SlideShare une entreprise Scribd logo
1  sur  145
Chapter 4 Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Computer Networking: A Top Down Approach  5 th  edition.  Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network layer ,[object Object],[object Object],[object Object],[object Object],[object Object],application transport network data link physical application transport network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical
Two Key Network-Layer Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interplay between routing and forwarding 1 2 3 0111 value in arriving packet’s header routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1
Connection setup ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network service model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Q:  What  service model  for “channel” transporting datagrams from sender to receiver?
Network layer service models: Network Architecture Internet ATM ATM ATM ATM Service Model best effort CBR VBR ABR UBR Bandwidth none constant rate guaranteed rate guaranteed  minimum none Loss no yes yes no no Order no yes yes yes yes Timing no yes yes no no Congestion feedback no (inferred via loss) no congestion no congestion yes no Guarantees ?
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network layer connection and connection-less service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual circuits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VC implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forwarding table Forwarding table in northwest router: Routers maintain connection state information! 12 22 32 1 2 3 VC number interface number Incoming interface  Incoming VC #  Outgoing interface  Outgoing VC # 1  12  3  22 2  63  1  18  3  7  2  17 1  97  3  87 …  …  …  …
Virtual circuits: signaling protocols ,[object Object],[object Object],[object Object],1. Initiate call 2. incoming call 3. Accept call 4. Call connected 5. Data flow begins 6. Receive data application transport network data link physical application transport network data link physical
Datagram networks ,[object Object],[object Object],[object Object],[object Object],[object Object],1. Send data 2. Receive data application transport network data link physical application transport network data link physical
Forwarding table Destination Address Range   Link Interface 11001000 00010111 00010000 00000000 through  0  11001000 00010111 00010111 11111111 11001000 00010111 00011000 00000000 through  1 11001000 00010111 00011000 11111111  11001000 00010111 00011001 00000000 through  2 11001000 00010111 00011111 11111111  otherwise  3 4 billion  possible entries
Longest prefix matching Prefix Match   Link Interface 11001000 00010111 00010  0  11001000 00010111 00011000  1 11001000 00010111 00011  2 otherwise  3 DA: 11001000  00010111  00011000  10101010  Examples DA: 11001000  00010111  00010110  10100001  Which interface? Which interface?
Datagram or VC network: why? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Router Architecture Overview ,[object Object],[object Object],[object Object]
Input Port Functions ,[object Object],[object Object],[object Object],[object Object],Physical layer: bit-level reception Data link layer: e.g., Ethernet see chapter 5
Three types of switching fabrics
Switching Via Memory ,[object Object],[object Object],[object Object],[object Object],Input Port Output Port Memory System Bus
Switching Via a Bus ,[object Object],[object Object],[object Object],[object Object]
Switching Via An Interconnection Network ,[object Object],[object Object],[object Object],[object Object]
Output Ports ,[object Object],[object Object]
Output port queueing ,[object Object],[object Object]
How much buffering? ,[object Object],[object Object],[object Object],RTT  C . N
Input Port Queuing ,[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet Network layer ,[object Object],Transport layer: TCP, UDP Link layer physical layer Network layer forwarding table ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP datagram format ,[object Object],[object Object],[object Object],[object Object],ver length 32 bits data  (variable length, typically a TCP  or UDP segment) 16-bit identifier header checksum time to live 32 bit source IP address IP protocol version number header length (bytes) max number remaining hops (decremented at  each router) for fragmentation/ reassembly total datagram length (bytes) upper layer protocol to deliver payload to head. len type of service “ type” of data  flgs fragment offset upper layer 32 bit destination IP address Options (if any) E.g. timestamp, record route taken, specify list of routers  to visit.
IP Fragmentation & Reassembly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],fragmentation:  in:  one large datagram out:  3 smaller datagrams reassembly
IP Fragmentation and Reassembly ,[object Object],[object Object],[object Object],1480 bytes in  data field offset = 1480/8  ID =x offset =0 fragflag =0 length =4000 ID =x offset =0 fragflag =1 length =1500 ID =x offset =185 fragflag =1 length =1500 ID =x offset =370 fragflag =0 length =1040 One large datagram becomes several smaller datagrams
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Addressing: introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],223.1.1.1 223.1.1.3 223.1.1.4 223.1.2.9 223.1.1.1 = 11011111 00000001 00000001 00000001 223 1 1 1 223.1.1.2 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27
Subnets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 network consisting of 3 subnets subnet
Subnets ,[object Object],[object Object],Subnet mask: /24 223.1.1.0/24 223.1.2.0/24 223.1.3.0/24
Subnets ,[object Object],223.1.1.1 223.1.1.3 223.1.1.4 223.1.2.2 223.1.2.1 223.1.2.6 223.1.3.2 223.1.3.1 223.1.3.27 223.1.1.2 223.1.7.0 223.1.7.1 223.1.8.0 223.1.8.1 223.1.9.1 223.1.9.2
IP addressing: CIDR ,[object Object],[object Object],[object Object],11001000  00010111   0001000 0  00000000 subnet part host part 200.23.16.0/23
IP addresses: how to get one? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DHCP: Dynamic Host Configuration Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DHCP client-server scenario 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 DHCP  server arriving  DHCP  client  needs address in this network A B E
DHCP client-server scenario DHCP server: 223.1.2.5 arriving client time DHCP offer src: 223.1.2.5, 67  dest:  255.255.255.255, 68 yiaddrr: 223.1.2.4 transaction ID: 654 Lifetime: 3600 secs DHCP request src:  0.0.0.0, 68  dest::  255.255.255.255, 67 yiaddrr: 223.1.2.4 transaction ID: 655 Lifetime: 3600 secs DHCP ACK src: 223.1.2.5, 67  dest:  255.255.255.255, 68 yiaddrr: 223.1.2.4 transaction ID: 655 Lifetime: 3600 secs DHCP discover src : 0.0.0.0, 68  dest.: 255.255.255.255,67 yiaddr:  0.0.0.0 transaction ID: 654
IP addresses: how to get one? ,[object Object],[object Object],ISP's block  11001000  00010111  0001 0000  00000000  200.23.16.0/20  Organization 0  11001000  00010111  0001000 0  00000000  200.23.16.0/23  Organization 1  11001000  00010111  0001001 0  00000000  200.23.18.0/23  Organization 2  11001000  00010111  0001010 0  00000000  200.23.20.0/23  ...  …..  ….  …. Organization 7  11001000  00010111  0001111 0  00000000  200.23.30.0/23
Hierarchical addressing: route aggregation “ Send me anything with addresses  beginning  200.23.16.0/20” Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “ Send me anything with addresses  beginning  199.31.0.0/16” Organization 2 Hierarchical addressing allows efficient advertisement of routing  information: 200.23.16.0/23 200.23.18.0/23 200.23.30.0/23 200.23.20.0/23 . . . . . .
Hierarchical addressing: more specific routes ISPs-R-Us has a more specific route to Organization 1 “ Send me anything with addresses  beginning  200.23.16.0/20” Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “ Send me anything with addresses  beginning 199.31.0.0/16 or 200.23.18.0/23” Organization 2 200.23.16.0/23 200.23.18.0/23 200.23.30.0/23 200.23.20.0/23 . . . . . .
IP addressing: the last word... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NAT: Network Address Translation 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 138.76.29.7 local network (e.g., home network) 10.0.0/24 rest of Internet Datagrams with source or  destination in this network have 10.0.0/24 address for  source, destination (as usual) All  datagrams  leaving  local network have  same  single source NAT IP address: 138.76.29.7, different source port numbers
NAT: Network Address Translation ,[object Object],[object Object],[object Object],[object Object],[object Object]
NAT: Network Address Translation ,[object Object],[object Object],[object Object],[object Object],[object Object]
NAT: Network Address Translation 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 138.76.29.7 NAT translation table WAN side addr  LAN side addr 138.76.29.7, 5001  10.0.0.1, 3345 ……  …… 3:  Reply arrives dest. address: 138.76.29.7, 5001 4:  NAT router changes datagram dest addr from 138.76.29.7, 5001 to 10.0.0.1, 3345   S: 10.0.0.1, 3345 D: 128.119.40.186, 80 1 1:  host 10.0.0.1  sends datagram to  128.119.40.186, 80 S: 128.119.40.186, 80  D: 10.0.0.1, 3345 4 S: 138.76.29.7, 5001 D: 128.119.40.186, 80 2 2:  NAT router changes datagram source addr from 10.0.0.1, 3345 to 138.76.29.7, 5001, updates table S: 128.119.40.186, 80  D: 138.76.29.7, 5001 3
NAT: Network Address Translation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NAT traversal problem ,[object Object],[object Object],[object Object],[object Object],[object Object],10.0.0.1 10.0.0.4 NAT  router 138.76.29.7 Client ?
NAT traversal problem ,[object Object],[object Object],[object Object],[object Object],10.0.0.1 10.0.0.4 NAT  router 138.76.29.7 IGD
NAT traversal problem ,[object Object],[object Object],[object Object],[object Object],138.76.29.7 Client 1.  connection to relay initiated by NATted host 2.  connection to relay initiated by client 3.  relaying  established 10.0.0.1 NAT  router
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ICMP: Internet Control Message Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Type   Code   description 0  0  echo reply (ping) 3  0  dest. network unreachable 3  1  dest host unreachable 3  2  dest protocol unreachable 3  3  dest port unreachable 3  6  dest network unknown 3  7  dest host unknown 4  0  source quench (congestion control - not used) 8  0  echo request (ping) 9  0  route advertisement 10  0  router discovery 11  0  TTL expired 12  0  bad IP header
Traceroute and ICMP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv6 Header (Cont) Priority:   identify priority among datagrams in flow Flow Label:  identify datagrams in same “flow.”  (concept of“flow” not well defined). Next header:  identify upper layer protocol for data
Other Changes from IPv4 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Transition From IPv4 To IPv6 ,[object Object],[object Object],[object Object],[object Object]
Tunneling A B E F IPv6 IPv6 IPv6 IPv6 tunnel Logical view: Physical view: A B E F IPv6 IPv6 IPv6 IPv6 IPv4 IPv4
Tunneling IPv6 IPv6 IPv6 IPv6 tunnel Logical view: Physical view: IPv6 IPv6 IPv6 IPv6 IPv4 IPv4 A-to-B: IPv6 E-to-F: IPv6 B-to-C: IPv6 inside IPv4 B-to-C: IPv6 inside IPv4 A B E F A B E F C D Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Src:B Dest: E Flow: X Src: A Dest: F data Src:B Dest: E
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interplay between routing, forwarding 1 2 3 0111 value in arriving packet’s header routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1
Graph abstraction Graph: G = (N,E) N = set of routers = { u, v, w, x, y, z } E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) } Remark: Graph abstraction is useful in other network contexts Example: P2P, where N is set of peers and E is set of TCP connections u y x w v z 2 2 1 3 1 1 2 5 3 5
Graph abstraction: costs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cost of path (x 1 , x 2 , x 3 ,…, x p ) = c(x 1 ,x 2 ) + c(x 2 ,x 3 ) + … + c(x p-1 ,x p )  Question: What’s the least-cost path between u and z ? Routing algorithm: algorithm that finds least-cost path u y x w v z 2 2 1 3 1 1 2 5 3 5
Routing Algorithm classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Link-State Routing Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dijsktra’s Algorithm 1  Initialization:   2  N '  = {u}  3  for all nodes v  4  if v adjacent to u  5  then D(v) = c(u,v)  6  else D(v) =  ∞   7  8  Loop   9  find w not in N '  such that D(w) is a minimum  10  add w to N '   11  update D(v) for all v adjacent to w and not in N '  :  12  D(v) = min( D(v), D(w) + c(w,v) )  13  /* new cost to v is either old cost to v or known  14  shortest path cost to w plus cost from w to v */  15  until all nodes in N '
Dijkstra’s algorithm: example Step 0 1 2 3 4 5 N ' u ux uxy uxyv uxyvw uxyvwz D(v),p(v) 2,u 2,u 2,u D(w),p(w) 5,u 4,x 3,y 3,y D(x),p(x) 1,u D(y),p(y) ∞ 2,x D(z),p(z) ∞  ∞  4,y 4,y 4,y u y x w v z 2 2 1 3 1 1 2 5 3 5
Dijkstra’s algorithm: example (2)  Resulting shortest-path tree from u: Resulting forwarding table in u: u y x w v z v x y w z (u,v) (u,x) (u,x) (u,x) (u,x) destination link
Dijkstra’s algorithm, discussion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A D C B 1 1+e e 0 e 1 1 0 0 A D C B 2+e 0 0 0 1+e 1 A D C B 0 2+e 1+e 1 0 0 A D C B 2+e 0 e 0 1+e 1 initially …  recompute routing …  recompute …  recompute
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distance Vector Algorithm  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],v
Bellman-Ford example  Clearly, d v (z) = 5, d x (z) = 3, d w (z) = 3 d u (z) = min { c(u,v) + d v (z), c(u,x) + d x (z), c(u,w) + d w (z) } = min {2 + 5, 1 + 3, 5 + 3}  = 4 Node that achieves minimum is next hop in shortest path  ➜  forwarding table B-F equation says: u y x w v z 2 2 1 3 1 1 2 5 3 5
Distance Vector Algorithm  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Distance vector algorithm (4) ,[object Object],[object Object],[object Object],[object Object],D x (y) ← min v {c(x,v) + D v (y)}  for each node y  ∊  N ,[object Object]
Distance Vector Algorithm (5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Each node: wait  for (change in local link cost or msg from neighbor) recompute  estimates if DV to any dest has changed,  notify  neighbors
from from x  y  z x y z 0 from cost to x  y  z x y z ∞ ∞ ∞ ∞ ∞ cost to x  y  z x y z ∞ ∞ ∞ 7 1 0 cost to ∞ 2  0  1 ∞ ∞  ∞ 2  0  1 7  1  0 time node x table node y table node z table D x (y) = min{c(x,y) + D y (y), c(x,z) + D z (y)}    = min{2+0 , 7+1} = 2 D x (z) =  min{ c(x,y) +    D y (z), c(x,z) + D z (z) }  = min{2+1 , 7+0} = 3 3 2  x  y  z x y z 0  2  7 ∞ ∞ ∞ ∞ ∞ ∞ from cost to x z 1 2 7 y
from from x  y  z x y z 0  2  3 from cost to x  y  z x y z 0  2  3 from cost to x  y  z x y z ∞ ∞ ∞ ∞ ∞ cost to x  y  z x y z 0  2  7 from cost to x  y  z x y z 0  2  3 from cost to x  y  z x y z 0  2  3 from cost to x  y  z x y z 0  2  7 from cost to x  y  z x y z ∞ ∞ ∞ 7 1 0 cost to ∞ 2  0  1 ∞ ∞  ∞ 2  0  1 7  1  0 2  0  1 7  1  0 2  0  1 3  1  0 2  0  1 3  1  0 2  0  1 3  1  0 2  0  1 3  1  0 time node x table node y table node z table D x (y) = min{c(x,y) + D y (y), c(x,z) + D z (y)}    = min{2+0 , 7+1} = 2 D x (z) =  min{ c(x,y) +    D y (z), c(x,z) + D z (z) }  = min{2+1 , 7+0} = 3 x  y  z x y z 0  2  7 ∞ ∞ ∞ ∞ ∞ ∞ from cost to x z 1 2 7 y
Distance Vector: link cost changes ,[object Object],[object Object],[object Object],[object Object],“ good news  travels fast” At time  t 0 ,  y  detects the link-cost change, updates its DV,  and informs its neighbors. At time  t 1 ,  z  receives the update from  y  and updates its table.  It computes a new least cost to  x   and sends its neighbors its DV. At time  t 2 ,  y  receives  z ’s update and updates its distance table.  y ’s least costs do not change and hence  y   does  not  send any  message to  z .  x z 1 4 50 y 1
Distance Vector: link cost changes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],x z 1 4 50 y 60
Comparison of LS and DV algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hierarchical Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hierarchical Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interconnected ASes ,[object Object],[object Object],[object Object],3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b Intra-AS Routing  algorithm Inter-AS Routing  algorithm Forwarding table 3c
Inter-AS tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b 3c
Example: Setting forwarding table in router 1d ,[object Object],[object Object],[object Object],[object Object],3b 3a 2a AS3 AS1 AS2 1a x … 1d 1c 2c 2b 1b 3c
Example: Choosing among multiple ASes ,[object Object],[object Object],[object Object],x … … 3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b 3c
Example: Choosing among multiple ASes ,[object Object],[object Object],[object Object],[object Object],Learn from inter-AS  protocol that subnet  x is reachable via  multiple gateways Use routing info from intra-AS  protocol to determine costs of least-cost  paths to each of the gateways Hot potato routing: Choose the gateway that has the  smallest least cost Determine from forwarding table the  interface I that leads  to least-cost gateway.  Enter (x,I) in  forwarding table
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intra-AS Routing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RIP ( Routing Information Protocol) ,[object Object],[object Object],[object Object],From router A to subnets: D C B A u v w x y z destination   hops u  1 v  2 w  2 x  3 y  3 z  2
RIP advertisements ,[object Object],[object Object]
RIP: Example   Destination Network   Next  Router  Num. of hops to dest. w A 2 y B 2 z B 7 x -- 1 … . …. .... w x y z A C D B Routing/Forwarding table in D
RIP: Example   Destination Network   Next  Router  Num. of hops to dest. w A 2 y B 2 z B A 7 5 x -- 1 … . …. .... Routing/Forwarding table in D Dest  Next  hops w   -  1 x   -  1 z   C  4 … .   …  ... Advertisement from A to D w x y z A C D B
RIP: Link Failure and Recovery   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RIP Table processing ,[object Object],[object Object],physical link network  forwarding (IP)  table Transprt (UDP) physical link network (IP) Transprt (UDP) forwarding table routed routed
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OSPF (Open Shortest Path First) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OSPF “advanced” features (not in RIP) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hierarchical OSPF
Hierarchical OSPF ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet inter-AS routing: BGP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BGP basics ,[object Object],[object Object],[object Object],[object Object],[object Object],3b 3a 2a AS3 AS1 AS2 1a eBGP session iBGP session 1d 1c 2c 2b 1b 3c
Distributing reachability info ,[object Object],[object Object],[object Object],[object Object],3b 3a 2a AS3 AS1 AS2 1a eBGP session iBGP session 1d 1c 2c 2b 1b 3c
Path attributes & BGP routes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BGP route selection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BGP messages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BGP routing policy ,[object Object],[object Object],[object Object],[object Object],[object Object],A B C W X Y legend : customer  network: provider network
BGP routing policy (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A B C W X Y legend : customer  network: provider network
Why different Intra- and Inter-AS routing ?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 4: Network Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Broadcast Routing ,[object Object],[object Object],[object Object],R1 R2 R3 R4 source duplication R1 R2 R3 R4 in-network duplication duplicate creation/transmission duplicate duplicate
In-network duplication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spanning Tree ,[object Object],[object Object],A B G D E c F A B G D E c F (a) Broadcast initiated at A (b) Broadcast initiated at D
Spanning Tree: Creation ,[object Object],[object Object],[object Object],1 2 3 4 5 ,[object Object],(b) Constructed spanning tree A B G D E c F A B G D E c F
Multicast Routing: Problem Statement ,[object Object],[object Object],[object Object],[object Object],Shared tree Source-based trees
Approaches for building mcast trees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],… we first look at basic approaches, then specific protocols adopting these approaches
Shortest Path Tree ,[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member link used for forwarding, i indicates order link added by algorithm LEGEND S: source 2 1 6 3 4 5 i
Reverse Path Forwarding ,[object Object],[object Object],[object Object],[object Object],[object Object]
Reverse Path Forwarding: example ,[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member datagram will be  forwarded LEGEND S: source datagram will not be  forwarded
Reverse Path Forwarding: pruning ,[object Object],[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member prune message LEGEND S: source links with multicast forwarding P P P
Shared-Tree: Steiner Tree ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Center-based trees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Center-based trees: an example Suppose R6 chosen as center: R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member path order in which join messages generated LEGEND 2 1 3 1
Internet Multicasting Routing: DVMRP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DVMRP: continued… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tunneling ,[object Object],[object Object],[object Object],[object Object],physical topology logical topology
PIM: Protocol Independent Multicast ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Consequences of Sparse-Dense Dichotomy:   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PIM- Dense Mode ,[object Object],[object Object],[object Object],[object Object]
PIM - Sparse Mode ,[object Object],[object Object],[object Object],[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 join join join all data multicast from rendezvous point rendezvous point
PIM - Sparse Mode ,[object Object],[object Object],[object Object],[object Object],[object Object],R1 R2 R3 R4 R5 R6 R7 join join join all data multicast from rendezvous point rendezvous point
Chapter 4: summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
Transport services
Transport servicesTransport services
Transport services
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Transport layer
Transport layerTransport layer
Transport layer
 
the transport layer
the transport layerthe transport layer
the transport layer
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Transport layer
Transport layer Transport layer
Transport layer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
CN_Lec 5_OSI
CN_Lec 5_OSICN_Lec 5_OSI
CN_Lec 5_OSI
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Transport Layer Description By Varun Tiwari
Transport Layer Description By Varun TiwariTransport Layer Description By Varun Tiwari
Transport Layer Description By Varun Tiwari
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Transport layer
Transport layerTransport layer
Transport layer
 
transport layer
transport layer transport layer
transport layer
 

En vedette

Computer Networks Homework Help
Computer Networks Homework HelpComputer Networks Homework Help
Computer Networks Homework HelpAssignmentpedia
 
GOOGLE CAR(autonomous car)
GOOGLE CAR(autonomous  car)GOOGLE CAR(autonomous  car)
GOOGLE CAR(autonomous car)SACHIN KS
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layertmavroidis
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing ProtocolsRam Dutt Shukla
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sirsharifbdp
 

En vedette (8)

Ch08
Ch08Ch08
Ch08
 
Computer Networks Homework Help
Computer Networks Homework HelpComputer Networks Homework Help
Computer Networks Homework Help
 
GOOGLE CAR(autonomous car)
GOOGLE CAR(autonomous  car)GOOGLE CAR(autonomous  car)
GOOGLE CAR(autonomous car)
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 
IP addressing by Mamun Sir
IP addressing by Mamun SirIP addressing by Mamun Sir
IP addressing by Mamun Sir
 

Similaire à Chapter4 Network

Chapter4 network layer
Chapter4 network layerChapter4 network layer
Chapter4 network layerKhánh Ghẻ
 
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4Computer Networking network layer chapter 4
Computer Networking network layer chapter 4RoopaRathod2
 
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptChapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptMaiTran87348
 
computer organizational architecture lecture 14 william starliin
computer organizational architecture lecture 14 william starliin computer organizational architecture lecture 14 william starliin
computer organizational architecture lecture 14 william starliin sahil shama
 
Chapter_4_v8.0.pptx
Chapter_4_v8.0.pptxChapter_4_v8.0.pptx
Chapter_4_v8.0.pptxChungHong22
 
Chapter 4 - Computer Networking a top-down Approach 7th
Chapter 4 - Computer Networking a top-down Approach 7thChapter 4 - Computer Networking a top-down Approach 7th
Chapter 4 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
Chapter_4_V7.01.ppt
Chapter_4_V7.01.pptChapter_4_V7.01.ppt
Chapter_4_V7.01.pptAzaiun
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networksNoor Azura Adnan
 
Lecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxLecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxHanzlaNaveed1
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2Techglyphs
 
Communication in Distributed System.ppt
Communication in Distributed System.pptCommunication in Distributed System.ppt
Communication in Distributed System.pptSELVAVINAYAGAMG
 

Similaire à Chapter4 Network (20)

Chapter4 network layer
Chapter4 network layerChapter4 network layer
Chapter4 network layer
 
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4Computer Networking network layer chapter 4
Computer Networking network layer chapter 4
 
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptChapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.ppt
 
computer organizational architecture lecture 14 william starliin
computer organizational architecture lecture 14 william starliin computer organizational architecture lecture 14 william starliin
computer organizational architecture lecture 14 william starliin
 
Chapter 4 v6.11
Chapter 4 v6.11Chapter 4 v6.11
Chapter 4 v6.11
 
Chapter_4.pptx
Chapter_4.pptxChapter_4.pptx
Chapter_4.pptx
 
Chapter_4_v8.0.pptx
Chapter_4_v8.0.pptxChapter_4_v8.0.pptx
Chapter_4_v8.0.pptx
 
Chapter 4 - Computer Networking a top-down Approach 7th
Chapter 4 - Computer Networking a top-down Approach 7thChapter 4 - Computer Networking a top-down Approach 7th
Chapter 4 - Computer Networking a top-down Approach 7th
 
Lecture24
Lecture24Lecture24
Lecture24
 
Chapter_4_V7.01.ppt
Chapter_4_V7.01.pptChapter_4_V7.01.ppt
Chapter_4_V7.01.ppt
 
Lecture14
Lecture14Lecture14
Lecture14
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 
P5 Network Layer
P5 Network LayerP5 Network Layer
P5 Network Layer
 
Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networks
 
Lecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxLecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptx
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2
 
Communication in Distributed System.ppt
Communication in Distributed System.pptCommunication in Distributed System.ppt
Communication in Distributed System.ppt
 

Dernier

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Dernier (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Chapter4 Network

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Interplay between routing and forwarding 1 2 3 0111 value in arriving packet’s header routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1
  • 7.
  • 8.
  • 9. Network layer service models: Network Architecture Internet ATM ATM ATM ATM Service Model best effort CBR VBR ABR UBR Bandwidth none constant rate guaranteed rate guaranteed minimum none Loss no yes yes no no Order no yes yes yes yes Timing no yes yes no no Congestion feedback no (inferred via loss) no congestion no congestion yes no Guarantees ?
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Forwarding table Forwarding table in northwest router: Routers maintain connection state information! 12 22 32 1 2 3 VC number interface number Incoming interface Incoming VC # Outgoing interface Outgoing VC # 1 12 3 22 2 63 1 18 3 7 2 17 1 97 3 87 … … … …
  • 15.
  • 16.
  • 17. Forwarding table Destination Address Range Link Interface 11001000 00010111 00010000 00000000 through 0 11001000 00010111 00010111 11111111 11001000 00010111 00011000 00000000 through 1 11001000 00010111 00011000 11111111 11001000 00010111 00011001 00000000 through 2 11001000 00010111 00011111 11111111 otherwise 3 4 billion possible entries
  • 18. Longest prefix matching Prefix Match Link Interface 11001000 00010111 00010 0 11001000 00010111 00011000 1 11001000 00010111 00011 2 otherwise 3 DA: 11001000 00010111 00011000 10101010 Examples DA: 11001000 00010111 00010110 10100001 Which interface? Which interface?
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Three types of switching fabrics
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. DHCP client-server scenario 223.1.1.1 223.1.1.2 223.1.1.3 223.1.1.4 223.1.2.9 223.1.2.2 223.1.2.1 223.1.3.2 223.1.3.1 223.1.3.27 DHCP server arriving DHCP client needs address in this network A B E
  • 46. DHCP client-server scenario DHCP server: 223.1.2.5 arriving client time DHCP offer src: 223.1.2.5, 67 dest: 255.255.255.255, 68 yiaddrr: 223.1.2.4 transaction ID: 654 Lifetime: 3600 secs DHCP request src: 0.0.0.0, 68 dest:: 255.255.255.255, 67 yiaddrr: 223.1.2.4 transaction ID: 655 Lifetime: 3600 secs DHCP ACK src: 223.1.2.5, 67 dest: 255.255.255.255, 68 yiaddrr: 223.1.2.4 transaction ID: 655 Lifetime: 3600 secs DHCP discover src : 0.0.0.0, 68 dest.: 255.255.255.255,67 yiaddr: 0.0.0.0 transaction ID: 654
  • 47.
  • 48. Hierarchical addressing: route aggregation “ Send me anything with addresses beginning 200.23.16.0/20” Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “ Send me anything with addresses beginning 199.31.0.0/16” Organization 2 Hierarchical addressing allows efficient advertisement of routing information: 200.23.16.0/23 200.23.18.0/23 200.23.30.0/23 200.23.20.0/23 . . . . . .
  • 49. Hierarchical addressing: more specific routes ISPs-R-Us has a more specific route to Organization 1 “ Send me anything with addresses beginning 200.23.16.0/20” Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “ Send me anything with addresses beginning 199.31.0.0/16 or 200.23.18.0/23” Organization 2 200.23.16.0/23 200.23.18.0/23 200.23.30.0/23 200.23.20.0/23 . . . . . .
  • 50.
  • 51. NAT: Network Address Translation 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 138.76.29.7 local network (e.g., home network) 10.0.0/24 rest of Internet Datagrams with source or destination in this network have 10.0.0/24 address for source, destination (as usual) All datagrams leaving local network have same single source NAT IP address: 138.76.29.7, different source port numbers
  • 52.
  • 53.
  • 54. NAT: Network Address Translation 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 138.76.29.7 NAT translation table WAN side addr LAN side addr 138.76.29.7, 5001 10.0.0.1, 3345 …… …… 3: Reply arrives dest. address: 138.76.29.7, 5001 4: NAT router changes datagram dest addr from 138.76.29.7, 5001 to 10.0.0.1, 3345 S: 10.0.0.1, 3345 D: 128.119.40.186, 80 1 1: host 10.0.0.1 sends datagram to 128.119.40.186, 80 S: 128.119.40.186, 80 D: 10.0.0.1, 3345 4 S: 138.76.29.7, 5001 D: 128.119.40.186, 80 2 2: NAT router changes datagram source addr from 10.0.0.1, 3345 to 138.76.29.7, 5001, updates table S: 128.119.40.186, 80 D: 138.76.29.7, 5001 3
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. IPv6 Header (Cont) Priority: identify priority among datagrams in flow Flow Label: identify datagrams in same “flow.” (concept of“flow” not well defined). Next header: identify upper layer protocol for data
  • 65.
  • 66.
  • 67. Tunneling A B E F IPv6 IPv6 IPv6 IPv6 tunnel Logical view: Physical view: A B E F IPv6 IPv6 IPv6 IPv6 IPv4 IPv4
  • 68. Tunneling IPv6 IPv6 IPv6 IPv6 tunnel Logical view: Physical view: IPv6 IPv6 IPv6 IPv6 IPv4 IPv4 A-to-B: IPv6 E-to-F: IPv6 B-to-C: IPv6 inside IPv4 B-to-C: IPv6 inside IPv4 A B E F A B E F C D Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Src:B Dest: E Flow: X Src: A Dest: F data Src:B Dest: E
  • 69.
  • 70. Interplay between routing, forwarding 1 2 3 0111 value in arriving packet’s header routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1
  • 71. Graph abstraction Graph: G = (N,E) N = set of routers = { u, v, w, x, y, z } E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) } Remark: Graph abstraction is useful in other network contexts Example: P2P, where N is set of peers and E is set of TCP connections u y x w v z 2 2 1 3 1 1 2 5 3 5
  • 72.
  • 73.
  • 74.
  • 75.
  • 76. Dijsktra’s Algorithm 1 Initialization: 2 N ' = {u} 3 for all nodes v 4 if v adjacent to u 5 then D(v) = c(u,v) 6 else D(v) = ∞ 7 8 Loop 9 find w not in N ' such that D(w) is a minimum 10 add w to N ' 11 update D(v) for all v adjacent to w and not in N ' : 12 D(v) = min( D(v), D(w) + c(w,v) ) 13 /* new cost to v is either old cost to v or known 14 shortest path cost to w plus cost from w to v */ 15 until all nodes in N '
  • 77. Dijkstra’s algorithm: example Step 0 1 2 3 4 5 N ' u ux uxy uxyv uxyvw uxyvwz D(v),p(v) 2,u 2,u 2,u D(w),p(w) 5,u 4,x 3,y 3,y D(x),p(x) 1,u D(y),p(y) ∞ 2,x D(z),p(z) ∞ ∞ 4,y 4,y 4,y u y x w v z 2 2 1 3 1 1 2 5 3 5
  • 78. Dijkstra’s algorithm: example (2) Resulting shortest-path tree from u: Resulting forwarding table in u: u y x w v z v x y w z (u,v) (u,x) (u,x) (u,x) (u,x) destination link
  • 79.
  • 80.
  • 81.
  • 82. Bellman-Ford example Clearly, d v (z) = 5, d x (z) = 3, d w (z) = 3 d u (z) = min { c(u,v) + d v (z), c(u,x) + d x (z), c(u,w) + d w (z) } = min {2 + 5, 1 + 3, 5 + 3} = 4 Node that achieves minimum is next hop in shortest path ➜ forwarding table B-F equation says: u y x w v z 2 2 1 3 1 1 2 5 3 5
  • 83.
  • 84.
  • 85.
  • 86. from from x y z x y z 0 from cost to x y z x y z ∞ ∞ ∞ ∞ ∞ cost to x y z x y z ∞ ∞ ∞ 7 1 0 cost to ∞ 2 0 1 ∞ ∞ ∞ 2 0 1 7 1 0 time node x table node y table node z table D x (y) = min{c(x,y) + D y (y), c(x,z) + D z (y)} = min{2+0 , 7+1} = 2 D x (z) = min{ c(x,y) + D y (z), c(x,z) + D z (z) } = min{2+1 , 7+0} = 3 3 2 x y z x y z 0 2 7 ∞ ∞ ∞ ∞ ∞ ∞ from cost to x z 1 2 7 y
  • 87. from from x y z x y z 0 2 3 from cost to x y z x y z 0 2 3 from cost to x y z x y z ∞ ∞ ∞ ∞ ∞ cost to x y z x y z 0 2 7 from cost to x y z x y z 0 2 3 from cost to x y z x y z 0 2 3 from cost to x y z x y z 0 2 7 from cost to x y z x y z ∞ ∞ ∞ 7 1 0 cost to ∞ 2 0 1 ∞ ∞ ∞ 2 0 1 7 1 0 2 0 1 7 1 0 2 0 1 3 1 0 2 0 1 3 1 0 2 0 1 3 1 0 2 0 1 3 1 0 time node x table node y table node z table D x (y) = min{c(x,y) + D y (y), c(x,z) + D z (y)} = min{2+0 , 7+1} = 2 D x (z) = min{ c(x,y) + D y (z), c(x,z) + D z (z) } = min{2+1 , 7+0} = 3 x y z x y z 0 2 7 ∞ ∞ ∞ ∞ ∞ ∞ from cost to x z 1 2 7 y
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104. RIP: Example Destination Network Next Router Num. of hops to dest. w A 2 y B 2 z B 7 x -- 1 … . …. .... w x y z A C D B Routing/Forwarding table in D
  • 105. RIP: Example Destination Network Next Router Num. of hops to dest. w A 2 y B 2 z B A 7 5 x -- 1 … . …. .... Routing/Forwarding table in D Dest Next hops w - 1 x - 1 z C 4 … . … ... Advertisement from A to D w x y z A C D B
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136. Center-based trees: an example Suppose R6 chosen as center: R1 R2 R3 R4 R5 R6 R7 router with attached group member router with no attached group member path order in which join messages generated LEGEND 2 1 3 1
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.

Notes de l'éditeur

  1. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-9
  2. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-11
  3. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-12
  4. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-13
  5. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-14
  6. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-15
  7. Notes: 1. See L. Wei and D. Estrin, “A Comparison of multicast trees and algorithms,” TR USC-CD-93-560, Dept. Computer Science, University of California, Sept 1993 for a comparison of heuristic approaches. 3.3 Network Layer: Multicast Routing Algorithms 3-16
  8. Notes: 1. It’s always nice to see a PhD dissertation with impact. The earliest discussion of center-based trees for multicast appears to be D. Wall, “Mechanisms for Broadcast and Selective Broadcast,” PhD dissertation, Stanford U., June 1980. 3.3 Network Layer: Multicast Routing Algorithms 3-17
  9. Notes: 3.3 Network Layer: Multicast Routing Algorithms 3-18
  10. Notes: D. Waitzman, S. Deering, C. Partridge, “Distance Vector Multicast Routing Protocol,” RFC 1075, Nov. 1988. The version of DVMRP in use today is considerably enhanced over the RFC1075 spec. A more up-to-date “work-in-progress” defines a version 3 of DVMRP: T. Pusateri, “Distance Vector Multicast Routing Protocol,” work-in-progress, draft-ietf-idmr-v3-05.ps 3.4 Network Layer: Internet Multicast Routing Algorithms 3-20
  11. Notes: 1. See www.mbone.com/mbone/routers.html for a (slightly outdatet) list of multicast capable routers (supporting DVMPR as well as other protocols) from various vendors. 2. ftp://parcftp.xerox.com/pub/net-research/ipmulti for circa 1996 public copy “mrouted” v3.8 of DVMRP routing software for various workstation routing platforms. 3.4 Network Layer: Internet Multicast Routing Algorithms 3-21
  12. Notes: For a general discussion of IP encapsulation, see C. Perkins, “IP Encapsulation within IP,” RFC 2003, Oct. 1996. The book S. Bradner, A Mankin, “Ipng: Internet protocol next generation,” Addison Wesley, 1995 has a very nice discussion of tunneling Tunneling can also be used to connect islands of IPv6 capable routers in a sea IPv4 capable routers. The long term hope is that the sea evaporates leaving only lands of IPv6! 3.4 Network Layer: Internet Multicast Routing Algorithms 3-22
  13. Notes: a very readable discussion of the PIM architecture is S. Deering, D. Estrin, D. Faranacci, V. Jacobson, C. Liu, L. Wei, “The PIM Architecture for Wide Area Multicasting,” IEEE/ACM Transactions on Networking, Vol. 4, No. 2, April 1996. D. Estrin et al, PIM-SM: Protocol Specification, RFC 2117, June 1997 S. Deering et al, PIM Version 2, Dense Mode Specification, work in progress, draft-ietf-idmr-pim-dm-05.txt PIM is implemented in Cisco routers and has been deployed in UUnet as part of their streaming multimedia delivery effort. See S. LaPolla, “IP Multicast makes headway among ISPs,” PC Week On-Line, http://www.zdnet.com/pcweek/news/1006/06isp.html 3.4 Network Layer: Internet Multicast Routing Algorithms 3-25
  14. Notes: 3.4 Network Layer: Internet Multicast Routing Algorithms 3-26
  15. Notes: 3.4 Network Layer: Internet Multicast Routing Algorithms 3-27
  16. Notes: 3.4 Network Layer: Internet Multicast Routing Algorithms 3-28
  17. Notes: 3.4 Network Layer: Internet Multicast Routing Algorithms 3-29