EEC-484/584 Computer Networks

Slides:



Advertisements
Similar presentations
Discussion Monday ( ). ver length 32 bits data (variable length, typically a TCP or UDP segment) 16-bit identifier header checksum time to live.
Advertisements

CS 457 – Lecture 16 Global Internet - BGP Spring 2012.
Network Layer – IPv4 Dr. Sanjay P. Ahuja, Ph.D.
Announcement r Recitation tomorrow on Project 2 r Midterm Survey at the end of this class.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Network Layer Packet Forwarding IS250 Spring 2010
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Chapter 4 Queuing, Datagrams, and Addressing
4: Network Layer4a-1 IP datagram format ver length 32 bits data (variable length, typically a TCP or UDP segment) 16-bit identifier Internet checksum time.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
1 CSE3213 Computer Network I Network Layer (7.1, 7.3, ) Course page: Slides modified from Alberto Leon-Garcia.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Dr. John P. Abraham Professor UTPA
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
1 Network Layer Lecture 15 Imran Ahmed University of Management & Technology.
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
Chapter-8 Network Layer in the Internet. IP Protocol: IP V4 At network layer, internet can be viewed as a collection of sub-networks or Autonomous Systems.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
Internet Protocol Version 4 VersionHeader Length Type of Service Total Length IdentificationFragment Offset Time to LiveProtocolHeader Checksum Source.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
The Internet Network layer
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
EEC-484 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
IP Fragmentation. Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on rcving side,
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
IP Internet Protocol. IP TCP UDP ICMPIGMP ARP PPP Ethernet.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Introduction to Networks
Computer Communication Networks
Chapter 4 Network Layer All material copyright
Chapter 4: Network Layer
استانداردهاي سري IEEE 802.X
CS 457 – Lecture 10 Internetworking and IP
EEC-484/584 Computer Networks
EEC-484/584 Computer Networks
Dr. John P. Abraham Professor UTPA
IP : Internet Protocol Surasak Sanguanpong
Internetworking Outline Best Effort Service Model
Routers Routing algorithms
Wide Area Networks and Internet CT1403
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
EEC-484/584 Computer Networks
Dr. John P. Abraham Professor UTPA
Overview The Internet (IP) Protocol Datagram format IP fragmentation
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
EEC-484/584 Computer Networks
Net 323 D: Networks Protocols
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
Network Layer: Control/data plane, addressing, routers
Chapter 4: Network Layer
EE 122: Intra-domain routing: Distance Vector
ITIS 6167/8167: Network and Information Security
NET 323D: Networks Protocols
32 bit destination IP address
Presentation transcript:

EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao wenbingz@gmail.com (Part of the slides are based on Drs. Kurose & Ross’s slides for their Computer Networking book)

EEC-484/584: Computer Networks Outline Distance vector routing Hierarchical routing Internet protocol Header Fragmentation 11/23/2018 EEC-484/584: Computer Networks

Distance Vector Routing Also called Bellman-Ford or Ford-Fulkerson Each router maintains a table, giving best known distance to each destination and which line to use to get there Table is updated by exchanging info with neighbors Table contains one entry for each router in network with Preferred outgoing line to that destination Estimate of time or distance to that destination Once every T msec, router sends to each neighbor a list of estimated delays to each destination and receives same from those neighbors Used in ARPANET 11/23/2018 EEC-484/584: Computer Networks

Distance Vector Routing: How each entry is updated d(A,X) d(A,Y) A X Z d(Y,Z) d(X,Z) At router A, for Z Compute d(A,X) + d(X,Z) and d(A,Y) + d(Y,Z), take minimum Y d(A,Z) = min {d(A,v) + d(v,Z) } where min is taken over all neighbors v of A 11/23/2018 EEC-484/584: Computer Networks

EEC-484/584: Computer Networks d(x,z) = min{d(x,y) + d(y,z), d(x,z) + d(z,z)} = min{2+1 , 7+0} = 3 d(x,y) = min{d(x,y) + d(y,y), d(x,z) + d(z,y)} = min{2+0 , 7+1} = 2 node x table x y z x y z 0 2 7 ∞ from cost to cost to x y z x 2 3 from y 2 0 1 z 7 1 0 node y table cost to x z 1 2 7 y x y z x ∞ ∞ ∞ 2 0 1 y from z ∞ ∞ ∞ Each node keeps track of the following info: Its own distance vector: least-cost to each of other routers Each of its neighbor’s distance vector received most recently If there is a change in distance vector, a node sends the update to all its neighbors node z table cost to x y z x ∞ ∞ ∞ from y ∞ ∞ ∞ z 7 1 time 11/23/2018 EEC-484/584: Computer Networks

EEC-484/584: Computer Networks d(x,z) = min{d(x,y) + d(y,z), d(x,z) + d(z,z)} = min{2+1 , 7+0} = 3 d(x,y) = min{d(x,y) + d(y,y), d(x,z) + d(z,y)} = min{2+0 , 7+1} = 2 node x table x y z x y z 0 2 7 ∞ from cost to cost to cost to x y z x y z x 0 2 3 x 0 2 3 from y 2 0 1 from y 2 0 1 z 7 1 0 z 3 1 0 node y table cost to cost to cost to x z 1 2 7 y x y z x y z x y z x ∞ ∞ x 0 2 7 ∞ 2 0 1 x 0 2 3 y from y from 2 0 1 from y 2 0 1 z z ∞ ∞ ∞ 7 1 0 z 3 1 0 node z table cost to cost to cost to x y z x y z x y z x 0 2 7 x 0 2 3 x ∞ ∞ ∞ from y from y 2 0 1 from y 2 0 1 ∞ ∞ ∞ z z z 3 1 0 3 1 0 7 1 time 11/23/2018 EEC-484/584: Computer Networks

Distance Vector Routing Distance from A to B 12ms, to C 25ms, to D 40ms, to G 18ms Distance from J to A 8ms, to I 10ms, to H 12ms, to K 6ms Distance from J to A to G 8+18 = 26ms to I to G 10+31 = 41ms to H to G 12+6=18ms to K to G 6+31=37ms 11/23/2018 EEC-484/584: Computer Networks

Distance Vector Routing Good news travels fast Bad news travels slow Count to infinity problem: Takes too long to converge upon router failure × Routers’ knowledge about the cost to A 11/23/2018 EEC-484/584: Computer Networks

EEC-484/584: Computer Networks Hierarchical Routing Problem: Bigger network => bigger routing table As network size increases, more router memory used to store routing table, more time to process routing tables, more bandwidth to transmit states reports Use hierarchical structure to solve the problem Regions: router knows details of how to route packets within its region, does not know internals of other regions Clusters of regions, zones of clusters, groups of zones Tradeoff: savings in memory space may result in longer path 11/23/2018 EEC-484/584: Computer Networks

EEC-484/584: Computer Networks Hierarchical Routing Optimal number of levels for N routers is lnN, with elnN routing table entries per router 11/23/2018 EEC-484/584: Computer Networks

Collection of Subnetworks The Internet is an interconnected collection of many networks, or Autonomous Systems (ASes) Will not study actual Internet routing protocols such as OSPF, BGP, etc. Within each AS, OSPF is used, across different ASes, BGP is used due to different concerns 11/23/2018 EEC-484/584: Computer Networks

The Network Layer in Internet Host, router network layer functions: Transport layer: TCP, UDP IP protocol addressing conventions datagram format packet handling conventions Routing protocols path selection RIP, OSPF, BGP Network layer Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Border Gateway Protocol (BGP) forwarding table ICMP protocol error reporting router “signaling” Link layer physical layer 11/23/2018 EEC-484/584: Computer Networks

IP Datagram Format How much overhead with TCP? data (variable length, IP protocol version number 32 bits total datagram length (bytes) header length (bytes) type of service Total length ver IHL for fragmentation/ reassembly “type” of data fragment offset 16-bit identifier flgs max number remaining hops (decremented at each router) time to live header checksum protocol 32 bit source IP address Type of service field: 6 bits, after which, there are 2 reserved bits Flags field has 3 bits: first bit is reserved, second bit: DF, third bit: MF Fragmentation offset is 13 bits long 32 bit destination IP address upper layer protocol to deliver payload to Options (if any) E.g. timestamp, record route taken, specify list of routers to visit. How much overhead with TCP? 20 bytes of TCP 20 bytes of IP = 40 bytes + app layer overhead data (variable length, typically a TCP or UDP segment) 11/23/2018 EEC-484/584: Computer Networks

EEC-484/584: Computer Networks The IPv4 Header Version – 4 IHL – length of header in 32-bit words Min 5, max 15 – i.e., 60 bytes Type of service - to distinguish different classes of service To accommodate differentiated services (which class this packet belongs to) Total length – header and data  65,535 (216-1) bytes Identification – allows destination to determine which datagram a fragment belongs to 11/23/2018 EEC-484/584: Computer Networks

EEC-484/584: Computer Networks The IPv4 Header Time to live – counter to limit packet lifetimes Max lifetime 255sec Packet is destroyed when counter becomes 0 Protocol – which transport layer protocols being used Header checksum – verifies header 11/23/2018 EEC-484/584: Computer Networks

EEC-484/584: Computer Networks The IPv4 Header Options – security, error reporting, etc. Some of the IP options 11/23/2018 EEC-484/584: Computer Networks

EEC-484/584: Computer Networks IP Fragmentation Fragmentation Flags DF – tells routers “Don’t Fragment” MF – More Fragments. All fragments except last have this set. Used as check against total length Fragment offset – where in datagram this fragment belongs All fragments (payload in the IP packet) except last must be multiples of 8 bytes The number of 8 byte blocks is called Number of Fragment Blocks (NFB) The unit of the offset is NFB Remember that when an IP packet is fragmented, each fragment still contains a full IP header, with the original source/destination IP addresses!!! 11/23/2018 EEC-484/584: Computer Networks

IP Fragmentation & Reassembly in: one large datagram out: 3 smaller datagrams Network links have MTU (max.transfer size) - largest possible link-level frame. different link types, different MTUs Large IP datagram divided (“fragmented”) within net one datagram becomes several datagrams “reassembled” only at final destination IP header bits used to identify, order related fragments reassembly 11/23/2018 EEC-484/584: Computer Networks

IP Fragmentation and Reassembly ID =x offset =0 MF length =4000 Example 4000 byte datagram MTU = 1500 bytes One large datagram becomes several smaller datagrams ID =x offset =0 MF =1 length =1500 1480 bytes in data field ID =x offset =185 MF =1 length =1500 offset = 1480/8 ID =x offset =370 MF =0 length =1040 Fragment should be as large as possible 11/23/2018 EEC-484/584: Computer Networks

Distance Vector Routing: Exercise Consider the subnet shown below. Distance vector routing is used, and the following vectors have just come in to router C: from B: (5, 0, 8, 12, 6, 2); from D: (16, 12, 6, 0, 9, 10); and from E: (7, 6, 3, 9, 0, 4). The measured delays to B, D, and E, are 6, 3, and 5, respectively. What is C's new routing table? Give both the outgoing line to use and the expected delay. Postpone the discussion on the solution to link state to discussion session? 11/23/2018 EEC-484/584: Computer Networks

Exercise: IP Fragmentation Suppose that host A is connected to a router R 1, R 1 is connected to another router, R 2, and R 2 is connected to host B. Suppose that a TCP message that contains 900 bytes of data and 20 bytes of TCP header is passed to the IP code at host A for delivery to B. Show the Total length, Identification, DF, MF, and Fragment offset fields of the IP header in each packet transmitted over the three links. Assume that link A-R1 can support a maximum frame size of 1024 bytes including a 14-byte frame header, link R1-R2 can support a maximum frame size of 512 bytes, including an 8-byte frame header, and link R2-B can support a maximum frame size of 512 bytes including a 12-byte frame header. 11/23/2018 EEC-484/584: Computer Networks