The network layer is concerned with routing packets from the source to the destination across multiple networks. It must understand the topology of connected networks and choose optimal paths while avoiding overloading some lines. The network layer provides either connection-oriented or connectionless services to the transport layer and deals with differences when sources and destinations are in different networks. Dynamic routing algorithms like distance vector routing are used to adaptively route packets based on current network conditions.
The document outlines Chapter 4 of a networking textbook. Chapter 4 covers the network layer, including network layer services, how routers work, routing algorithms, and implementations in the Internet. The key topics covered are virtual circuit versus datagram networks, the functions of routers including forwarding and routing, and routing algorithms like link state and distance vector.
The network layer is responsible for delivering packets across multiple networks from source to destination by adding a header containing logical addresses. It provides routing to direct packets through routers to their final destination when independent networks are connected. The transport layer ensures whole messages are delivered intact and in order from specific processes on one computer to specific processes on another by using port addresses and sequencing packets. It can provide connection-oriented or connectionless services and performs error control through retransmissions to ensure reliable end-to-end delivery of data.
The document discusses various layers and concepts in computer networks and internetworking. It covers the network layer and its responsibilities in delivering packets from source to destination. It then discusses services provided by the network layer to the transport layer, including connection-oriented and connectionless services. Various routing algorithms and concepts are covered such as distance vector routing, link state routing, hierarchical routing, flooding, shortest path algorithms, broadcast routing, and multicast routing.
The document discusses the network layer in computer networking. It describes how the network layer is responsible for routing packets from their source to destination. It covers different routing algorithms like distance vector routing and link state routing. It also compares connectionless and connection-oriented services, as well as datagram and virtual circuit subnets. Key aspects of routing algorithms like optimality, stability, and fairness are defined.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
The document discusses network layer design issues related to connectionless and connection-oriented services. Connectionless services route each packet independently, while connection-oriented services establish a logical connection and route all traffic for that connection along the same path. Virtual circuits use connection-oriented services, pre-determining the route and maintaining state information for each connection. Datagram subnets are connectionless, routing each packet independently without state information. Virtual circuits provide easier quality of service and congestion control while datagram subnets are more robust to router failures.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
The document discusses network layer design issues and protocols. It covers store-and-forward packet switching, the functions of the network layer including routing and congestion control. It then describes the implementation of connectionless and connection-oriented services, comparing virtual circuits and datagrams. Various routing algorithms are also summarized, such as shortest path, flooding, distance vector, and link state routing.
The document outlines Chapter 4 of a networking textbook. Chapter 4 covers the network layer, including network layer services, how routers work, routing algorithms, and implementations in the Internet. The key topics covered are virtual circuit versus datagram networks, the functions of routers including forwarding and routing, and routing algorithms like link state and distance vector.
The network layer is responsible for delivering packets across multiple networks from source to destination by adding a header containing logical addresses. It provides routing to direct packets through routers to their final destination when independent networks are connected. The transport layer ensures whole messages are delivered intact and in order from specific processes on one computer to specific processes on another by using port addresses and sequencing packets. It can provide connection-oriented or connectionless services and performs error control through retransmissions to ensure reliable end-to-end delivery of data.
The document discusses various layers and concepts in computer networks and internetworking. It covers the network layer and its responsibilities in delivering packets from source to destination. It then discusses services provided by the network layer to the transport layer, including connection-oriented and connectionless services. Various routing algorithms and concepts are covered such as distance vector routing, link state routing, hierarchical routing, flooding, shortest path algorithms, broadcast routing, and multicast routing.
The document discusses the network layer in computer networking. It describes how the network layer is responsible for routing packets from their source to destination. It covers different routing algorithms like distance vector routing and link state routing. It also compares connectionless and connection-oriented services, as well as datagram and virtual circuit subnets. Key aspects of routing algorithms like optimality, stability, and fairness are defined.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
The document discusses network layer design issues related to connectionless and connection-oriented services. Connectionless services route each packet independently, while connection-oriented services establish a logical connection and route all traffic for that connection along the same path. Virtual circuits use connection-oriented services, pre-determining the route and maintaining state information for each connection. Datagram subnets are connectionless, routing each packet independently without state information. Virtual circuits provide easier quality of service and congestion control while datagram subnets are more robust to router failures.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
The document discusses network layer design issues and protocols. It covers store-and-forward packet switching, the functions of the network layer including routing and congestion control. It then describes the implementation of connectionless and connection-oriented services, comparing virtual circuits and datagrams. Various routing algorithms are also summarized, such as shortest path, flooding, distance vector, and link state routing.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
1) In a connectionless datagram subnet, packets are routed independently without establishing a connection. Routers break messages into packets that are forwarded based on internal routing tables.
2) In a connection-oriented virtual circuit subnet, a connection path must be established before packets can be sent. Each packet carries an identifier of its virtual circuit. Routers replace circuit identifiers to avoid conflicts at downstream routers.
3) Both approaches were compared, noting that connectionless datagrams require no setup but have independent routing, while virtual circuits require setup but can forward all packets along the same pre-established path.
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
The document compares the performance of the Dynamic Source Routing (DSR) protocol and Cluster Based Routing Protocol (CBRP) in mobile ad hoc networks. It simulates the two protocols under varying conditions of node density, mobility, and network traffic. The results show that CBRP generally has better packet delivery, channel utilization, delay, routing load, and control overhead, especially in denser networks with higher traffic and mobility levels, indicating it is more scalable for large ad hoc networks.
The document discusses network layer performance and congestion control. It covers key network layer performance metrics like delay, throughput and packet loss. It then discusses various sources of delay like transmission, propagation, processing and queuing delays. It also discusses throughput and packet loss. The second half of the document focuses on congestion control techniques including open-loop methods like retransmission policies and closed-loop methods like backpressure and explicit signaling.
This document discusses clustering-based ad hoc routing protocols. It introduces the Clusterhead Gateway Switch Routing (CSGR) protocol, which uses a hierarchical network topology with mobile nodes grouped into clusters led by cluster heads. Each node maintains a cluster member table mapping nodes to cluster heads and a routing table to select the next hop towards the destination cluster head. The Least Cluster Change algorithm aims to minimize changes to cluster heads. The document provides an example routing from node 1 to node 12 and compares CSGR to the table-driven DSDV protocol.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
The document outlines the key concepts in the network layer chapter, including:
- The functions of the network layer including forwarding, routing, and connection setup in some architectures.
- The differences between virtual circuit and datagram networks and how routers and forwarding work differently in each.
- An overview of the main components and functions of a router, including routing processors, switching fabrics, input/output ports, and forwarding tables.
- Details on IP as the main network layer protocol used in the Internet, including its datagram format, addressing, and fragmentation.
The document summarizes key aspects of the transport layer and two main Internet transport protocols: TCP and UDP. It describes how the transport layer provides logical communication between application processes on different hosts by breaking messages into segments and reassembling them. TCP provides reliable, in-order delivery using congestion control with additive increase/multiplicative decrease, while UDP provides unreliable delivery. The document also discusses causes of network congestion and how TCP detects and responds to packet loss.
The document discusses on-demand driven reactive routing protocols. It provides an overview of table-driven vs on-demand routing protocols and describes two popular on-demand protocols - Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) in detail. DSR uses source routing by adding the complete route to packet headers. AODV maintains routing tables at nodes and relies on dynamically establishing next hop information for routes.
This document defines packet switching and discusses several packet switching technologies. It begins by defining packet switching as dividing messages into packets that can follow different routes to the destination, where they are then recompiled. It then discusses three main packet switching technologies: TCP/IP, X.25, and Frame Relay. It provides details on each technology and notes that Frame Relay was implemented in Malaysia and replaced X.25 for connections within wide area networks.
The document discusses packet switching and computer networks. It describes how packet switches enable packets to travel between hosts even without a direct connection by using buffers and queues. It explains the two main approaches to packet switching - connectionless datagram switching which uses destination addresses, and connection-oriented virtual circuit switching which establishes connections using labels. The key aspects of each approach like forwarding tables, signaling process, and connection setup and teardown are outlined.
This document compares proactive and reactive routing protocols in mobile ad-hoc networks. It classifies routing protocols as either proactive, which maintain routes at all times, or reactive, which determine routes on demand. Proactive protocols have lower latency but higher overhead, while reactive protocols have higher latency but lower overhead. The document evaluates the performance of AODV, TORA, and DSDV protocols based on packet delivery ratio, average end-to-end delay, and throughput under both CBR and TCP traffic patterns. Simulation results found reactive protocols had better packet delivery and delay, with performance varying based on node number and traffic type.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
The document summarizes several routing protocols used in wireless networks. It discusses both table-driven protocols like DSDV and on-demand protocols like AODV. It provides details on how each protocol performs routing and maintains routes. It also outlines some advantages and disadvantages of protocols like DSDV, AODV, DSR, and TORA.
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...Pranjal Das
This document summarizes a project presentation on analyzing the performance of CSMA/CA and TDMA MAC protocols in wireless mesh networks. It first provides background on wireless mesh networks and describes their architecture and characteristics. It then discusses CSMA/CA and TDMA protocols and how they work. The project involved simulating a wireless mesh network topology using NS-2 and evaluating the performance of the two protocols based on metrics like throughput, delay, and packet loss under varying conditions like number of hops and link distance. The results showed that TDMA performance was better than CSMA/CA. The conclusion recommends further analysis using directional antennas.
Routing is the mechanism for finding the most cost-effective path from source to destination in a packet switching network. There are several desirable properties for routing algorithms including correctness, robustness, stability, fairness, and efficiency. Common routing strategies include fixed/static routing, flooding, random routing, flow-based routing, and adaptive/dynamic routing. Fixed routing selects predetermined routes that may only change if the network topology changes, while flooding explores all possible routes by sending every incoming packet out every outgoing line except the one it arrived on.
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
The document discusses solved papers from past exams on ad hoc networks. It includes answers to multiple choice and descriptive questions covering topics such as wireless mesh networks, hybrid wireless networks, issues in designing ad hoc wireless internet, MAC protocol design considerations including QoS and hidden node problems, and routing protocols for ad hoc networks including CGSR and ZRP. Diagrams and detailed explanations are provided for many of the concepts and protocols discussed.
Object-oriented analysis and design (OOAD) emphasizes investigating requirements rather than solutions, and conceptual solutions that fulfill requirements rather than implementations. OOAD focuses on identifying domain concepts and defining software objects and how they collaborate. The Unified Process includes inception, elaboration, construction, and transition phases with iterations and milestones leading to final product releases.
Haiku Deck is a presentation tool that allows users to create Haiku-style slideshows. The tool encourages users to get started making their own Haiku Deck presentations, which can be shared on SlideShare. In just 3 sentences, it promotes creating Haiku Deck presentations and publishing them to SlideShare.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
1) In a connectionless datagram subnet, packets are routed independently without establishing a connection. Routers break messages into packets that are forwarded based on internal routing tables.
2) In a connection-oriented virtual circuit subnet, a connection path must be established before packets can be sent. Each packet carries an identifier of its virtual circuit. Routers replace circuit identifiers to avoid conflicts at downstream routers.
3) Both approaches were compared, noting that connectionless datagrams require no setup but have independent routing, while virtual circuits require setup but can forward all packets along the same pre-established path.
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
The document compares the performance of the Dynamic Source Routing (DSR) protocol and Cluster Based Routing Protocol (CBRP) in mobile ad hoc networks. It simulates the two protocols under varying conditions of node density, mobility, and network traffic. The results show that CBRP generally has better packet delivery, channel utilization, delay, routing load, and control overhead, especially in denser networks with higher traffic and mobility levels, indicating it is more scalable for large ad hoc networks.
The document discusses network layer performance and congestion control. It covers key network layer performance metrics like delay, throughput and packet loss. It then discusses various sources of delay like transmission, propagation, processing and queuing delays. It also discusses throughput and packet loss. The second half of the document focuses on congestion control techniques including open-loop methods like retransmission policies and closed-loop methods like backpressure and explicit signaling.
This document discusses clustering-based ad hoc routing protocols. It introduces the Clusterhead Gateway Switch Routing (CSGR) protocol, which uses a hierarchical network topology with mobile nodes grouped into clusters led by cluster heads. Each node maintains a cluster member table mapping nodes to cluster heads and a routing table to select the next hop towards the destination cluster head. The Least Cluster Change algorithm aims to minimize changes to cluster heads. The document provides an example routing from node 1 to node 12 and compares CSGR to the table-driven DSDV protocol.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
The document outlines the key concepts in the network layer chapter, including:
- The functions of the network layer including forwarding, routing, and connection setup in some architectures.
- The differences between virtual circuit and datagram networks and how routers and forwarding work differently in each.
- An overview of the main components and functions of a router, including routing processors, switching fabrics, input/output ports, and forwarding tables.
- Details on IP as the main network layer protocol used in the Internet, including its datagram format, addressing, and fragmentation.
The document summarizes key aspects of the transport layer and two main Internet transport protocols: TCP and UDP. It describes how the transport layer provides logical communication between application processes on different hosts by breaking messages into segments and reassembling them. TCP provides reliable, in-order delivery using congestion control with additive increase/multiplicative decrease, while UDP provides unreliable delivery. The document also discusses causes of network congestion and how TCP detects and responds to packet loss.
The document discusses on-demand driven reactive routing protocols. It provides an overview of table-driven vs on-demand routing protocols and describes two popular on-demand protocols - Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) in detail. DSR uses source routing by adding the complete route to packet headers. AODV maintains routing tables at nodes and relies on dynamically establishing next hop information for routes.
This document defines packet switching and discusses several packet switching technologies. It begins by defining packet switching as dividing messages into packets that can follow different routes to the destination, where they are then recompiled. It then discusses three main packet switching technologies: TCP/IP, X.25, and Frame Relay. It provides details on each technology and notes that Frame Relay was implemented in Malaysia and replaced X.25 for connections within wide area networks.
The document discusses packet switching and computer networks. It describes how packet switches enable packets to travel between hosts even without a direct connection by using buffers and queues. It explains the two main approaches to packet switching - connectionless datagram switching which uses destination addresses, and connection-oriented virtual circuit switching which establishes connections using labels. The key aspects of each approach like forwarding tables, signaling process, and connection setup and teardown are outlined.
This document compares proactive and reactive routing protocols in mobile ad-hoc networks. It classifies routing protocols as either proactive, which maintain routes at all times, or reactive, which determine routes on demand. Proactive protocols have lower latency but higher overhead, while reactive protocols have higher latency but lower overhead. The document evaluates the performance of AODV, TORA, and DSDV protocols based on packet delivery ratio, average end-to-end delay, and throughput under both CBR and TCP traffic patterns. Simulation results found reactive protocols had better packet delivery and delay, with performance varying based on node number and traffic type.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
The document summarizes several routing protocols used in wireless networks. It discusses both table-driven protocols like DSDV and on-demand protocols like AODV. It provides details on how each protocol performs routing and maintains routes. It also outlines some advantages and disadvantages of protocols like DSDV, AODV, DSR, and TORA.
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...Pranjal Das
This document summarizes a project presentation on analyzing the performance of CSMA/CA and TDMA MAC protocols in wireless mesh networks. It first provides background on wireless mesh networks and describes their architecture and characteristics. It then discusses CSMA/CA and TDMA protocols and how they work. The project involved simulating a wireless mesh network topology using NS-2 and evaluating the performance of the two protocols based on metrics like throughput, delay, and packet loss under varying conditions like number of hops and link distance. The results showed that TDMA performance was better than CSMA/CA. The conclusion recommends further analysis using directional antennas.
Routing is the mechanism for finding the most cost-effective path from source to destination in a packet switching network. There are several desirable properties for routing algorithms including correctness, robustness, stability, fairness, and efficiency. Common routing strategies include fixed/static routing, flooding, random routing, flow-based routing, and adaptive/dynamic routing. Fixed routing selects predetermined routes that may only change if the network topology changes, while flooding explores all possible routes by sending every incoming packet out every outgoing line except the one it arrived on.
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
The document discusses solved papers from past exams on ad hoc networks. It includes answers to multiple choice and descriptive questions covering topics such as wireless mesh networks, hybrid wireless networks, issues in designing ad hoc wireless internet, MAC protocol design considerations including QoS and hidden node problems, and routing protocols for ad hoc networks including CGSR and ZRP. Diagrams and detailed explanations are provided for many of the concepts and protocols discussed.
Object-oriented analysis and design (OOAD) emphasizes investigating requirements rather than solutions, and conceptual solutions that fulfill requirements rather than implementations. OOAD focuses on identifying domain concepts and defining software objects and how they collaborate. The Unified Process includes inception, elaboration, construction, and transition phases with iterations and milestones leading to final product releases.
Haiku Deck is a presentation tool that allows users to create Haiku-style slideshows. The tool encourages users to get started making their own Haiku Deck presentations, which can be shared on SlideShare. In just 3 sentences, it promotes creating Haiku Deck presentations and publishing them to SlideShare.
Dokumen ini membahas masalah kekerasan yang menimpa siswa di sekolah, di mana tiga siswi menjadi korban pembunuhan oleh pelajar lain dalam kurun waktu beberapa bulan. Dokumen ini menganalisis peristiwa tersebut dari sisi hukum dan juga memberikan saran untuk mencegah kejadian serupa di masa depan, antara lain dengan melibatkan masyarakat dalam program sekolah dan menanamkan pendidikan karakter untuk
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Guru memegang peran kunci dalam implementasi kurikulum baru. Penelitian menunjukkan bahwa kualitas pengajaran guru berpengaruh besar terhadap kesuksesan siswa di masa depan. Namun, kenaikan gaji saja tidak cukup untuk meningkatkan kualitas pengajaran tanpa pelatihan yang tepat. Pemerintah perlu melatih guru secara profesional untuk menerapkan kurikulum baru dengan baik.
Data preprocessing is crucial for data mining and includes data cleaning, integration, reduction, and discretization. The goals are to handle missing data, smooth noisy data, reduce inconsistencies, integrate multiple sources, and reduce data size while maintaining analytical results. Common techniques include filling in missing values, identifying and handling outliers, aggregating data, feature selection, normalization, binning, clustering, and generating concept hierarchies. Preprocessing addresses issues like dirty, incomplete, inconsistent or redundant data to improve mining quality and efficiency.
The document discusses data mining and knowledge discovery from large data sets. It begins by defining the terms data, information, knowledge, and wisdom. It then explains that the growth of data from various sources has created a need for data mining to extract useful knowledge from large data repositories. Data mining involves non-trivial analysis of implicit patterns in large data sets. It is an interdisciplinary field that draws from areas like machine learning, statistics, database technology, and visualization. The goal is to transform data into actionable information through an iterative process of identifying problems, mining data, acting on results, and measuring impact.
La Constitución española de 1812, conocida como La Pepa, fue la primera Constitución promulgada en España. Fue aprobada el 19 de marzo de 1812 en Cádiz debido a la invasión de Napoleón. La Pepa estableció un sistema liberal de gobierno y es considerada una de las constituciones más progresistas de su época.
Prolog is a logic programming language well-suited for problems involving structured objects and relations. The document discusses how Prolog represents relations through facts and rules. Facts unconditionally declare true instances of a relation, like "parent(tom, bob)". Rules specify conclusions that are true if conditions are met, written as "conclusion :- conditions". For example, the offspring relation is defined with the rule "offspring(Y, X) :- parent(X, Y)". Questions can then be asked and answered based on the defined facts and rules.
Data preprocessing is an important step for data mining and warehousing. It involves cleaning data by handling missing values, outliers, and inconsistencies. It also includes integrating, transforming, and reducing data. The goals are to improve data quality, reduce data size, and prepare data for mining algorithms. Key techniques include data cleaning, discretization of continuous attributes, feature selection, and various data reduction methods like binning, clustering, and sampling. Preprocessing helps produce higher quality mining results based on higher quality input data.
The document discusses using various types of student data to inform instruction, including running records, testing data, student work samples, and staff data. It emphasizes looking at data to understand what students know, still need to learn, and their next steps. Teachers should differentiate instruction based on student data, ensuring the right material is used to build on prior learning and assess upcoming skills.
Exception handling in Java allows programs to handle errors and unexpected conditions gracefully using try, catch, throw, throws and finally keywords. An exception is an event that occurs during program execution that disrupts normal flow of program instructions. Exceptions can be generated by the Java runtime system or manually by code. The try block contains code that might throw exceptions. The catch blocks define what to do if an exception occurs. Finally blocks contain code that always executes after try and catch blocks.
destination. The network layer must know the topology of the subnet and choos...Ashish Gupta
The document discusses routing in computer networks at the network layer. It covers key topics such as routing algorithms, distance vector routing, link state routing, OSPF, and BGP. The main points are:
1) Routing algorithms determine the best path between source and destination networks and involve exchanging routing information between routers.
2) Distance vector algorithms like RIP use hop count as the metric and exchange full routing tables periodically between neighbors. Link state algorithms like OSPF flood link state information to all routers.
3) OSPF divides domains into areas to reduce routing overhead and uses different LSA types to distribute routing information within and between areas. BGP handles interdomain routing between autonomous systems
The document discusses routing in computer networks at the network layer. It covers routing algorithms like distance vector routing, link state routing, OSPF, and BGP. Distance vector routing uses hop counts as the metric and is prone to slow convergence. Link state routing floods link state information to all routers to compute shortest paths more quickly. OSPF and BGP are examples of link state and path vector routing protocols used between autonomous systems on the Internet.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
The document discusses contention networks, carrier sense multiple access (CSMA), components of routers, modular network interfaces in routers, differences between hubs, layer 2 switches and layer 3 switches, packet tunneling, shortest path routing, packet fragmentation, functions of routing processors, evolution of router construction, minimum spanning trees, routing protocols for mobile hosts, TCP/IP tunneling over ATM, distance vector routing, link state routing, hierarchical routing, ATM networks, creating ATM virtual circuits, segmentation and reassembly in ATM, internetworking using concatenated virtual circuits and connectionless internetworking, network properties, and an example of the TCP/IP protocol in action.
The network layer is responsible for end-to-end packet delivery across multiple hops between source and destination devices. It must choose appropriate paths through the network topology to avoid overloading some links while leaving others idle. The network layer deals with issues like routing, logical addressing, and internetworking between different network types. The main functions of the network layer are routing, logical addressing, internetworking, and fragmentation.
The document discusses the network layer and routing algorithms. It begins by defining the network layer and its responsibilities like routing packets across networks using logical addressing. It then discusses network layer design issues such as store-and-forward packet switching and services provided to the transport layer. Implementation of connectionless and connection-oriented services are explained along with a comparison of virtual-circuit and datagram networks. Finally, it covers routing algorithms like flooding and distance vector routing where routers maintain routing tables and exchange information with neighbors.
The document discusses network layer concepts including network layer design issues, routing algorithms, and protocols. It provides 3 key points:
1) The network layer is responsible for delivering packets between endpoints over multiple links using store-and-forward packet switching. It implements both connectionless and connection-oriented services for the transport layer.
2) Common routing algorithms discussed include shortest path algorithms like Dijkstra's algorithm, flooding, and distance vector routing. Flooding broadcasts all packets while distance vector uses the Bellman-Ford equation to iteratively calculate the shortest paths.
3) Protocols discussed include IPv4, IPv6, ARP, RARP, DHCP, and ICMP. Connectionless transmission uses datagrams while connection
The document proposes a distributed adaptive opportunistic routing scheme for wireless ad hoc networks. It uses a reinforcement learning framework to route packets opportunistically even without knowledge of channel statistics or network models. This approach jointly addresses learning and routing opportunistically by exploiting transmission successes. Nodes learn to optimally explore and exploit opportunities in the network to minimize the expected average per packet cost of routing from source to destination.
The document discusses mobile ad-hoc networks (MANETs) and routing protocols for MANETs. It begins with an introduction to MANETs, describing their characteristics such as lack of fixed infrastructure and dynamic topologies. It then covers several popular routing protocols for MANETs, including proactive protocols like DSDV, reactive protocols like DSR, and hybrid protocols like ZRP. For each protocol, it provides a brief overview of how the protocol works and its advantages and disadvantages.
The document discusses routing protocols used in internets and autonomous systems. It describes how distance vector routing protocols like RIP work by sharing routing tables between neighbors. It also explains link state routing protocols like OSPF, where each router shares information about connected links and all routers can independently calculate optimal routes. Finally, it outlines path vector routing and BGP, which is used for inter-domain routing between autonomous systems and considers routing policies.
This PPT focuses on the basic concepts of routing protocols including the executive summary of basic computer networks.
Regarding to the routing protocol concepts, it gives us a brief information of routing, protocol, routing protocol, types of routing protocol, metrics of a routing protocol algorithms...
1.NggggggggggghhhhhhhhhhS UNIT - 1.pptx.pdfsadoyah492
The document discusses various networking devices and network layer attacks. It begins by defining networking devices that operate at different layers, such as network interface cards, routers, switches, hubs, bridges, and gateways. It then covers different types of network layer attacks like IP spoofing, hijacking, Smurf attacks, wormhole attacks, and others. The document provides details on each attack method, how they are carried out, and their impact on network communication.
The document discusses datagram versus virtual circuit networks and their implementations. It provides details on routing algorithms, including Dijkstra's shortest path algorithm, and classifications of routing algorithms. It describes issues that arose with early ARPANET routing, such as count to infinity problems and slow convergence. Methods to address these issues are presented, such as split horizon updating and link state routing.
The document discusses routing algorithms used in computer networks. It describes how routing algorithms determine the path that packets take from source to destination. Dynamic routing algorithms adapt to changing network conditions by updating routing tables. Common dynamic algorithms include distance vector routing and link state routing. The document also covers challenges like routing in hierarchical networks, broadcast routing, multicast routing, and routing for mobile and ad-hoc networks.
The document discusses routing algorithms in computer networks. It describes the functions of the network layer, including internetworking, addressing, routing, and packetizing. It then focuses on routing algorithms, classifying them as either adaptive or non-adaptive. Adaptive algorithms make routing decisions dynamically based on network conditions, while non-adaptive algorithms use static routing tables. Specific adaptive algorithms discussed include distance vector routing and link state routing, along with explanations of how each works.
The document discusses topics related to computer networks and networking. It covers wireless LANs, connecting devices like hubs and switches, virtual LANs, and various aspects of the network layer including packetizing, routing, forwarding, packet switching approaches, IPv4 addressing, and forwarding of IP packets. Specific topics within the network layer section include packetizing, routing and forwarding services, error control, congestion control, datagram and virtual circuit approaches to packet switching, and IPv4 addressing structures like address space, notation, hierarchy, and classful addressing.
ip routing and troubleshooting algorithmsVo Cong Minh
Types of MANET ROUTING.
Objectives
● Present the basic principles of routing in general
packet-switched networks
● Describe the basic principles of mobile ad hoc
networks (MANETs) and MANET routing protocols
● Describe AODV and OLSR as example MANET
routing protocols
● Discuss issues related to mobile ad hoc networks
and MANET routing protocols
Tcil_Concept of Routing_n_protocols.pptxVINAYTANWAR18
Routing allows data to be transferred between different networks and subnets. Routers use routing tables to determine the best path for packets to travel. Routing tables can be populated through static or dynamic routing protocols. Dynamic routing protocols use metrics like hop count or bandwidth to calculate the optimal route and update routing tables automatically based on network changes. Common routing protocols include RIP, OSPF, and BGP.
An adaptive opportunistic routing scheme for wireless ad hoc networksanish9291
The document proposes an adaptive opportunistic routing scheme for wireless ad-hoc networks. It uses a reinforcement learning framework to route packets opportunistically even without reliable knowledge of channel statistics or network model. This distributed approach allows each node to make routing decisions based on local information to optimally explore and exploit opportunities in the network. The implementation involves planning, investigating existing systems, designing a changeover method, and evaluating the changeover. It uses a d-Adaptor algorithm and modules for initialization, transmission, acknowledgement message passing, and relays.
Mobile ad-hoc networks have frequent host and topology changes with no cellular infrastructure and require multi-hop wireless links for data transmission between nodes. Routing protocols must discover routes between nodes that may not be directly connected. Table-driven protocols like Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) maintain up-to-date routing tables through periodic broadcasts but generate significant control overhead. DSDV uses sequence numbers to distinguish stale routes and avoid loops while WRP maintains four tables for routing information.
Similar to QSpiders - Good to Know Network Concepts (20)
The document discusses variable-length subnet masks (VLSM) and route summarization in networking. It provides examples of how a subnet mask can vary in length to further divide a subnet into smaller subnets. It also explains how route summarization works by summarizing addresses of several networks into one address to reduce the size of routing tables. The document includes examples of VLSM implementation and route summarization within an octet and in a VLSM-designed network.
The document discusses the OSI model and networking layers. It provides details on the functions of each layer, including physical, data link, network, transport, session, presentation and application layers. Key points covered include how each layer works independently and interfaces with adjacent layers, common protocols and services used at each layer, and how network devices operate at certain layers to enable communication.
Interest Assignments
Partnership Assignments
Percentages Assignment
Profit and Loss
Assignments
Proportion Assignments
Set Theory Assignments
Time and Distance Assignments
Time and Work Assignments
Permutation Assignments
Allegation Assignments
AP,GP Assignments
Data is a useful information
Which helps to make a decision
Set of information of any entity is known as data
Databases support storage and manipulation of data
Controlling test runs can help you to identify and eliminate defects in your tests.
The Debug Viewer tabs can display the values of variables or objects in the main script of the current action or in a selected subroutine.
Synchronizing Your Test
Tests can be synchronized either of the ways
Synchronization point
Exist or Wait statements
Increase the default timeout settings
The JVM architecture has four main memory areas:
1. The method area stores all class files and instance methods.
2. The stack region executes methods and stores local variables.
3. The heap area stores all objects and static variables.
4. The native method area stores code for native languages like C and C++.
JDK stand for java development kit.
JVM stands for Java Virtual Machine.
JRE is the responsible unit to run the java program.
JIT stands for Just In Time compiler.
The document discusses various runtime settings in HP LoadRunner that define how a script runs, including:
- Emulation settings that configure how users are simulated, such as think time and pacing.
- Logging settings that determine the level of information recorded.
- Network settings that control bandwidth emulation.
- Browser settings that configure aspects like the user agent and cache.
- Error handling settings that specify behavior for errors.
- Multithreading settings that control how VUsers are distributed across machines.
- Transaction settings that determine automatic transaction boundaries.
The document compares and contrasts several key Java concepts:
1. Constructors are used to initialize objects and are called during object creation, while methods are called externally to perform functionality and can be inherited, overridden, and declared as various modifiers like final or static.
2. Abstract classes can contain both abstract and concrete methods and are used when a common property needs to be shared, while interfaces contain only abstract methods and are used when no common property needs to be shared, allowing multiple inheritance.
3. Collections store objects dynamically while arrays store both primitives and objects with a fixed size; collections provide more object-oriented utility methods than arrays.
This document provides instructions for interacting with a MySQL database using the MySQL command line client. It explains how to open the client, select a database, create tables, insert and retrieve data, update records, and delete records. The key steps are to open the MySQL client, select a database, connect to it, then use SQL statements like CREATE, INSERT, SELECT, UPDATE, and DELETE to manage tables and data within the selected database.
The document discusses automation testing using Selenium. It provides an overview of Selenium, including what it is, its components like Selenium IDE, Selenium RC, Selenium Grid, and Selenium WebDriver. It explains the features and advantages of each component. Selenium is an open source tool that allows automated testing of web applications across different browsers and platforms. It supports recording and playback of tests and can help reduce testing time and costs through automation.
More from Qspiders - Software Testing Training Institute (20)
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
2. Computer Networks: RoutingComputer Networks: Routing 22
Network Layer issues -Network Layer issues -
Concerned with getting packets from source
to destination.
The network layer must know the topology of
the subnet and choose appropriate paths
through it.
When source and destination are in different
networks, the network layer (IP) must deal
with these differences.
* Key issue: what service does the network
layer provide to the transport layer
(connection-oriented or connectionless).
3. Computer Networks: RoutingComputer Networks: Routing 33
Network Layer Design GoalsNetwork Layer Design Goals
1. The services provided by the network layer
should be independent of the subnet
topology.
2. The Transport Layer should be shielded
from the number, type and topology of the
subnets present.
3. The network addresses available to the
Transport Layer should use a uniform
numbering plan (even across LANs and
WANs).
10. Computer Networks - Network Layer 10
Goals of the Network Layer
The network layer is concerned with getting
packets from the source all the way to the
destination
the network layer must
− know the topology of the communication subnet
− choose route to avoid overloading some of the
communication lines and routers while leaving
others idle
− deal with problems when the source and
destination are in different networks
11. Computer Networks - Network Layer 11
Services Provided to the Transport
Layer
Connectionless (unreliable) services
− each packet must carry the full destination
address
− no packet ordering and flow control should be
done
Connection-oriented (reliable) services
− a network layer process on the sending site must set up a
connection to its peer on the receiving side
− when a connection is set up, two processes can enter a
negotiation about service parameters
− packets are delivered in sequence
− flow control is provided automatically
12. Computer Networks - Network Layer 12
International Organization of the
Network Layer
virtual circuit
− a route from the source to the destination is
chosen as part of the connection setup
− primarily for connection-oriented service
datagrams
− each packet sent is routed independently of its
predecessors
− for connection-oriented and connectionless
services
13. Computer Networks - Network Layer 13
Datagram Vs. Virtual Circuit
Issue Datagram Virtual Circuit (VC)
Circuit Setup Not needed Required
Addressing Each packet contains the full
source and destination address
Each packet contains a short
VC number
State
information
Subnet does not hold state
information
Each VC requires subnet table
space
Routing Each packet is routed
independently
Route chosen when a VC is set
up; all packets follow this route
Effect of router
failures
None, except for packets lost
during the crash
All VCs that passed through the
failed router are terminated
Congestion
control
Difficult Easy if enough buffers can be
allocated in advance for each
VC
14. Computer Networks - Network Layer 14
Routing
Packets are often routed from the source to
the destination hop by hop.
Two networks are connected by at least a
router. The network is defined from the
point of view of the network layer.
15. Computer Networks - Network Layer 15
Types of Routing
Static Routing (Nonadaptive Routing)
− Routes to destinations are predetermined and are
not dependent on the current state (traffic,
topology etc.) of the network.
Dynamic Routing (Adaptive Routing)
− Routes being learned via exchange of routing
information to reflect changes in the topology and
traffic.
Default Routing:
− Traffic to destinations that are unknown to the
router is sent to a default “outlet”.
16. Computer Networks - Network Layer 16
The Optimality Principle
If router J is on the optimal path from router I
to router K, then the optimal path from J to K
also falls along the same route.
the set of optimal routes from all sources to a
destination form a tree, called a sink tree, rooted
at the destination.
The goal of all routing algorithms is to
discover and use the sink trees for all
routers.
I
J
Kr1
r2
19. Computer Networks - Network Layer 19
Shortest Path Routing
Find the shortest path between a given pair
of routers.
Cost of a link may be a function of the
distance, bandwidth, average traffic,
communication cost, mean queue length,
delay, etc.
The Dijkstra’s algorithm is used.
20. Computer Networks - Network Layer 20
Flooding
Every incoming packet is sent out on every
outgoing line except the one it arrived on.
Vast numbers of duplicate packets are
generated.
Application:
− Concurrent updates of all distributed databases
Always choose the shortest path
I
J
K
L
M
21. Computer Networks - Network Layer 21
Flow-Based Routing
For a given line, if the capacity and average
flow are known in advance, it is possible to
compute the mean packet delay on that line
from queuing theory.
The routing problem then reduces to finding
a routing algorithm that produces the
minimum average delay for the subnet.
22. Computer Networks - Network Layer 22
Distance Vector Routing
RIP, the distributed Bellman-Ford routing
algorithm, the Ford-Fulkerson algorithm
Each router maintains a routing table giving
the best known distance to each destination
and which line to use to get there.
These tables are updated by exchanging
information with the neighbors.
24. Computer Networks - Network Layer 24
Distance Vector
Each node maintains a set of triples
− (Destination, Cost, NextHop)
Exchange updates directly connected neighbors
− periodically (on the order of several seconds)
− whenever table changes (called triggered update)
Each update is a list of pairs:
− (Destination, Cost)
Update local table if receive a “better” route
− smaller cost
− came from next-hop
Refresh existing routes; delete if they time out
25. Computer Networks - Network Layer 25
Distance Vector Routing
Metric used to measure the “distance”
− number of hops
− time delay
− queue length
Drawback
− Count-to-infinity problem
− it reacts rapidly to good news, but leisurely to
bad news.
26. Computer Networks - Network Layer 26
Traffic may oscillate between the
two links
27. Computer Networks - Network Layer 27
Hierarchical Routing
When hierarchical routing is used, the
routers are divided into regions
− each router knows all the details about how to
route packets to destinations within its own
region
− each router knows nothing about the internal
structure of other regions.
28. Computer Networks - Network Layer 28
Broadcast Routing
To simply send a distinct packet to each
destination
Flooding
Multidestination Routing
Spanning Tree Routing
Reverse Path Forwarding
29. Computer Networks - Network Layer 29
Multidestination Routing
Each packet contains a list of desired
destinations.
When a packet arrives, the router checks all
the destinations to determine the set of
output lines for forwarding the packet. An
output line is selected if it is the best route to
at least one of the destinations.
The router generates a new copy of the
packet for selected output line, with a set of
destinations that are to use the line.
30. Computer Networks - Network Layer 30
Spanning Tree Routing
Assume each router has knowledge of a
spanning tree (e.q. a sink tree) in the
network.
Each router copies an incoming broadcast
packet onto all the spanning tree lines
except the one it arrives on.
Use minimum number of packets.
31. Computer Networks - Network Layer 31
Reverse Path Forwarding
Without knowing any spanning tree
if a packet arrives at the line that is normally
used for sending packets to the source of
the broadcast
the router forwards copies of it onto all lines
except the one it arrived on.
otherwise
the packet is discarded
32. Computer Networks - Network Layer 32
Multicasting
Send a message to all the other members of
the group
group management
− create and destroy groups
− for processes to join and leave groups
routers knows which of their hosts belong to
which group
routers tell their neighbors, so the information
propagates through the subnet
33. Computer Networks - Network Layer 33
Multicast Routing
Each router computes a spanning tree
covering all other routers in the subnet.
When a multicast packet for a group arrives,
the first router examines its spanning tree
and prunes it, removing all lines that do not
lead to hosts in the group.
Multicast packets are forwarded only along
the pruned tree.
mn trees is needed with n groups, each with
an average of m members.
34. Computer Networks - Network Layer 34
Core-based Tree for Multicast
Routing
A single spanning tree,called core-based
tree, for a group is computed, with the root
(core) near the middle of the group.
A host first sends a multicasting message to
the core, which then does the multicasting
along the spanning tree.
The tree is not optimal. However only n trees
need to be stored.
35. Computer Networks - Network Layer 35
Congestion
When too many packets are present in (a
part of) a subnet, performance degrades.
This situation is called congestion.
Packetdelivered
Packet sent
Maximun carrying
capacity of subnet
Perfect
Desirable
Congested
36. Computer Networks - Network Layer 36
Congestion Control
goal
− make sure the subnet is able to carry the
offered traffic
Congestion causes
− bursty data
− insufficient memory
− slow processor
− low-bandwidth line
37. Computer Networks - Network Layer 37
Flow Control vs. Congestion Control
Congestion control
− Make sure the subnet is able to carry the
offered traffic
− It is a global issue, involving the behavior of all
the hosts, all the routers, and etc.
Flow Control
− Relate to the point-to-point traffic between a
given sender and a given receiver.
38. Computer Networks - Network Layer 38
Flow Control vs. Congestion Control
1 Gbps
1000 Gbps
PC
Super
Computer
100 Kbps
1 Mbps 1000
1000
Flow
Control
Congestion
Control
39. Computer Networks - Network Layer 39
General Principles
Open Loop
− make sure congestion does not occur in the first
place
− Deciding when to accept new traffic, deciding
when to discard packets and which ones, …
Make decision without regard to the current state of the
network
Closed Loop
− monitor the system to detect congestion (where
and when)
− pass this information to places where action can
be taken
− adjust system operation to correct the problem
40. Computer Networks - Network Layer 40
Congestion Control Algorithm
Taxonomy (closed loop)
explicit feedback
− Packets are sent back from the point of
congestion to warn the source.
implicit feedback
− The source deduces the existence of
congestion by making local observations, such
as the acknowledgement time.
41. Computer Networks - Network Layer 41
Load Shedding
when routers are being inundated by
packets that they can not handle, they just
throw them away.
Packet discarding policy
− Wine: Old is better than new.
− Milk: New is better than old.
− Priority Control
42. Computer Networks - Network Layer 42
Jitter Control
The jitter is the amount of variation in the
end-to-end packet transit time.
The jitter can be bounded by computing the
expected transit time for each hop along the
path.
− When a packet arrives at a router, the router
checks to see how much the packet is behind or
ahead of its schedule. This information is stored
in the packet and updated at each hop. If the
packet is ahead of schedule, it may be held just
enough to get it back on schedule. If it is behind
schedule, the router tries to get it out the door
quickly.
43. Computer Networks - Network Layer 43
Congestion Control for Multicasting
Multicast flows from multiple sources to
multiple destinations (cable television)
if it is the sender that reserves bandwidth
− each sender should track membership changes
− regenerate the spanning tree at each change
RSVP (Resource reSerVation Protocol)
− it is the receiver that reserves bandwidth
45. Computer Networks - Network Layer 45
X.25
Internetworking
B
802.4 LAN802.3 LAN
802.5 LAN
R
DECnet
R
SNA
R
R
46. Computer Networks - Network Layer 46
Internetworking
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Presentation
Session
Transport
Network
Data Link
Physical
7
6
5
4
3
2
1
Layer
APDU
PPDU
SPDU
TPDU
Packet
Frame
Bit
Application Protocol
Presentation Protocol
Session Protocol
Transport Protocol
Host A Host B
Network
Data Link
Physical
Network
Data Link
Physical
Router Router
Internal Subnet Protocol
47. Computer Networks - Network Layer 47
How Networks Differ
Service offered
− Connection-oriented versus Connectionless
Protocol
− IP, IPX, CLNP, AppleTalk, DECnet, etc.
Addressing
− Flat (802) versus hierarchical (IP, PDN, PSTN,
ISDN, etc.)
Multicasting/Broadcasting
− Present or absent
48. Computer Networks - Network Layer 48
How Networks Differ (Cont.)
Packet size
− Every network has its own maximum
Quality of service
− Present or absent
Error handling
− Reliable, ordered, and unordered delivery
Flow control
− Sliding window, rate control, others, or none
49. Computer Networks - Network Layer 49
How Networks Differ (Cont.)
Congestion control
− Leaky bucket, choke packets, etc.
Security
− Privacy rules, encryption, etc.
Parameters
− Different timeouts, flow specifications, etc.
Accounting
− By connection time, by packet, by byte, or not at
all
50. Computer Networks - Network Layer 50
Tunneling
EthernetEthernet
RR
WAN
IP
Ethernet header
Ethernet frame
IP
WAN packet header
WAN packet
IP
Ethernet header
Ethernet frame
Using encapsulation of IP packets
The same type
of network
51. Computer Networks - Network Layer 51
Firewalls
Packet filter router is a router equipped with
some extra functionality that allows every
incoming or outgoing packet to be inspected.
Application gateway (e.g.a mail gateway)
may examine headers and/or contents of
messages.
Application
Gateway
Packet
Filtering
Router
Packet
Filtering
Router
Inside
Outside
52. Computer Networks - Network Layer 52
Internet Network Layer Protocol
The IP (Internal Protocol) Protocol
IP Addressing
Subnets
Internet Control Protocols
− The Internet Control Message Protocol (ICMP)
− The Address Resolution Protocol (ARP)
− The Reverse Address Resolution Protocol
(RARP)
53. Computer Networks - Network Layer 53
Internet Network Layer Protocol
The Interior Gateway Routing Protocol:
Open Shortest Path First (OSPF)
The Exterior Gateway Routing Protocol:
Border Gateway Protocol (BGP)
Internet Multicasting
Mobile IP
Classless InterDomain Routing (CIDR)
IPv4
IPv6
54. 54
IPv4 Header Format
• Version – The IP version number, 4.
• Header length – The length of the datagram
header in 32-bit words.
• Type of service – Contains five subfields that
specify the precedence, delay, throughput,
reliability, and cost desired for a packet. (The
Internet does not guarantee this request.) This
field is not widely used on the Internet.
• Total length – The length of the datagram in
bytes including the header, options, and the
appended transport protocol segment or packet.
The maximum length is 65535 bytes.
55. 55
IPv4 header format
• MF – More Fragments. All fragments except the
last one have this bit set.
• Fragment offset – The relative position of this
fragment measured from the beginning of the
original datagram in units of 8 bytes.
• Time to live – How many routers a datagram
can pass through. Each router decrements this
value by 1 until it reaches 0 when the datagram
is discarded. This keeps misrouted datagrams
from remaining on the Internet forever.
• Protocol – The high-level protocol type.
56. 56
IPv4 header format
• Header checksum – A number that is
computed to ensure the integrity of the header
values.
• Source address – The 32-bit IPv4 address of
the sending host.
• Destination address – The 32-bit IPv4 address
of the receiving host.
• Options – A list of optional specifications for
security restrictions, route recording, and source
routing. Not every datagram specifies an
options field.
• Padding – Null bytes which are added to make
58. 58
The IP Protocol
Some of the IP options.
5-54
• http://www.iana.org/assignments/ip-parameters
59. 59
IP Addresses
• An IP address really refers to a network
interface, so if a hosts are on two network, it
must have two IP addresses.
• Traditionally, IP addresses were divided into the
five categories: A, B, C, D, E.
• Network numbers are managed by a nonprofit
corporation called ICANN (Internet Corporation
for Assigned Names and Numbers) to avoid
conflicts.
• Network address, which are 32-bit numbers, are
usually written in dotted decimal notation. In
this format, each of the 4 bytes is written in
61. 61
IP Addresses
• The value 0 means this network or this host. The
value of -1 (all 1s) is used as a broadcast address
to mean all hosts on the indicated network.
• 0.0.0.0 is used by hosts when booted.
• IP addresses with 0 as network number refer to
the current network. 156.26.10.0.
• 255.255.255.255 broadcast on local network
• The addresses with a network number and all 1s
in the host field allow machines to broadcast to
remote LANs.
• 127.0.0.1, loopback
63. 63
IP Addresses
• dig - DNS lookup utility
cs742@kirk:~$ dig www
; <<>> DiG 9.2.1 <<>> www
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28011
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;www. IN A
;; AUTHORITY SECTION:
. 10800 IN SOA A.ROOT-SERVERS.NET. NSTLD.VERISIGN-
GRS.COM. 2003110201 1800 900 604800 86400
;; Query time: 139 msec
;; SERVER: 156.26.10.130#53(156.26.10.130)
;; WHEN: Sun Nov 2 21:32:40 2003
;; MSG SIZE rcvd: 96
64. 64
IP Addresses
• nslookup – query Internet name servers
interactively
cs742@kirk:~$ nslookup www.wichita.edu
Note: nslookup is deprecated and may be removed from future releases.
Consider using the `dig' or `host' programs instead. Run nslookup with
the `-sil[ent]' option to prevent this message from appearing.
Server: 156.26.10.130
Address: 156.26.10.130#53
www.wichita.edu canonical name = BLANCA.wichita.edu.
Name: BLANCA.wichita.edu
Address: 156.26.1.160
• Find out the address in Windows: ipconfig/all
65. 65
What is IPv6?
• IPv6 stands for "Internet Protocol Version 6“ and
is also referred to as IPng (IP next generation).
• IPv6 is the protocol designed by the IETF (The
Internet Engineering Task Force) to replace the
current version Internet Protocol, IP Version 4
(IPv4).
• The core set of IPv6 protocols were made an
IETF Draft Standard on August 10, 1998.
• For more information about IPv6, refer to
http://www.ipv6.org/.
66. 66
Why is IPv6? More Addresses!
• IP address allocation history:
1981 ~ IPv4 protocol published
1985 ~ 1/16 total space
1990 ~ 1/8 total space
1995 ~ 1/4 total space
2000 ~ 1/2 total space
• More addresses are needed despite increasingly
intense conservation efforts
– CIDR (classless inter-domain routing)
– PPP address sharing
– NAT (network address translation)
• Theoretical limit of 32-bit space: ~4 billion
devices
Practical limit of 32-bit space: ~250 million
devices
67. 67
IPv6
• IPv6 major goals were:
– Support billions of hosts, even with inefficient address
space allocation.
– Reduce the size of the routing tables.
– Simplify the protocol, to allow routers to process packets
faster.
– Provide better security (authentication and privacy) than
current IP.
– Pay more attention to type of service, particularly for
real-time data.
– Aid multicasting by allowing scopes to be specified.
– Make it possible for a host to roam without changing its
address.
– Allow the protocol to evolve in the future.
– Permit the old and new protocols to coexist for years.
68. 68
IPv6
• SIPP (Simple Internet Protocol Plus) was
selected and given the designation IPv6.
• The main features of IPv6:
– IPv6 has longer addresses than IPv4.
– Improved header processing with better support for
options and enhanced routing functionality
– Auto-configuration
– Better security support
– Better support for Quality of Service (QoS)
69. 69
What’s new in IPv6
• Bigger Address Space
– 128 bits: solving the address shortage issue: 232
(4.2
billion) to 2128
(340 undecillion or 3.4 x 1038
)
– There are enough IPv6 address to assign
• 1 million networks per human
• A separate IPv6 address on every square inch of every
planet in the solar system
• Improved Header Processing and Enhanced
routing functionality
– Redefinition of IP options in header (7 versus 13 in IPv4)
• Format is improved for quicker processing
• Some fields are classified such that they may be ignored
by intermediate nodes
– Inclusion of flow label
– Elimination of checksum (let higher layer to compute
their own checksum)
– Enhanced routing functionality such as roaming a host
70. 70
What’s new in IPv6
• Auto-configuration
– Reduced Administrative Overhead
• Much of the administrative load for IPv4 nodes involves
allocating and managing their IPv4 addresses
• IPv6 nodes are able to configure their addresses
automatically (Plug and play)
– Support renumbering
• Experience has shown that Internet nodes don’t keep the
same IP address for their life time
• A network (e.g., an enterprise intranet) will need renumber
based on topology change (wholesale reconnection to
another ISP)
• An IPv6 node discovers the need for configuring a new
IPv6 address for itself.
71. 71
What’s new in IPv6
• Better security support
– Reduced Administrative Overhead
• Much of the administrative load for IPv4 nodes involves
allocating and managing their IPv4 addresses
• IPv6 nodes are able to configure their addresses
automatically (Plug and play)
• Support renumbering
– Experience has shown that Internet nodes don’t keep
the same IP address for their life time
– A network (e.g., an enterprise intranet) will need
renumber based on topology change (wholesale
reconnection to another ISP)
– An IPv6 node discovers the need for configuring a new
IPv6 address for itself.
72. 72
Why isn't IPv6 here now?
• Why isn't IPv6 here now?
– The situation of lack of address spaces are different
in different countries.
– Some transition solutions such as NAT (Network
Address Translation) are there.
– There are still not so many applications available for
IPv6.
– But mobile phones have pushed fast deployment of
IPv6.
74. 74
The Main IPv6 Header
• Version. 4 bits. - IPv6 version number.
• Traffic Class. 8 bits. - Internet traffic priority
delivery value.
• Flow Label. 20 bits. - Used for specifying special
router handling from source to destination(s) for a
sequence of packets.
• Payload Length. 16 bits, unsigned. - Specifies
the length of the data in the packet. When set to
zero, the option is a hop-by-hop Jumbo payload.
• Next Header. 8 bits. - Specifies the next
encapsulated protocol. The values are compatible
with those specified for the IPv4 protocol field.
75. 75
The Main IPv6 Header
• Hop Limit. 8 bits, unsigned. -For each router that
forwards the packet, the hop limit is decremented
by 1. When the hop limit field reaches zero, the
packet is discarded. This replaces the TTL field in
the IPv4 header that was originally intended to be
used as a time based hop limit.
• Source address. 16 bytes. - The IPv6 address of
the sending node.
• Destination address. 16 bytes. -The IPv6
address of the destination node.
76. 76
How Was IPv6 Address Size Chosen?
• Some wanted fixed-length, 64-bit addresses
– easily good for 1012
sites, 1015
nodes, at .0001
allocation efficiency
– minimizes growth of per-packet header overhead
– efficient for software processing
• Some wanted variable-length, up to 160 bits
– compatible with OSI NSAP addressing plans
– big enough for auto-configuration using IEEE 802
addresses
– could start with addresses shorter than 64 bits & grow
later
• Settled on fixed-length, 128-bit addresses
(340,282,366,920,938,463,463,374,607,431,768,211,45
6 in all!)
77. 77
IPv6 Addresses
• Classless addressing/routing (similar to CIDR)
• Notation: x:x:x:x:x:x:x:x (x = 16-bit hex number)
– Contiguous 0s are compressed: 47CD::A456:0124 =
47CD:0000:0000:0000:0000:0000:A456:0124
– IPv6 compatible IPv4 address: ::128.42.1.87
• Address assignment
– provider-based (can’t change provider easily)
– Geographic
• IPv6 has many different kinds of addresses
– unicast, anycast, multicast, loopback, IPv4-embedded,
care-of, manually-assigned, DHCP-assigned, self-
assigned, solicited-node, and more.
– One simplification: no broadcast addresses in IPv6! –
uses multicast to achieve same effects
78. 78
Prefix
0000 0000
0000 0001
0000 001
0000 010
0000 011
0000 1
0001
001
010
011
100
101
110
1110
1111 0
1111 10
1111 110
1111 1110 0
1111 1110 10
1111 1110 11
1111 1111
Use
Reserved
Unassigned
Reserved for NSAP Allocation
Reserved for IPX Allocation
Unassigned
Unassigned
Unassigned
Unassigned
Provider-Based Unicast Address IPV4-like
Unassigned
Reserved for Geographic-Based Unicast Addresses
Unassigned
Unassigned
Unassigned
Unassigned
Unassigned
Unassigned
Unassigned
Link Local Use Addresses no global uniqueness
Site Local Use Addresses no global uniqueness
79. 79
IPv6 – Multicast and Anycast
• IPv6 describes rules for three types of
addressing: unicast (one host to one other
host), anycast (one host to at least one of
multiple hosts), and multicast (one host to
multiple hosts).
• The introduction of an "anycast" address
provides the possibility of sending a message
to the nearest of several possible gateway
hosts with the idea that any one of them can
manage the forwarding of the packet to
others.
• Anycast messages can be used to update
80. 80
IP version 6 – Future Evolution
• The next header field provides for future
evolution.
• If non-zero, it specifies an extension header type
in the packet.
• The extension header types include the services
for router information, route definition, fragment
handling, authentication, encryption information,
and destination information.
• Each extension header type has a specific size
and format and is transmitted after the basic
header and before the payload.
83. 83
IPv6 Security and Evolution
• The advantage of implementing security at the IP
level is that it can be applied without the need for
security-aware implementations of application
programs.
• Security in IPv6 is implemented through the
authentication and encrypted security payload
extension header types , for ensuring data
integrity, and for ensuring privacy.
• Instead, isolated “island” of IPv6 will converted,
initially communicating via tunnels. As the IPv6
islands grow, they will merge into bigger islands.
Eventually, all the islands will merge, and the
Internet will be fully converted.