1 The Network Layer Chapter 5. 2 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation.

Slides:



Advertisements
Similar presentations
Congestion Control Algorithms
Advertisements

The Network Layer Chapter 5. Network Layer Design Isues a)Store-and-Forward Packet Switching b)Services Provided to the Transport Layer c)Implementation.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Network Routing Algorithms
Networks: Routing1 Network Layer Routing. Networks: Routing2 Network Layer Concerned with getting packets from source to destination Network layer must.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Network Layer Introduction:
Summary The Problem The Dijkstra’s Shortest Path Algorithm
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer The service should be independent of the router.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation.
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 21 Introduction to Computer Networks.
EECC694 - Shaaban #1 lec #7 Spring The OSI Reference Model Network Layer.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Networks: Routing1 Network Layer Routing. Networks: Routing2 Network Layer Concerned with getting packets from source to destination. The network layer.
Ad Hoc Wireless Routing COS 461: Computer Networks
The Network Layer Chapter 5. Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of.
The Routing & the IP network data link physical network data link physical network data link physical network data link physical network data link physical.
The Network Layer Chapter 5.
SAvPS – úvod Genči 2009 (bsaed on Tanenbaum’s slides.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Chapter 5 The Network Layer.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
The Network Layer Week 5. Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
The Network Layer Chapter 5. Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
10/19/20151 The Network Layer. 10/19/20152 Introduction Route packets through subnet So, it must know the topology of the subnet It should also be able.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
CS 350 Chapter-9,10. Implementation of Connectionless Service Routing within a datagram network ISP’s equipment A’s table (initially) A’s table (later)
SPU Information Science Institute of Sripatum University Sripatum University 1 IS516 Computer Communication and Networks การสื่อสารคอมพิวเตอร์และเครือข่าย.
The Network Layer.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Networking and internetworking devices. Repeater.
THE NETWORK LAYER.
The Network Layer Chapter 5 1/4/2016www.ishuchita.com1.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
Chapter 5 The Network Layer.
Network Layer Chapter 5 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Design Issues Routing Algorithms Congestion.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Network Layer Chapter 5.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
Distributed Systems 8. Network Layer Theory Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2015/2016.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
The Network Layer Design Issues & Routing Algorithms Chapter 5.
Chapter 5 Network Layer.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Network Layer Chapter
The Network Layer UNIT-4 snistforum.com. Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation.
The Network Layer Chapter 5 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education- Prentice Hall, 2011.
1 Most important algorithms! Routing Algorithms Properties Shortest Path Routing Flooding Distance Vector Routing Link State routing Hierarchical routing.
Network Layer Routing Networks: Routing.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
THE NETWORK LAYER.
Chapter 5 The Network Layer.
Tanenbaum Chapter 5 Network
ECE453 – Introduction to Computer Networks
The Network Layer Network Layer Design Issues:
Network Layer Routing Networks: Routing.
Other Routing Protocols
Computer network technology
Chapter 5 The Network Layer.
Network Layer Routing.
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

1 The Network Layer Chapter 5

2 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented Service Comparison of Virtual-Circuit and Datagram Subnets

3 Store-and-Forward Packet Switching The environment of the network layer protocols. fig 5-1

4 Implementation of Connectionless Service Routing within a diagram subnet.

5 Implementation of Connection-Oriented Service Routing within a virtual-circuit subnet.

6 Comparison of Virtual-Circuit and Datagram Subnets 5-4

7 Routing Algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Link State Routing

8 Optimality principle Bellman concept 1 2 i If node i is on the minimal path (1,2) then: path(1,i) is minimal and path(i,2) is minimal.

9 A sink tree for router B A subnet A sink tree for router B

10 Dijkstra: shortest path A to D 1.Mark A permanent and calculate distance to the neighbors (B and G). 2.Mark the smallest node (B) permanent and calculate neighbor distance from it. If you hit a conflict choose smaller distance. 3.Do step 2 until all network is covered.

11 Dijkstra's algorithm 5-8 top

12 Dijkstra's algorithm (2) 5-8 bottom

13 Dijkstra 5 A B(2,A) D(5,A) C(1,A) E F A E(2,C) F C(1,A) B(2,A) D(4,C) 5 A F(4,E) E(2,C) B(2,A) C(1,A) D(3,E) 5 A F(4,E) E(2,C) B(2,A) C(1,A) D(3,E) F(8,D) 5 A F(4,E) E(2,C) B(2,A) C(1,A) D(3,E) F(8,D)

14 3 Bellman-Ford = Distant vector = RIP (example) (-1,0) (-1,  ) (predecessor, d min, no of hops) Number of hops h= (-1,0,0) (1,2,1) (1,1,1) (-1, ,  ) (1,5,1) (-1, ,  ) initial

15 Bellman-Ford example (2) h= (-1,0,0) (1,2,1) (1,1,1)(4,2,2) (1,5,1) (4,3,2) (3,8,2) (2,5,2) (4,4,2) (3,8,2) (2,4,2) (3,6,2) (3,10,2) h<= (-1,0,0) (1,2,1) (1,1,1)(4,2,2) (4,4,2) (3,10,2)

16 Bellman-Ford example (3) h= (-1,0,0) (1,2,1) (1,1,1)(4,2,2) (5,3,3) (3,7,3) (4,4,2) (5,3,3) (3,10,2) (3,9,3) (6,12,3) (3,5,3) (5,4,3) h<= (-1,0,0) (1,2,1) (1,1,1)(4,2,2) (5,3,3) (5,4,3)

17 Bellman-Ford example (4) h<= (-1,0,0) (1,2,1) (1,1,1)(4,2,2) (5,3,3) (5,4,3) 5 h= (-1,0,0) (1,2,1) (1,1,1)(4,2,2) (5,4,3) (5,3,3) (6,6,4) (3,8,4) (3,4,4) (6,9,4) 1 1

18 Bellman-Ford example (5) final (-1,0) (1,2) (1,1)(4,2) (5,3) (5,4) 1 5

19 Distance Vector Routing 0251xx 2032xx x xx1102 xx5x xx 2032xx x xx1102 xx5x20 one hop matrix h= two hops matrix h=2 * = Algorithm: 1.N 1 (i,k) * N 1 (k,j) = min k (m(i,k)+n(k,j)) = N 2 (i,j) 2.N <2 (i,j) = min(N 1 (i,j), N 2 (i,j)) 3.Proceed steps 1. and 2. up to the M = dept of the network.

20 Distance Vector Routing in practice (a) A subnet. (b) Input from A, I, H, K, and the new routing table for J.

21 Distance Vector Routing (2) The count-to-infinity problem.

22 Link State Routing Each router must do the following: 1.Discover its neighbors, learn their network address. 2.Measure the delay or cost to each of its neighbors. 3.Construct a packet telling all it has just learned. 4.Send this packet to all other routers. 5.Compute the shortest path to every other router.

23 Learning about the Neighbors (a) Nine routers and a LAN. (b) A graph model of (a).

24 Measuring Line Cost A subnet in which the East and West parts are connected by two lines.

25 Building Link State Packets (a) A subnet. (b) The link state packets for this subnet.

26 Distributing the Link State Packets The packet buffer for router B in the previous slide (Fig. 5-13).

27 Hierarchical Routing Hierarchical routing.

28 Broadcast Routing Reverse path forwarding. (a) A subnet. (b) a Sink tree. (c) The tree built by reverse path forwarding.

29 Multicast Routing (a) A network. (b) A spanning tree for the leftmost router. (c) A multicast tree for group 1. (d) A multicast tree for group 2.

30 Routing for Mobile Hosts A WAN to which LANs, MANs, and wireless cells are attached.

31 Routing for Mobile Hosts (2) Packet routing for mobile users.

32 Routing in Ad Hoc Networks Possibilities when the routers are mobile: 1.Military vehicles on battlefield. –No infrastructure. 2.A fleet of ships at sea. –All moving all the time 3.Emergency works at earthquake. –The infrastructure destroyed. 4.A gathering of people with notebook computers. –In an area lacking

33 Route Discovery a)(a) Range of A's broadcast. b)(b) After B and D have received A's broadcast. c)(c) After C, F, and G have received A's broadcast. d)(d) After E, H, and I have received A's broadcast. Shaded nodes are new recipients. Arrows show possible reverse routes.

34 Route Discovery (2) Format of a ROUTE REQUEST packet.

35 Route Discovery (3) Format of a ROUTE REPLY packet.

36 Route Maintenance (a) D's routing table before G goes down. (b) The graph after G has gone down.

37 Node Lookup in Peer-to-Peer Networks (a) A set of 32 node identifiers arranged in a circle. The shaded ones correspond to actual machines. The arcs show the fingers from nodes 1, 4, and 12. The labels on the arcs are the table indices. (b) Examples of the finger tables.

38 Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies Congestion Control in Virtual-Circuit Subnets Congestion Control in Datagram Subnets Load Shedding Jitter Control

39 Congestion When too much traffic is offered, congestion sets in and performance degrades sharply.

40 General Principles of Congestion Control 1.Monitor the system. –detect when and where congestion occurs. 2.Pass information to where action can be taken. 3.Adjust system operation to correct the problem.

41 Congestion Prevention Policies Policies that affect congestion. 5-26

42 Congestion Control in Virtual-Circuit Subnets (a) A congested subnet. (b) A redrawn subnet, eliminates congestion and a virtual circuit from A to B.

43 Hop-by-Hop Choke Packets (a) A choke packet that affects only the source. (b) A choke packet that affects each hop it passes through.

44 Jitter Control (a) High jitter. (b) Low jitter.