Network Layer (3). Node lookup in p2p networks Section 5.2.11 in the textbook. In a p2p network, each node may provide some kind of service for other.

Slides:



Advertisements
Similar presentations
Delivery and Forwarding of
Advertisements

4 IP Address (IPv4)  A unique 32-bit number  Identifies an interface (on a host, on a router, …)  Represented in dotted-quad notation
Chapter 18 Introduction to Network Layer 18.# 1
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
4: Network Layer4a-1 IP Addressing: introduction r IP address: 32-bit identifier for host, router interface r interface: connection between host, router.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chapter 18. IP: Internet Protocol Addresses
A supernetwork.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Subnetting and CIDR Textbook Ch 3.2.5
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
Chapter 21 IP Addressing “If we all did the things we are capable of doing, we would literally astound ourselves” - Thomas Alva Edison,
CS 6401 Efficient Addressing Outline Addressing Subnetting Supernetting.
IP Addressing. Dotted Decimal Notation IP addresses are written in a so-called dotted decimal notation Each byte is identified by a decimal number in.
Types of Addresses in IPv4 Network Range
1 26-Aug-15 Addressing the network using IPv4 Lecture # 2 Engr. Orland G. Basas Prepared by: Engr. Orland G. Basas IT Lecturer.
Fall 2006Computer Networks19-1 Chapter 19. Host-to-Host Delivery: Internetworking, Addressing, and Routing 19.1 Internetworks 19.2 Addressing 19.3 Routing.
1 Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair ( NETID, HOSTID ) Addresses.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
IP Addressing Introductory material. An entire module devoted to IP addresses.
Network Layer (4). Classless Addressing Addresses allocated in contiguous blocks – Number of addresses assigned always power of 2 Network portion of address.
4: Network Layer4a-1 Hierarchical Routing r aggregate routers into regions, “autonomous systems” (AS) r routers in same AS run same routing protocol m.
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640.
Chapter 18 IP: Internet Protocol Addresses
Chapter 4, slide: 1 CS 372 – introduction to computer networks* Friday July 23, 2010 Announcements: r Midterms are graded. r Lab 4 is posted. Acknowledgement:
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Node Lookup in P2P Networks. Node lookup in p2p networks In a p2p network, each node may provide some kind of service for other nodes and also will ask.
1 Network Layer Lecture 15 Imran Ahmed University of Management & Technology.
Chapter 4 Objectives Upon completion you will be able to: Classful Internet Addressing Understand IPv4 addresses and classes Identify the class of an.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
IP addresses. Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol datagram.
Page 1 Network Addressing CS.457 Network Design And Management.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
IP Internet Protocol Fundamental packet format that computers use to exchange information. Is a set of technical rules that defines how computers communicate.
CS470 Computer Networking Protocols
IP Addressing.
Node Lookup in P2P Networks. Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service.
IP. Classless Inter-Domain Routing Classful addressing scheme wasteful – IP address space exhaustion – A class B net allocated enough for 65K hosts Even.
The Internet Network layer
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
1 Lecture, November 20, 2002 Message Delivery to Processes Internet Addressing Address resolution protocol (ARP) Dynamic host reconfiguration protocol.
Routing. Classless Inter-Domain Routing Classful addressing scheme wasteful – IP address space exhaustion – A class B net allocated enough for 65K hosts.
1 Lecture 11 Routing in Virtual Circuit Networks Internet Addressing.
Connection-orientated Service. Connection in data networks Another type of network, such as the telephone network, was developed based on the connection.
CCNA Discovery Semester 3 Addressing in an Enterprise Network Chapter 4 K. Martin.
Network Layer (2). Review Physical layer: move bits between physically connected stations Data link layer: move frames between physically connected stations.
Network Layer IP Address.
Internet Architecture
IP – Subnetting and CIDR
Scaling the Network: Subnetting and Protocols
The Network Layer.
Scaling the Network: Subnetting and Other Protocols
Computer Communication Networks
IP: Addressing, ARP, Routing
Scaling the Network Chapters 3-4 Part 1
Network Layer, and Logical Addresses
IP.
PART IV Network Layer.
CS4470 Computer Networking Protocols
Chapter 5: Network Layer (Part I)
IP Addressing Introductory material.
IP Addressing Introductory material.
Delivery and Forwarding of
IP Addressing Introductory material
Scaling the Network: Subnetting and Other Protocols
Network Layer: Control/data plane, addressing, routers
Introduction to Network
Presentation transcript:

Network Layer (3)

Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other nodes and also will ask other node for service. The problem is to locate a node who provides the service I need. In our project there is a central server who assigns nodes to others.

Node lookup in p2p networks P2P networks may have a very large number of nodes, such that a single central server may not be able to handle. Besides, there are legal issues. So, how to design lookup mechanism, such that I can find the node providing the service I need? For simplicity, let’s use the same model as in our project – Each node may have some files, and the job is to find a node with the file I need.

Node lookup in p2p networks Any suggestions? Ask the nodes in the network one-by-one? Flood the network? Binary search tree?

Node lookup in p2p networks Two costs you have to consider. – The lookup time – The number of messages sent Assume that there is only one node with the file I need, what is the cost for – Linear search? – Flood? – Binary search tree – Are they any good?

The key idea There is really not so much you can do if the network does not have a structure. Introduce structure to the network. Distributed Hash Table (DHT).

Chord Each node has a unique ID – By hashing its IP address by SHA-1 to get a 160-bit ID. Each file also has a unique ID, called key. – By hashing the file name by SHA-1 to get a 160-bit ID.

Chord Successor of a key x or ID x. – Arrange the node as a circle. Start at x and travel clockwise. The first (real) node you visit is the successor of F.

Chord successor(F) is the node in charge of telling other people where to get F. If a node has file F, he tells successor(F) that he has F. So, if you can find successor(F), meaning that the IP address of it, you are done.

Chord How to find successor(F)? Any suggestions?

Chord You know you location on the circle. You know the location of successor(F) on the circle. If every node keeps the IP address of its neighbor on the circle, need to do a linear search.

Chord But you control what nodes should remember. What do you want the nodes to remember, such that your searching time is small and your number of message is small?

Chord What Chord does is this. He remembers the successors of m locations if the node ID and key are m bits. Consider a node with ID k. The i^{th} entry of his finger table is the IP address of the successor of k+2^i mod 2^m. Given this, how do you design the routing algorithm?

Chord Start with k as the routing point (RP). If RP < F < successor(RP), successor(RP) = successor(F) and you are done because you know the IP address of successor(RP). Else, let the next RP be the one in the RP’s finger table that is closest predecessor of F. Repeat.

Chord Chord needs m routing steps. The reason is every time, the distance from the RP to the key is at least halved.

Internet Protocol (IP) Universal service in a heterogeneous world – IP over everything Globally unique logical address for a host

IP Packet

IP Addressing A 32-bit number that uniquely identifies a location Written using dotted decimal notation

IP Addressing IP address is assigned to each network interface Routers connect two or more physical networks – Each interface has its own address Multi-homed host – A host having multiple connections to Internet – Multiple addresses identify the same host – Does not forward packets between its interfaces

IP “Classful” Addressing Scheme Three unicast address classes: A, B, and C One multicast: class D 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to to to bits

Routing IP Packets Get the network address. If local, send the packet to the destination. If not local, send the packet to the next hop based on the network address.

Classless Inter-Domain Routing Classful addressing scheme wasteful – IP address space exhaustion – A class B net allocated enough for 65K hosts Even if only 2K hosts in that network Solution: CIDR – Eliminate class distinction No A,B,C – Keep multicast class D

Classless Addressing Addresses allocated in contiguous blocks – Number of addresses assigned always power of 2 Network portion of address is of arbitrary length Address format: a.b.c.d/x – x is number of bits in network portion of address network part host part /23

LAN first 24 bits are network address IP Addressing

Interconnected system consisting of six networks

CIDR A router keeps routing table with entries – IP address, 32-bit mask, outgoing line When an IP packet arrives, the router checks its routing table to find the longest match.

NAT – Network Address Translation

Virtual Circuit Destination information is large and the table is large – Consider 32 bit IP address. A full table will have 4G entries. If an IP packet is 1250 byte long and the link speed is 10Gbps, how much time do you have for this lookup? (1. You don’t have to implement the full table. 2. You can also use pipeline.)

Virtual Circuit Circuit means a path between the source and the destination. Real circuit switching has a physical path set up between the source and the destination, like telephone network – When you dial, a request is sent to the network, network finds if there are free links on the path and reserve that link for you. Virtual circuit is different – used in packet switching networks. – No real path set up, because it is packet switching (although link bandwidth can be reserved). – But still has the connection phase. The purpose is to let the routers know how to route the packets of this virtual circuit.

Virtual Circuits When setting up the virtual circuit, a VC identifier is picked. The router knows where to forward a packet with a certain VC identifier. Each packet will carry the VC identifier, which is much shorter than the full destination address, so allows more efficient table lookup. Resources can also be reserved. QoS. A practical problem in a distributed environment – different stations may pick the same VC identifier. Labels can be swapped without causing confusion. B E F D C A H1 H2 A’s Table In Out H1, 1 C, 1 H2, 1 C, 2 H3 C’s Table In Out A, 1 E, 1 A, 2 D, 1