Sanjay Goel, School of Business, Management Science & Information Systems 1 Internet MIS 416 – Module II Spring 2002 Networking and Computer Security.

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
OSI Model OSI MODEL.
OSI MODEL Maninder Kaur
Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
OSI Model.
Introduction To Networking
Review on Networking Technologies Linda Wu (CMPT )
Internet MIS 416 – Module II Spring 2002 Networking and Computer Security.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Chapter 2 Network Models.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Gursharan Singh Tatla Transport Layer 16-May
OIS Model TCP/IP Model.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecturer: Tamanna Haque Nipa
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
Chapter 2 Network Models
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
The OSI Model.
10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Network Models.
Protocol Suits and Layering Models OSI Model Dr. Abraham UTPA.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Data Communication Network Models
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
The OSI Model and the TCP/IP Protocol Suite
Layered Architectures
Lecturer, Department of Computer Application
TCP/IP Transmission Control Protocol / Internet Protocol
DEPARTMENT OF COMPUTER SCIENCE
The OSI Model and the TCP/IP Protocol Suite
Process-to-Process Delivery:
TCP/IP Protocol Suite: Review
OSI Model OSI MODEL.
Network Architecture Models
The OSI Model and the TCP/IP Protocol Suite
OSI Reference Model Unit II
Process-to-Process Delivery: UDP, TCP
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Unit – III Network Essentials
Presentation transcript:

Sanjay Goel, School of Business, Management Science & Information Systems 1 Internet MIS 416 – Module II Spring 2002 Networking and Computer Security

Sanjay Goel, School of Business, Management Science & Information Systems 2 What is Internet? Internet Protocols Protocol hierarchies The OSI reference model Services in the OSI model Topics

Sanjay Goel, School of Business, Management Science & Information Systems 3 It is a network of networks Any network connected to the internet –Conform to certain naming conventions –Must run the IP protocol –IP protocol is also called Internet dial tone Internet has a hierarchical topology –End Systems connected to local ISPs through access networks –Access Network examples – LAN, telephone line with a modem, high speed cable networks –Local ISPs connected to regional ISPs, regional ISPs connected to national & international ISPs –Construction analogous with Lego construction What is the Internet?

Sanjay Goel, School of Business, Management Science & Information Systems 4 Allows distributed applications to exchange data with each other Applications include: FTP, Telnet, Mail, WWW, distributed games, video conferencing Provides two kinds of services –Connection Oriented Service (TCP): Establish connection prior to data exchange, coupled with reliable data transfer, flow control, congestion control etc. –Connectionless Service (UDP): No handshake prior to data exchange, No acknowledgement of data received, no flow/congestion control Role of Internet

Sanjay Goel, School of Business, Management Science & Information Systems 5 ISP Modem University Home Ethernet Lan Security Hosting Platform Origins of Online Content Information Flow ISP

Sanjay Goel, School of Business, Management Science & Information Systems 6 Internet is a very complex system Set of layers and protocols represents the Network Architecture. Protocols are stacked vertically as series of ‘layers’. Each layer has a well defined interface. –Allows for easy replacement of layer Each layer offers Services to layer above, shielding implementation details. Each layer on one machine communicates with corresponding layer on another machine using Protocol for the Layer. Protocol Hierarchies

Sanjay Goel, School of Business, Management Science & Information Systems 7 Layers, Protocols & Interfaces Physical communications medium Layer 1 Layer 1 protocol Layer 2 Layer 1/2 interface Layer 1/2 interface Layer 2 protocol Layer n protocol Layer n Layer 2/3 interface Layer n-1/n interface Layer 2/3 interface Layer n-1/n interface Layer n/n+1 interface Layer n/n+1 interface

Sanjay Goel, School of Business, Management Science & Information Systems 8 A protocol defines the format and the order of messages exchanged between two of more communicating entities as well as the actions taken on the transmission and/or receipt of a message or other event. Protocols TCP Connection Request TCP Connection Response Get Index.html Hi Got the Time? 8:50

Sanjay Goel, School of Business, Management Science & Information Systems 9 Examine the mail system in context of layering and standardized protocols –Each letter has a standard format for the address. Internet Architecture – Simple Analogy Sender’s Home Sender’s Mail Box Sender’s Post Office Routed Receiver’s Home Receiver’s Mail Box Receiver’s Post Office

Sanjay Goel, School of Business, Management Science & Information Systems 10 Internet Model

Sanjay Goel, School of Business, Management Science & Information Systems 11 Layered Architecture - Internet Application Layer Transport Layer Network Layer Link Layer Physical Network Application Layer Transport Layer Network Layer Link Layer Message Packet (Bridge) Datagram (Router) Frame (Hub) Host AHost B Port-to-Port Host-to-Host Node-to-Node Http, Ftp, Smtp, Telnet TCP, UDP Ethernet, FDDI IP Examples

Sanjay Goel, School of Business, Management Science & Information Systems 12 Implements application protocol –Users invoke applications using this protocol e.g. Web browsers are build using the http protocol Application Layer Protocol defines –Types of messages exchanged e.g. request or response –Syntax of the various message types, e.g. fields in the messages and how they are delineated –Semantics of the fields i.e. meaning of information in each field –Rules for determining when and how a process sends messages and responds to messages Application Layer

Sanjay Goel, School of Business, Management Science & Information Systems 13 Different applications use different protocols –Web Servers/Browsers use HTTP –File Transfer Utilities use FTP –Electronic Mail applications use SMTP –Naming Servers use DNS Interacts with transport layer to send messages –Choose the transport layer protocol –Fix transport layer parameters, such as, buffer/segment sizes Application Layer Protocol

Sanjay Goel, School of Business, Management Science & Information Systems 14 Two types of messages –Request –Response Application Layer Example: HTTP MethodspURLspVersionctrlf Header Field Name:Valuecrlf Header Field Name:Valuecrlf crlf Message Body Http Request Message Format Get /somedir/page.html HTTP/1.1 Connection: close User-agent: Mozilla Accept: text/html, image/gif, image/jpeg Accept-language: fr (extra carriage return, line feed) Request Line Header Lines Http Request Message Example

Sanjay Goel, School of Business, Management Science & Information Systems 15 Socket is the interface between application & transport layers Two parameters are required for identification of data –Host machine identifier- IP Address –Host machine process identifier- Port Application Layer Protocol TCP/UDP with Buffers and Variables Controlled by Application Developer Controlled by Operating System HOST Process Controlled by Operating System Controlled by Application Developer HOST TCP/UDP with Buffers and Variables Socket Internet

Sanjay Goel, School of Business, Management Science & Information Systems 16 Provides for logical communication between applications running on different hosts –Application multiplexing and demultiplexing Implemented in the end systems but not in network routers On sending side –Divides stream of application data into smaller units (packets), –Adds the transport header to each chunk –Sends message to network layer On receiving side –Takes the header off the message packets –Reassembles the packets in order –Sends message to the application layer Two internet transport protocols available –TCP –UDP Transport Layer

Sanjay Goel, School of Business, Management Science & Information Systems 17 TCP (Transmission Control Protocol) Connection Oriented Service (requires handshake) –Duplex –Simplex Reliable Data Transfer –Guaranteed delivery of packets Congestion Control –Throttles process when network is congested No guarantee of a minimum transmission rate Suitable for reliability critical/ non time critical applications –FTP –SMTP –Telnet –HTTP Internet Transport Protocols:TCP

Sanjay Goel, School of Business, Management Science & Information Systems 18 Stands for User Datagram Protocol Lightweight transport protocol Connectionless (no handshake) Unreliable data transport service –No acknowledgements (lost packets not resent) Messages may arrive out of order No congestion control –Application can pump as many packets over the socket as it chooses Suitable for loss-tolerant time critical applications –Audio/Video streaming –Internet Telephony Internet Transport Protocols: UDP

Sanjay Goel, School of Business, Management Science & Information Systems 19 Source / Destination Port Numbers –Multiplexing / Demultiplexing Sequence Number & Acknowledgement Number –Congestion Control Window size –Flow control Length Field –Length of TCP header in 32-bit words Unused field is currently unused Flag Field contains 6 bits –ACK: shows value in acknowledgement field is valid –RST, SYN, FIN bits used for connection setup and teardown –PSH bit indicates data should be passed to upper layer immediately –URG – indicates that there is data in the segment which is marked as urgent Ptr to urgent data Points to last byte of the urgent data Options field is used when sender and receiver negotiate the maximum segment size. Transport Layer Example Source Port NumberDestination Port Number Sequence Number Acknowledgement Number UR G AC K PSHPSH RSTRST SYNSYN FINFIN Header Length Unused Receiver Window Size Source PortPointer to Urgent Data Options Data 32-bits GET /directory/dirsearch.html HTTP/1.1 Host: Src: 1081 Dst: 80 Chksum: 0xa858 HTTP MessageTCP header Example

Sanjay Goel, School of Business, Management Science & Information Systems 20 Provides communication service between two hosts –Transports packets from sending host to receiving host Encapsulates packets in IP datagram with IP header Three primary tasks –Path Determination:Determine the route taken by a packet as it flows from sender to receiver –Switching: Arriving packet is moved to the appropriate output link –Call Setup: Handshake prior to routing packets (required by some network architectures) If addressed to local machine, remove the IP datagram header and pass up to transport layer. Network Layer

Sanjay Goel, School of Business, Management Science & Information Systems 21 Version: IP protocol version Header Length TOS –Allows different types of IP datagrams to be differentiated Datagram Length –Length of data + header Identifiers, Flags Fragmentation offset –Deal with fragmentation Time-to-live (TTL) –Decremented each time a router processes a datagram Datagram dropped when field is zero Protocol –Indicates transport level protocol e.g. 6 indicates TCP, 17 indicates UDP Checksum: Used for error checking Data – Contains the transport layer segment Network Layer Example GET /directory/dirsearch.html HTTP/1.1 Host: Src: 1081 Dst: 80 Chksum: 0xa858 Src: Dst: TTL: 128 HTTP MessageIP datagram header 32-bit destination IP Address Packet Length (bytes) Time to LiveHeaderchecksum Options (if any) Data 32-bits 32-bit source IP Address Version Header Length Type of Service 16-bit identifier 13-bit Fragm- entation Offset Flags Upper Layer Protocol TCP header Example

Sanjay Goel, School of Business, Management Science & Information Systems 22 Transfers network layer datagrams over a link from node to node –A node is a router or a host –A link is the communication path along two nodes Link Layer protocol defines the format of packets exchanged between nodes The packets exchanged by link layer are called frames –Each frame typically encapsulates one datagram –e.g. Ethernet, token ring, FDDI, PPP Link Layer

Sanjay Goel, School of Business, Management Science & Information Systems 23 Framing and Link Access Reliable delivery Flow Control Error Detection Error Correction Two types of services are provided –Half-Duplex and Full-Duplex Implemented in adapters commonly called Network Interface Cards (NIC) Link Layer - Services IP Module Frame IP Module Frame Transmitting Adapter Receiving Adapter Sending Node Reveiving Node Communication Link

Sanjay Goel, School of Business, Management Science & Information Systems 24 Ethernet is the dominant protocol in the LAN market –Primary factors are cost and complexity Many topologies of Ethernet –Bus Topology –Star Topology Supports multiple medium –Coaxial Cable –Copper Wire –Fiber Optic Can transmit data at different rates –10Mbps, 100Mbps, 1Gbps Link Layer Example - Ethernet

Sanjay Goel, School of Business, Management Science & Information Systems 25 Data  Contains the IP datagram Destination Address  LAN address of destination adapter Source Address  LAN address of source adapter Type  Permits Ethernet to multiplex network-layer protocols (allow different protocols) CRC (Cyclic Redundancy Check)  Allow receiving adapter to detect whether errors have crept into the frame Link Layer Example - Ethernet Preamble Dest. Address Source Address TypeDataCRC

Sanjay Goel, School of Business, Management Science & Information Systems 26 Transmits bits from one computer to another Regulates the transmission of a stream of bits over a physical medium. Defines how the cable is attached to the network adapter and what transmission technique is used to send data over the cable. Deals with issues like –The definition of 0 and 1, e.g. how many volts represents a 1, and how long a bit lasts? –Whether the channel is simplex or duplex? –How many pins a connector has, and what the function of each pin is? Physical Layer

Sanjay Goel, School of Business, Management Science & Information Systems 27 OSI Model

Sanjay Goel, School of Business, Management Science & Information Systems 28 OSI Reference Model - internationally standardised network architecture. OSI = Open Systems Interconnection –Deals with open systems, i.e. systems open for communications with other systems. Specified in ISO Model has 7 layers. OSI Reference Model

Sanjay Goel, School of Business, Management Science & Information Systems 29 Layers 1-4 relate to communications technology. Layers 5-7 relate to user applications. 7-Layer OSI Model Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Layer 1 Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Communications subnet boundary

Sanjay Goel, School of Business, Management Science & Information Systems 30 Level at which applications access network services. –Represents services that directly support software applications for file transfers, database access, and electronic mail etc. Layer 7: Application Layer

Sanjay Goel, School of Business, Management Science & Information Systems 31 Related to representation of transmitted data –Translates different data representations from the Application layer into uniform standard format Providing services for secure efficient data transmission –e.g. data encryption, and data compression. Layer 6: Presentation Layer

Sanjay Goel, School of Business, Management Science & Information Systems 32 Allows two applications on different computers to establish, use, and end a session. –e.g. file transfer, remote login Establishes dialog control –Regulates which side transmits, plus when and how long it transmits. Performs token management and synchronization. Layer 5: Session Layer

Sanjay Goel, School of Business, Management Science & Information Systems 33 Manages transmission packets –Repackages long messages when necessary into small packets for transmission –Reassembles packets in correct order to get the original message. Handles error recognition and recovery. –Transport layer at receiving acknowledges packet delivery. –Resends missing packets Layer 4: Transport Layer

Sanjay Goel, School of Business, Management Science & Information Systems 34 Manages addressing/routing of data within the subnet –Addresses messages and translates logical addresses and names into physical addresses. –Determines the route from the source to the destination computer –Manages traffic problems, such as switching, routing, and controlling the congestion of data packets. Routing can be: –Based on static tables –determined at start of each session –Individually determined for each packet, reflecting the current network load. Layer 3: Network Layer

Sanjay Goel, School of Business, Management Science & Information Systems 35  Packages raw bits from the Physical layer into frames (logical, structured packets for data).  Provides reliable transmission of frames  It waits for an acknowledgment from the receiving computer.  Retransmits frames for which acknowledgement not received Layer 2: Data Link Layer

Sanjay Goel, School of Business, Management Science & Information Systems 36 Transmits bits from one computer to another Regulates the transmission of a stream of bits over a physical medium. Defines how the cable is attached to the network adapter and what transmission technique is used to send data over the cable. Deals with issues like –The definition of 0 and 1, e.g. how many volts represents a 1, and how long a bit lasts? –Whether the channel is simplex or duplex? –How many pins a connector has, and what the function of each pin is? Layer 1: Physical Layer

Sanjay Goel, School of Business, Management Science & Information Systems 37 Explicit Presentation and session layers missing in Internet Protocols Data Link and Network Layers redesigned Internet Protocols vs OSI Application Presentation Session Transport Network Data Link Physical Application TCP IP Network Interface Hardware

Sanjay Goel, School of Business, Management Science & Information Systems 38 Internet Addressing Scheme

Sanjay Goel, School of Business, Management Science & Information Systems 39 Host identifiers are classified in three categories –Names: Identify what an object is –Addresses identify where object is –Routes identify how to get to the object Each host on a TCP/IP internet is assigned a unique 32-bit internet address that is used in all communication with that host. Written in dotted decimal notation –Written as four decimal integers separated by decimal points –Each integer gets the value of one octet of the IP address Example – – Internet Address (IP- Address)

Sanjay Goel, School of Business, Management Science & Information Systems 40 Conceptually each address is a pair (hostid, netid) –Netid identifies a network –Hostid identifies a host on that network Since IP addresses encode both a network and a host on that network, they do not specify individual computers, but a connection to a network –A router which connects to n networks will have n addresses –A multi-homed host will have multiple addresses TCP/IP – Internet Addressing

Sanjay Goel, School of Business, Management Science & Information Systems 41 Class of address assigned depends network size Each IP address should be class A, B, or C –Class A used for more than 2 16 hosts on network –Class B used for more than 2 8 but less than 2 16 hosts on network –Class C used for less than 2 8 hosts on network TCP/IP – Classes of IP Addresses hostid netid Multicast address Reserved for future use1 Class A Class B Class C Class D Class E bits

Sanjay Goel, School of Business, Management Science & Information Systems 42 Internet addresses can be used to refer to networks as well as individual hosts –An address with all bits of the hostid equal to 0 is reserved to refer to the network IP addresses can be used to specify a broadcast Directed broadcasts are used to broadcast messages to target networks –A directed broadcast address has a valid netid but the hostid has all bits set to 1 Local network broadcast address is used for broadcast to local network independent of any host address –Local broadcast address contains all 32 1’s TCP/IP – Network & Broadcast Addresses

Sanjay Goel, School of Business, Management Science & Information Systems 43 A field consisting of zeros means this –IP address with all hostid fields 0 means this host –A netid of 0 means the current network is the loop back address and used primarily for testing TCP/IP as well as for inter-process comm. Dotted Decimal Notation is used to represent IP addresses –IP addresses are written as four decimal integers separated by decimal points –Each integer gives the value of one octet of the IP address –  TCP/IP – Network & Broadcast Addresses contd.

Sanjay Goel, School of Business, Management Science & Information Systems 44 Footnotes: 1 Allowed only at system startup and is never a valid destination address. 2 Never a valid source address. 3 Should never appear on a network. TCP/IP – Summary of Exceptions all 0s all l s all 0shost netall 1s 127Anything (often 1) This host 1 Host on this net 1 Limited broadcast (local net) 2 Directed broadcast for net 2 Loopback 3

Sanjay Goel, School of Business, Management Science & Information Systems 45 Inadequate to respond to the fast growth of networks –Immense administrative overhead to manage network addresses –Routing tables in routers extremely large causing large overheads when routers exchange routing table information –Address space of networks will be eventually exhausted (Already short of class B addresses) Original scheme modified to allow sharing of network addresses –Transparent Routers –ARP –Standard IP Subnets Problems with conventional IP Addressing

Sanjay Goel, School of Business, Management Science & Information Systems 46 Allows multiple networks to share the same network address The IP address is redefined such that –The network id is left intact –The host id portion is split into subnetwork id and hostid TCP/IP subnet standard permits subnet interpretation to be chosen independently for each physical network. Once a subnet partition is selected all machines on the network must honour it. Standard IP Subnets host id0netid1 Original Scheme host id0Netid (Internet)1 Subnet Scheme Netid (Local)

Sanjay Goel, School of Business, Management Science & Information Systems 47 Allows multiple networks to share the same network address Subnets – Hierarchical Addressing R1 R3R2 R5R4 To the internet Network 1 Network 2Network 3 Network 4 Network 5

Sanjay Goel, School of Business, Management Science & Information Systems 48 Sites that use subnet addressing must also choose a 32-bit subnet mask for each network. –Bits for network identifier are set to 1 –Bits for the host identifier are set to 0 For a class B address if the third octet is used for local netid –Subnet Mask  Dotted Decimal Notation is also popular for subnet masks –{,, } –e.g Subnet Masks - Representation

Sanjay Goel, School of Business, Management Science & Information Systems 49 Routing

Sanjay Goel, School of Business, Management Science & Information Systems 50 Layered Architecture - WWW Application Layer Transport Layer Internet Layer Network Layer Physical Network Application Layer Transport Layer Internet Layer Network Layer HTTP Message TCP Packet IP Datagram Ethernet Frame Web Browser Web Server

Sanjay Goel, School of Business, Management Science & Information Systems 51 The data may be routed via numerous nodes called routers Routing Web Browser Web Server Router Network A Network B

Sanjay Goel, School of Business, Management Science & Information Systems 52 Protocol Layering - Routing Application Layer Transport Layer Network Layer Link Layer Physical Network Application Layer Transport Layer Network Layer Link Layer Message Packet Frame Datagram Network Layer Link Layer Physical Network Host BHost A Router

Sanjay Goel, School of Business, Management Science & Information Systems 53 Determining the path that the packets should take in going from one host to another is called routing A graph can be used to represent a network –The nodes correspond to the physical nodes and the edges correspond to the node connections Routing A D BC F E

Sanjay Goel, School of Business, Management Science & Information Systems 54 A the heart of the routing is the routing algorithm There are two kinds of routing algorithms –A global routing algorithm uses the knowledge of the entire network while making selection –A decentralized algorithm calculates the least cost path in an iterative distributed manner The routing algorithms can also be classified as –Static: Routes change very slowly over time usually via manual intervention –Dynamic: Change routing paths as network traffic loads or the topology changes Routing Algorithms

Sanjay Goel, School of Business, Management Science & Information Systems 55 Only two types of algorithms typically used on the Internet –A dynamic global link state algorithm –A dynamic decentralized distance vector algorithm Routing Algorithms

Sanjay Goel, School of Business, Management Science & Information Systems 56 Switch is a generic term for a device that switches data (packets or frames) Hub is link layer switch (node to node) –Operates on ethernet frames –L2 switch –Uses physical addresses (mac addresses) Bridge connects two LANS or two segments of the same LAN –Protocol Independent –Operates on ethernet frames –L2 switch –Uses physical addresses (mac addresses) Hub, Switch and Router

Sanjay Goel, School of Business, Management Science & Information Systems 57 Router is network layer switch (host to host) –Also called L3 switch –Uses network addresses –Operates on packets Gateway is a generic term for an internetworking system –Can be implemented in software and/or hardware –Can operate at any level of the OSI model from application protocols to low-level signaling. Hub, Switch and Router

Sanjay Goel, School of Business, Management Science & Information Systems 58 In TCP/IP any machine on the same network can be contacted directly, but machines on another network must be contacted through a router or gateway. Router is a specific device (software or hardware) that forwards a transmission from a local network to other networks. Since the router is another device on the network, it needs to have its own internal IP address that the computers can contact. Routers