The Network Layer Role Services Main Functions Standard Functions

Slides:



Advertisements
Similar presentations
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

IP datagrams Service paradigm, IP datagrams, routing, encapsulation, fragmentation and reassembly.
ATM Asynchronous Transfer Mode. ATM Networks Use optical fibre similar to that used for FDDI networks ATM runs on network hardware called SONET ATM cells.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
The Network Layer Functions: Congestion Control
5: DataLink Layer5-1 Asynchronous Transfer Mode: ATM r 1990’s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
1 EE 400 Asynchronous Transfer Mode (ATM) Abdullah AL-Harthi.
K. Salah1 Security Protocols in the Internet IPSec.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Asynchronous Transfer Mode: ATM r 1980s/1990’s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
Virtual Circuit Network. Network Layer 2 Network layer r transport segment from sending to receiving host r network layer protocols in every host, router.
Mukesh N. Tekwani Elphinstone College Mumbai
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
University of the Western Cape Chapter 12: The Transport Layer.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP/IP Protocols Contains Five Layers
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
Chapter 14 Connection-Oriented Networking and ATM
MODULE I NETWORKING CONCEPTS.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ATM Technologies. Asynchronous Transfer Mode (ATM) Designed by phone companies Single technology meant to handle –Voice –Video –Data Intended as LAN or.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Forwarding.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
K. Salah1 Security Protocols in the Internet IPSec.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723
Data Communication and Networks
The Transport Layer Implementation Services Functions Protocols
Lecture (2).
Chapter 3 outline 3.1 Transport-layer services
IP - The Internet Protocol
CSE 4905 IPsec.
Chapter 4 Introduction to Network Layer
EE 122: Lecture 19 (Asynchronous Transfer Mode - ATM)
Chapter 18 IP Security  IP Security (IPSec)
Scaling the Network: The Internet Protocol
Packet Switching Outline Store-and-Forward Switches
Process-to-Process Delivery, TCP and UDP protocols
Network Layer Goals: Overview:
Telemedicine.
Understand the OSI Model Part 2
CS4470 Computer Networking Protocols
IP - The Internet Protocol
Chapter 4-1 Network layer
Transport Layer Unit 5.
IP - The Internet Protocol
Chapter 4 Introduction to Network Layer
Data Communication and Computer Networks
Chapter 20 Network Layer: Internet Protocol
Process-to-Process Delivery:
IP - The Internet Protocol
Chapter 3 Part 3 Switching and Bridging
Scaling the Network: The Internet Protocol
Process-to-Process Delivery: UDP, TCP
ITIS 6167/8167: Network and Information Security
Chapter 3 Transport Layer
IP - The Internet Protocol
Presentation transcript:

The Network Layer Role Services Main Functions Standard Functions Datagram Virtual Circuit Main Functions Path Determination Packet Switching Standard Functions 17/11/10 11-Network

The Role of the Network Layer The role of the network layer is to move data from the sending host to the destination host across one or more subnetworks It hides the details of the type of subnetwork from the transport layer 17/11/10 11-Network

Network Layer - Services There are two alternative network layer services Datagram or Connectionless (E.g. The Internet) All packets contain a full destination network address which is used for routing Each packet is routed independently Virtual Circuit or Connection-oriented (E.g. X.25 Packet Layer Protocol, Asynchronous Transfer Mode, Frame Relay) A virtual circuit is established before data transfer which sets up a path that is released afterwards Each packet is routed via the same path using virtual circuit numbers 17/11/10 11-Network

Connectionless Network Layer Characteristics No prior set-up required. Just adds a header and sends the packet Packets are routed independently and may follow different paths Best effort service. No guaranties about delivery, order or duplication Simple and flexible. Can support many different types of application, as most of the complexity is all in the hosts. 17/11/10 11-Network

Connection-oriented Network Layer Characteristics Connection set-up and release involves all the nodes on the path Once connection is established, virtual circuit number (only unique to each link) not addresses are used Each node holds state information (virtual circuit mapping information and buffers) Can provide guaranty that data will be delivered in order without loss and without duplication Complexity is in the network nodes rather than the hosts 17/11/10 11-Network

Datagrams versus Virtual Circuits © Tanenbaum, Prentice Hall International 17/11/10 11-Network

Network Layer – Main Functions Two main functions: Path Determination Maintenance of routing tables for datagrams or for virtual circuit setup Packet Switching Forwarding packets to the next node using routing tables or virtual circuit mappings 17/11/10 11-Network

Network Layer - Standard Functions Segmentation (Fragmentation) Encapsulation Addressing Flow Control Grade of Service (ATM) Connection Control Ordered Delivery Security (IPSec) 17/11/10 11-Network

Network Layer - Segmentation Segmentation is often called fragmentation in the network layer Different subnetworks have different Maximum Transfer Unit (MTU) sizes (1500 for Ethernet, 48 bytes for ATM) The network layer must fragment any data that it receives that is larger than the network’s MTU size. (Maximum packets size in IP is 65,535 bytes but maximum packet sizes of subnetworks are usually much lower) Fragments can be reassembled at gateways between networks (ATM) or at the network layer in the destination host (IP) 17/11/10 11-Network

Network Layer - Encapsulation At the sending end, the network layer receives a segment from the transport layer, adds network layer headers and passes a packet to the data link layer At the receiving end, the network layer receives a packet from the data link layer, processes the packet header, strips off the header and passes the segment to the transport layer 17/11/10 11-Network

Network Layer - Addressing Network Layer Addresses must be globally unique so that all hosts and other network components can be unambiguously identified Allocation of network layer addresses has to be carefully managed to ensure uniqueness Destination network addresses are used for routing packets and setting up virtual circuits 17/11/10 11-Network

Network Layer – Flow/Congestion Control Virtual circuit networks can implement sliding window flow control on each virtual circuit Virtual circuit networks can also prevent new virtual circuits being established (this is known as admission control) or ensure that new virtual circuits are routed away from the congested part of the network Both virtual circuit and datagram networks can control congestion by issuing source quench or choke packets to cause the sender to back off As a last resort routers can discard packets 17/11/10 11-Network

Network Layer – Congestion Control One of the main cause of congestion is that traffic is bursty. Traffic shaping smoothes out bursty traffic When setting up a virtual circuit, the sender can predict its traffic pattern The network contracts to support this traffic pattern when it sets up the virtual circuit The sender can regulate its traffic rate using the techniques such as the leaky or token bucket algorithms 17/11/10 11-Network

Leaky Bucket Algorithm © Tanenbaum, Prentice Hall International 17/11/10 11-Network

Token Bucket Algorithm © Tanenbaum, Prentice Hall International For a packet to be transmitted, a token must be captured and destroyed This algorithm allows bursts up to a maximum length 17/11/10 11-Network

Flow Specification An agreement between the sender, the receiver and the subnetwork to describe the characteristics of the input traffic and the quality of service expected 17/11/10 11-Network

Flow Specification © Tanenbaum, Prentice Hall International 17/11/10 11-Network

Network Layer – Grade of Service Virtual circuit network layers such as ATM can support grade of service ATM supports the following services Constant Bit Rate (CBR) Variable Bit Rate (VBR) Real Time (RT-VBR) Non-Real Time (NRT-VBR) Available Bit Rate (ABR) Unspecified Bit Rate (UBR) 17/11/10 11-Network

Network Layer - Grade of Service Virtual circuit network layers such as ATM will allow number of quality of service parameters to be specified in a contract between the customer and the network operator The customer is responsible to shape the traffic to match the contract The network operator is responsible for delivering the quality of service specified and for policing the traffic to ensure that it meets the contract 17/11/10 11-Network

Asynchronous Transfer Mode (ATM) ATM (sometimes also called Cell Relay) is a suite of protocol designed to carry multiple services such as voice, video and data It was designed to meet the requirements of Broadband ISDN to be provided by telecommunications companies and is very complex The ATM network layer protocol is connection-oriented All data is segmented into 48 byte cells which are transmitted with a 5 byte header Most carriers currently run their IP networks on top of ATM, as unlike IP it can guaranty quality of service 17/11/10 11-Network

ATM Service Categories © Tanenbaum, Prentice Hall International 17/11/10 11-Network

Network Layer – Connection Control Only relevant to virtual circuit networks which must provide the facility to establish and release virtual circuits Virtual circuits can be: Permanent (PVCs), set up by the network administrator Switched (SVCs) set up and released by network users 17/11/10 11-Network

Network Layer –SVC Establishment Switched Virtual Circuits are established in response to a user request which specifies the destination address A path across the network is found, resources at each router/switch are allocated and each router/switch stores a mapping between an incoming virtual circuit number and an outgoing port and virtual circuit number The distant host accepts the virtual circuit and this is confirmed to all the routers and to the connecting host 17/11/10 11-Network

Virtual Circuit Mapping Router Host VC # 12 VC # 23 When a virtual circuit is established a virtual circuit number is allocated for each link. All the routers/switches in the path must maintain a table that maps the incoming virtual circuit number with an output port and an outgoing virtual circuit number. Routing with virtual circuits is simply a matter of looking up the incoming VC number in the table to obtain the output port and VC number This is an example of state information. If a router crashes the mapping is lost and the whole virtual circuit has to be re-established 17/11/10 11-Network

Network Layer – Ordered Delivery Only relevant to virtual circuit networks All packets follow the same route, are given sequence numbers and are acknowledged The remote network layer is therefore able to ensure that all data is delivered in the correct order 17/11/10 11-Network

Network Layer - Security Security can be implemented in the network layer by encrypting all the data inside network layer packets It must also be possible to provide source authentication so that destinations can be sure that data originated from an authentic source IPSec is a secure network layer protocol suite that makes IP datagrams secure 17/11/10 11-Network

IPSec Protocol IPSec is based on two principle alternative protocols Authentication Header (AH) Protocol Provides authentication, and data integrity but not confidentiality Encapsulation Security Payload (ESP) Protocol Provide authentication, data integrity and confidentiality Both protocols work by establishing a network layer logical connection between the source and destination called a Security Association 17/11/10 11-Network

AH Protocol The AH protocol header sits between the IP header and the TCP or UDP header It contains a digital signature that authenticate the sender and allows the IP data fields and some IP header fields such as the source address to be checked for data integrity 17/11/10 11-Network

ESP Protocol The ESP protocol header sits between the IP header and the TCP or UDP header There is also an ESP trailer that is inserted after the TCP/UDP segment Following this trailer is an ESP authentication data field The TCP/UDP segment and the ESP Trailer are both encrypted before transmission 17/11/10 11-Network

ESP Tunnel Mode To further enhance security the encryption can be extended to the whole IP datagram (including its headers) and the whole datagram encapsulated inside another IP packet with an ESP header and trailer This is usually done between two firewall routers and the original IP datagrams appear to pass through a tunnel between the two firewall routers. The header and contents of the original datagrams are completely invisible when they are in the tunnel 17/11/10 11-Network