it possible for a host to roam without changing its address. – Allow the protocol to evolve in the future. – Permit the old and new protocols to coexist for years.
  • 68. 68 IPv6 • SIPP (Simple Internet Protocol Plus) was selected and given the designation IPv6. • The main features of IPv6: – IPv6 has longer addresses than IPv4. – Improved header processing with better support for options and enhanced routing functionality – Auto-configuration – Better security support – Better support for Quality of Service (QoS)
  • 69. 69 What’s new in IPv6 • Bigger Address Space – 128 bits: solving the address shortage issue: 232 (4.2 billion) to 2128 (340 undecillion or 3.4 x 1038 ) – There are enough IPv6 address to assign • 1 million networks per human • A separate IPv6 address on every square inch of every planet in the solar system • Improved Header Processing and Enhanced routing functionality – Redefinition of IP options in header (7 versus 13 in IPv4) • Format is improved for quicker processing • Some fields are classified such that they may be ignored by intermediate nodes – Inclusion of flow label – Elimination of checksum (let higher layer to compute their own checksum) – Enhanced routing functionality such as roaming a host
  • 70. 70 What’s new in IPv6 • Auto-configuration – Reduced Administrative Overhead • Much of the administrative load for IPv4 nodes involves allocating and managing their IPv4 addresses • IPv6 nodes are able to configure their addresses automatically (Plug and play) – Support renumbering • Experience has shown that Internet nodes don’t keep the same IP address for their life time • A network (e.g., an enterprise intranet) will need renumber based on topology change (wholesale reconnection to another ISP) • An IPv6 node discovers the need for configuring a new IPv6 address for itself.
  • 71. 71 What’s new in IPv6 • Better security support – Reduced Administrative Overhead • Much of the administrative load for IPv4 nodes involves allocating and managing their IPv4 addresses • IPv6 nodes are able to configure their addresses automatically (Plug and play) • Support renumbering – Experience has shown that Internet nodes don’t keep the same IP address for their life time – A network (e.g., an enterprise intranet) will need renumber based on topology change (wholesale reconnection to another ISP) – An IPv6 node discovers the need for configuring a new IPv6 address for itself.
  • 72. 72 Why isn't IPv6 here now? • Why isn't IPv6 here now? – The situation of lack of address spaces are different in different countries. – Some transition solutions such as NAT (Network Address Translation) are there. – There are still not so many applications available for IPv6. – But mobile phones have pushed fast deployment of IPv6.
  • 73. 73 The Main IPv6 Header The IPv6 fixed header (required).
  • 74. 74 The Main IPv6 Header • Version. 4 bits. - IPv6 version number. • Traffic Class. 8 bits. - Internet traffic priority delivery value. • Flow Label. 20 bits. - Used for specifying special router handling from source to destination(s) for a sequence of packets. • Payload Length. 16 bits, unsigned. - Specifies the length of the data in the packet. When set to zero, the option is a hop-by-hop Jumbo payload. • Next Header. 8 bits. - Specifies the next encapsulated protocol. The values are compatible with those specified for the IPv4 protocol field.
  • 75. 75 The Main IPv6 Header • Hop Limit. 8 bits, unsigned. -For each router that forwards the packet, the hop limit is decremented by 1. When the hop limit field reaches zero, the packet is discarded. This replaces the TTL field in the IPv4 header that was originally intended to be used as a time based hop limit. • Source address. 16 bytes. - The IPv6 address of the sending node. • Destination address. 16 bytes. -The IPv6 address of the destination node.
  • 76. 76 How Was IPv6 Address Size Chosen? • Some wanted fixed-length, 64-bit addresses – easily good for 1012 sites, 1015 nodes, at .0001 allocation efficiency – minimizes growth of per-packet header overhead – efficient for software processing • Some wanted variable-length, up to 160 bits – compatible with OSI NSAP addressing plans – big enough for auto-configuration using IEEE 802 addresses – could start with addresses shorter than 64 bits & grow later • Settled on fixed-length, 128-bit addresses (340,282,366,920,938,463,463,374,607,431,768,211,45 6 in all!)
  • 77. 77 IPv6 Addresses • Classless addressing/routing (similar to CIDR) • Notation: x:x:x:x:x:x:x:x (x = 16-bit hex number) – Contiguous 0s are compressed: 47CD::A456:0124 = 47CD:0000:0000:0000:0000:0000:A456:0124 – IPv6 compatible IPv4 address: ::128.42.1.87 • Address assignment – provider-based (can’t change provider easily) – Geographic • IPv6 has many different kinds of addresses – unicast, anycast, multicast, loopback, IPv4-embedded, care-of, manually-assigned, DHCP-assigned, self- assigned, solicited-node, and more. – One simplification: no broadcast addresses in IPv6! – uses multicast to achieve same effects
  • 78. 78 Prefix 0000 0000 0000 0001 0000 001 0000 010 0000 011 0000 1 0001 001 010 011 100 101 110 1110 1111 0 1111 10 1111 110 1111 1110 0 1111 1110 10 1111 1110 11 1111 1111 Use Reserved Unassigned Reserved for NSAP Allocation Reserved for IPX Allocation Unassigned Unassigned Unassigned Unassigned Provider-Based Unicast Address IPV4-like Unassigned Reserved for Geographic-Based Unicast Addresses Unassigned Unassigned Unassigned Unassigned Unassigned Unassigned Unassigned Link Local Use Addresses no global uniqueness Site Local Use Addresses no global uniqueness
  • 79. 79 IPv6 – Multicast and Anycast • IPv6 describes rules for three types of addressing: unicast (one host to one other host), anycast (one host to at least one of multiple hosts), and multicast (one host to multiple hosts). • The introduction of an "anycast" address provides the possibility of sending a message to the nearest of several possible gateway hosts with the idea that any one of them can manage the forwarding of the packet to others. • Anycast messages can be used to update
  • 80. 80 IP version 6 – Future Evolution • The next header field provides for future evolution. • If non-zero, it specifies an extension header type in the packet. • The extension header types include the services for router information, route definition, fragment handling, authentication, encryption information, and destination information. • Each extension header type has a specific size and format and is transmitted after the basic header and before the payload.
  • 82. 82 Extension Headers The hop-by-hop extension header for large datagrams (jumbograms). The extension header for routing.
  • 83. 83 IPv6 Security and Evolution • The advantage of implementing security at the IP level is that it can be applied without the need for security-aware implementations of application programs. • Security in IPv6 is implemented through the authentication and encrypted security payload extension header types , for ensuring data integrity, and for ensuring privacy. • Instead, isolated “island” of IPv6 will converted, initially communicating via tunnels. As the IPv6 islands grow, they will merge into bigger islands. Eventually, all the islands will merge, and the Internet will be fully converted.