Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Layer Functions Key Layer in Internet Architecture End-to-end Packets Adapt to lower layers 11 22 3.

Similar presentations


Presentation on theme: "Network Layer Functions Key Layer in Internet Architecture End-to-end Packets Adapt to lower layers 11 22 3."— Presentation transcript:

1 Network Layer Functions Key Layer in Internet Architecture End-to-end Packets Adapt to lower layers 11 22 3

2 Network Layer Design Goals –‘Independent’ of layer 1 & 2 implementations –Hide layer 1 & 2 details from upper layers Architecture –Connection oriented –Connectionless –(where should reliability be done?) Services –Routing (Path selection) –Adaptation to different lower layers

3 Routing Algorithms Goals –Optimality –Fairness –Stablility –Robustness –Correctness –Simplicity Adaptive vs Static Congestion Control

4 Adaptive Routing Centralized Isolated Distributed

5 Distributed Routing Metric - Vector Algorithms –sometimes called shortest path –Bellman-Ford most famous –Knowledge of immediate neighbors –Result is “first step” in path to ultimate destination Link State Algorithms –OSPF {Open Shortest Path First} –Knowledge of network layer map (connectivity)

6 Congestion Control RESEARCH ISSUE! Resource Reservation Packet Discarding Flow Control

7 Routing Information Protocol (RIP) Known as a routing table update protocol Developed by Xerox and gained widespread acceptance by the proliferation of TCP/IP’s implementation of it in UNIX. Other protocols (AppleTalk, NetWare) adopted RIP as their standard routing update protocol. Known as a distance vector protocol. –Vector is an adjacent router and the distance is how far away (hops) the network is. –One hop is considered one router traversed. Devised for relatively stable, small-to-medium size networks (less than 16 routers in diameter).

8 Calculating the Cost Network 1 Network 2 Network 3 Network 4 Network Hops 21 31 12 Network Hops 1 1 1 2 Network Hops 1 1 2 3 3 4 2 1 32 Transmitted routing table Transmitted routing table Internal routing table Router A Router B Router C

9 IP Routing Making Decisions Gathering Information ICMP

10 Routing Table NetworkMaskRouterHopsAgePort ID 3 255 C 1 30 1 4 255 C 1 30 2 2 255 B 2 15 2 1 255 B 3 45 2

11 Example: TCP/IP Not the only way to do things... But well tested in the field Brief History TCP/IP vs ISO protocols

12 References TCP/IP Overall -- Douglas Comer –Internetworking with TCP/IP, Vol I, 3d ed. –Internetworking with TCP/IP, Vol II –Internetworking with TCP/IP, Vol III (Sockets) –Internetworking with TCP/IP, Vol III (TLI) Unix Programming -- W. Richard Stevens –Unix Network Programming –Advanced Unix Network Programming Stevens & Wright –TCP/IP Illustrated Vol I –TCP/IP Illustrated Vol II –TCP/IP Illustrated Vol III

13 TCP/IP Stack 1 2 3 4 5 -7 OSI DIX Ethernet or... ARP ICMP IP TCP UDP DNSTELNET FTP

14 Notes on TCP/IP Suite TCP/IP preceded the OSI Reference Model Layers 1 & 2 are not part of the standard Functions above the Transport Layer are consolidated

15 Brief Definitions ARP -- Address Resolution Protocol IP -- Internet Protocol ICMP -- Internet Control Message Protocol UDP -- User Datagram Protocol TCP -- Transmission Control Protocol DNS -- Domain Name System FTP -- File Transfer Protocol TELNET -- remote terminal

16 Other TCP/IP Protocols Routing Protocols -- RIP, OSPF, EGP, GGP BOOTP - Bootstrap Protocol RARP - Reverse ARP TFTP - Trivial FTP HTTP - Hyper Text Transfer Protocol SMTP - Simple Mail Transfer Protocol SNMP - Simple Network Management Protocol

17 Layer Protocols DNS Query DNS Reply SYN SYN/ACK ACK CallerCallee {TCP Establishment} ARP Request ARP Reply

18 IP Functionality Presents single, virtual network to user Connectionless Delivery Packet Routing Interface to Lower Layers

19 IP Addresses “Dotted Decimal” 32 bit (4 byte) address, written by taking each byte as an unsigned number Address Classes [first octet] –A - 1- 126 –B - 128- 191 –C - 192- 223 –D - special subset of C 224- 239 multicast –E - reserved 240-254 Netmask –a 32 bit value which, when ANDed with an address, selects only the network part

20 Netmask Usage “Do a bitwise AND then compare for equality of results” & netmask =?= & netmask if comparison is equal, then both src & dst are on same (sub)net. Same netmask

21 Netmask Examples S=128.194.100.10 M=255.255.255.0 result128.194.100.0 D=128.194.200.10 M=255.255.255.0 result128.194.200.0 Not Equal S=128.194.12.10 M=255.255.255.0 result128.194.12.0 S=67.194.18.10 M=255.255.240.0 result67.194.16.0 D=128.194.12.110 M=255.255.255.0 result128.194.12.0 D=67.194.10.10 M=255.255.240.0 result67.194. 0.0 ? ?

22 Special Address Conventions This host Host on this net Limited broadcast Directed broadcast Loopback all 0’s 127anything (usually 1) net hostall 0’s all 1’s

23 IP Header 01631 VERSHLENSERVICE TYPETOTAL LENGTH FLAGSFRAGMENT OFFSETIDENTIFICATION TIME TO LIVEPROTOCOLHEADER CHECKSUM SOURCE IP ADDRESS DESTINATION IP ADDRESS 1984 IP OPTIONS (IF ANY)PADDING DATA... 24

24 IP Packet Handling (rcv) receiving Transport Layer (TCP or UDP) Sockets IP Link {DIX Type or 802.3 DSAP} Other Physical

25 IP Packet Handling (xmit) sending Local or Non-Local ? ARP Search Routing Table Found!Missing! ICMP Error Send locally...

26 A Bridges or Routers B C D 1 2 3 4 5 Address & Netmask 1: 131.122.24.12255.255.255.0 2: 131.122.31.253255.255.255.0 3: 131.121.18.12255.255.240.0 4: 131.121.24.18255.255.240.0 5: 131.121.31.254255.255.240.0

27 ICMP ping –ECHO Request/Reply traceroute traceroute to falcon.ece.utexas.edu (128.83.196.10), 30 hops max, 40 byte packets 1 exit_133 (128.194.133.254) 2 ms 2 ms 2 ms 2 exit_128 (128.194.128.254) 2 ms 3 ms 2 ms 3 FDDI-T3.TAMU.EDU (128.194.1.13) 3 ms 3 ms 3 ms 4 FDDI-WAN.TAMU.EDU (165.91.128.17) 5 ms 4 ms 6 ms 5 sprint-gw-h1-0.the.net (129.117.16.161) 20 ms 5 ms 5 ms 6 ut8-h1-0.the.net (129.117.16.241) 8 ms 9 ms 21 ms 7 129.117.20.12 (129.117.20.12) 7 ms 11 ms 7 ms 8 ens.gw.utexas.edu (128.83.7.132) 16 ms 23 ms 21 ms 9 ece-e0.gw.utexas.edu (128.83.249.251) 12 ms 9 ms 9 ms 10 * * *


Download ppt "Network Layer Functions Key Layer in Internet Architecture End-to-end Packets Adapt to lower layers 11 22 3."

Similar presentations


Ads by Google