Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Chapter 5: Network Layer
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
Network layer -- May Network layer Computer Networks.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
01. Apr INF-3190: Congestion Control Congestion Control Foreleser: Carsten Griwodz
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Congestion Control Algorithms
The Network Layer Functions: Congestion Control
CS4550: Computer Networks II network layer basics 3 routing & congestion control.
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
1 The Network Layer Chapter 5. 2 Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation.
Congestion Control Algorithms
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 24 Introduction to Computer Networks.
Networks: Routing1 Network Layer Routing. Networks: Routing2 Network Layer Concerned with getting packets from source to destination Network layer must.
Data Communications Packet Switching.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 23 Introduction to Computer Networks.
Teknik Routing Pertemuan 20 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer The service should be independent of the router.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
1 K. Salah Module 5.0: Internetworking & Network Layer Basic concepts Congestion Control Routing Protocols –Flooding –Source routing –Distance vector routing.
Extending Networks. Three Levels of Extension Physical Layer –Repeaters Link Layer –Bridges –Switches Network –Routers: “Connecting networks”
CS335 Networking & Network Administration Tuesday, April 20, 2010.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 21 Introduction to Computer Networks.
EECC694 - Shaaban #1 lec #7 Spring The OSI Reference Model Network Layer.
Networks: Routing1 Network Layer Routing. Networks: Routing2 Network Layer Concerned with getting packets from source to destination. The network layer.
Computer Networks Layering and Routing Dina Katabi
Data Communications & Computer Networks
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
SAvPS – úvod Genči 2009 (bsaed on Tanenbaum’s slides.
Chapter 5 The Network Layer.
The Network Layer Week 5. Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless.
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies CS490 Chapter 7b, Leon-Garcia Packet Switching Networks.
The Network Layer Chapter 5. Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
10/19/20151 The Network Layer. 10/19/20152 Introduction Route packets through subnet So, it must know the topology of the subnet It should also be able.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
The Network Layer.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Stainov - DataComMET CS TC5353 THE NETWORK LAYER 5.2 ROUTING ALGORITHMS - adaptive Distance Vector Routing (Bellman-Ford, Ford-Fulkenson). It was used.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
The Network Layer Chapter 5 1/4/2016www.ishuchita.com1.
CONGESTION CONTROL.
Lecture Network layer -- May Congestion control Algorithms.
Chapter 5 Network Layer.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
The Network Layer UNIT-4 snistforum.com. Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation.
The Network Layer Chapter 5 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education- Prentice Hall, 2011.
Network Layer Routing Networks: Routing.
William Stallings Data and Computer Communications
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Network Layer.
THE NETWORK LAYER.
Chapter 5 The Network Layer.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Tanenbaum Chapter 5 Network
ECE453 – Introduction to Computer Networks
The Network Layer Network Layer Design Issues:
PRESENTATION COMPUTER NETWORKS
Congestion Control, Quality of Service, & Internetworking
Network Layer Routing Networks: Routing.
Chapter 5 The Network Layer.
Presentation transcript:

Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer

2 Topics l Design Issues l Routing Algorithms l Congestion Control l Internetworking

3 Position of network layer

4 Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection- Oriented Service Comparison of Virtual-Circuit and Datagram Subnets

5 Store-and-Forward Packet Switching l The environment of the network layer protocols.

6 Figure 19.3 Network layer in an internetwork

7 Figure 19.4 Network layer at the source

8 Figure 19.5 Network layer at a router

9 Figure 19.6 Network layer at the destination

10 Services Provided to Transport Layer l Designing goals  Independent of subnet technology  Transport layer shielded from number, type, and topology of subnets  Uniform network address numbering l Two Types of Services  Connectionless  Connection-oriented

11 Implementation of Connectionless Service l Routing within a diagram subnet.

12 Implementation of Connection-Oriented Service l Routing within a virtual-circuit subnet.

13 Comparison of Virtual-Circuit and Datagram Subnets 5-4

14 Routing Algorithms l Network layer software l Deciding which output line an incoming packet should be transmitted to  Datagram: made for each packet  VC: made for new VC setup

15 Routing Algorithms l Desirable Properties  Correctness  Simplicity  Robustness  Stability  Fairness  Optimality

16 Routing Algorithms - Optimality l What to optimize?  Minimizing mean packet delay  Maximizing total network throughput  Problem  The above two are in conflicts l Compromise  Minimizing number of hops a packet must take from source to destination

17 Classes of Routing Algorithm l Two major classes  Non-adaptive  Adaptive

18 Two Major Classes of Routing Algorithm l Adaptive  Algorithms differ in  where to get information, e.g.,  Locally  From adjacent routers  From all routers  when to change routes, e.g.,  Every T sec  When the load changes  When the topology changes  what metric used for optimization, e.g.,  Distance  Number of hops  Estimated transit time

19 Routing Algorithms to be Studied l Static (i.e., nonadaptive) routing  Shortest path routing  Flooding l Dynamic (i.e., adaptive) routing  Distance vector routing  Link state routing

20 Optimality Principle l If router J is on the optimal path from router I to router K, then the optimal path from J to K also falls along the same route. l Proof? I K J L

21 Sink Tree l Direct consequence of optimality principle l Subnet graph  Node: router  Arc: link l The set of optimal routes from all sources to a given destination form a tree rooted at the destination l Might not be unique l Goal of routing algorithms  Discover and use the sink tree for all routers

22 Sink Tree l Example  Distance metric: number of hops SubnetSink tree

23 Shortest Path Routing l Given a pair of routers, find the shortest path between them l Subnet graph  Node: router  Arc: link  Labels of arcs  Function of factors  Weighting function changed for different criteria

24 Dijkstra's Algorithm l Each node labeled with  (distance from source, best known path)  Initially  distance: infinity  best known path: unknown  Label might change to reflect better paths l Node is either tentative or permanent  Initially tentative  As a path from source to that node discovered, label becomes permanent and never gets changed

25

26 Dijkstra's Algorithm l How do we find the path? l The algorithm given in the book works from destination to source  Why?

27 Flooding l Every incoming packet is sent out on every outgoing line except for the input line l Problem  Large number of packets are generated l Solutions  Hop counter  Avoiding duplicates  Selective flooding

28 Flooding - Conclusion l Optimal  Shortest path is always chosen  No other algorithm can produce a shorter delay l Robust l Not practical in most applications l Useful in some applications  Military application: robustness  Distributed database applications  Concurrent update  Wireless networks  Metric of other routing algorithms

29 Distance Vector Routing l Table in each router  Giving  Best known distance to each destination  Which line to use to get there  Indexed by each router  Each entry contains two parts  Preferred outgoing line to use for that destination  Estimate of "distance" to go there  Best known distance to each destination  Updated by exchanging information with neighbors

30 Distance Vector Routing l Router  Knows "distance" to each neighbor  Sends list to each neighbor every T msec  Receives lists from neighbors every T msec  If neighbor X knows  Distance from X to I is X I, and  Distance from the router to X is m then delay from router to I via X is (X I + m)  Performs calculation for each neighbor to find the best  Old table not used in calculation

31

32 Distance Vector Routing l Count-to-Infinity Problem  Good news spread fast, bad news leisurely  Infinity has to be defined

33 Link State Routing l A router 1.Discovers its neighbors and learn their network addresses - HELLO 2.Measures the delay or cost to each neighbor - ECHO 3.Constructs a packet telling all it has just learned – link state packet 4.Sends this packet to all other routers – flooding w/ duplicate avoidance 5.Computes the shortest path to every other router – Dijkstra’s algorithm

34 Link State Routing l In effect  Complete topology and all delays are experimentally measured and distributed to every router  Dijkstra's algorithm is applied to find the shortest path

35 Link State Packets

36 Hierarchical Routing l Problem  Network size grows  Routing tables grow l Solution  Hierarchical routing l Idea  Routers are divided into "regions"  Router knows detail about routing within its region  Router knows nothing about internal structure of other region

37 Path length from 1A to 5C?

38 Congestion Control l Congestion  Too many packets present in the subnet l Effects  Performance degraded  Packet lost

39 Congestion and Network Performance (Without congestion control) (Could be achieved by congestion control)

40 Causes of Congestion l Causes  Too many packets need an output line  queuing  Problem: not enough memory  packets dropped  Solution(?): adding more memory  New problem: timeout and retransmit  worse  Slow processors  Low bandwidth lines l Congestion tends to feed upon itself and become worse

41 Congestion Control v.s. Flow Control l Flow control relates to traffic between two machines, while congestion control is more global l Examples  No congestion, flow control needed  Flow control not needed, congestion l Confusion  Congestion control might send back "slow down" messages  Not an acknowledgement

42 Congestion Control - General Principles l Two groups  Open loop  Closed loop – feedback loop  Explicit feedback  Implicit feedback  Source deduces existence of congestion by making local observation  E.g., time needed for acknowledgement to come back

43 Congestion Control - General Principles l Closed Loop - Approach  Monitor the system to detect when and where congestion occurs  Pass this information to places where actions can be taken  Adjust system operation to correct the problem

44 Congestion Control l Congestion = (Load > Resources) l Solutions  Increase resources  Decrease load

45 Congestion Prevention Policies Policies that affect congestion. 5-26

46 Congestion Control in VC Subnets l Admission control l Alternative routes l Resource reservation  Based on negotiated agreement

47 Congestion Control in VC Subnets

48 Choke Packets l Used in both VC and datagram subnets l Approach  Each router monitors output line utilization  Threshold for "warning state"  A receiving router  Checks packet to see if output line in warning state  If yes then send a "choke packet" back to source host original packet tagged and forwarded

49 Choke Packet l Source, upon receiving a choke packet  Reduces traffic by a percentage after receiving choke packet  Choke packet referred to same destination is ignored for a fixed time interval  After time interval expired, listens  If choke packet received then goto the step of reducing traffic else increase traffic

50 Choke Packet l Typically  First choke packet causes data rate reduced to 50%, then 25%, …  Traffic is increased in smaller increments l Why?

51 Hop-by-Hop Choke Packets l Problem in high speed and long distance  slow reaction l Solution  Hop-by-hop choke packets l Buffers needed in routers l Effects:  Quick relief at the price of more buffers

52 Hop-by-Hop Choke Packets l (a) A choke packet that affects only the source. l (b) A choke packet that affects each hop it passes through.

53 Load Shedding l Discard whatever cannot be handled l Which packets to drop?  Application-dependent  Priorities

54 Load Shedding l Strategies  Wine or milk  Priority  Priority classes  Coupled with traffic shaping token bucket  Packet without token sent with lowest priority  Allowing VC set up with exceeding specification  Contingent on low priority  Header field needed (ATM 1bit) l Discard as early as possible!

55 Jitter Control l Jitter: variation in packet arrival time l Necessary for audio/video transmission l Control  Delay jitter is bounded by computing expected transit time for each hop along path  Packet is checked for behind/ahead schedule  Behind: sent out ASAP  Ahead: held for a while l Usually buffering is used to eliminate jitters

56 Internetworking l A collection of interconnected networks.

57 How Networks Differ

58 How Networks Can Be Connected

59 Concatenated Virtual Circuits l A sequence of VCs is set up from source through one or more gateways to destination l Each gateway maintains tables of information of VCs l Best when all networks have roughly the same properties

60 Concatenated Virtual Circuits

61 Connectionless Internetworking l Packets are not required to follow same sequence of connections l Routing per packet  Possibly higher bandwidth than VC l Packets might arrive out of order l Problems  Format  Addressing

62 Connectionless Internetworking

63 Tunneling l Encapsulating packets of a protocol in the payload of packets of another protocol l Useful in  Internetworking  VPN  IPv4 to IPv6 transition  …

64 Tunneling

65 Internetwork Routing l AS (Autonomous System)  Each network in internetwork independent of others l Two-Level Routing  Interior gateway protocol  Exterior gateway protocol l Differences between interior and exterior routings  International boundaries  Cost  Quality of service

66 Fragmentation l Why maximal packet size  Hardware  OS  Protocols  Standards  Retransmission reduction  Prevention of one packet occupying channel too long

67 Fragmentation l Maximum packet size different in different protocol  Examples: ATM 48 bytes, IP 65,515 bytes l Problem  Large size packets want to go through network of smaller packet size l Solution: Fragmentation  Allowing gateways to break packets into fragments, each as a separate internet packet  Problem: Easy to break but difficult to put back together

68 Fragmentation Strategies l Transparent fragmentation l Nontransparent fragmentation Transparent fragmentation Nontransparent fragmentation G5G5

69 Transparent Fragmentation l Properties  Fragmentation transparent to subsequent networks  Same exit gateway in each network l Procedure  Fragmentation  Each fragment is addressed to same exit gateway  Fragments are combined at exit gateway

70 Transparent Fragmentation l Simple l Problems  Combination  Performance  Overhead on repeated assembling

71 Nontransparent Fragmentation l Properties  Combination done at destination host  One or more exit gateway(s) l Procedure  Fragmentation  Each fragment is addressed to exit gateway(s)  Fragments are combined at destination host l Higher performance in datagram model l Problems  Every host must be able to reassemble  Overhead in packet header

72 Nontransparent Fragmentation l Numbering  Required for assembly l Assembly approach  Elementary fragment size defined  Fragments of a packet = maximum packet size of another network except for the last one  Header fields  Packet number  Number of first elementary fragment  End-of-packet bit

73