Beruflich Dokumente
Kultur Dokumente
Network layer is for end to end transmission of datagrams, compared to DLL- point to point forwarding of frames.
Mechanism employed is store and forward packet switching – store packet at router till it is fully arrived, compute
checksum.
Routers hold routing table for every possible destination. Pairs of entries hold destination + outgoing line.
A routing Algorithm required to determine route to destinations, (ie to update the table.)
Eg network: ATM
Routing Algorithms:
-responsible for determining which output line an incoming packet should be transmitted on.
In a VC, it is called session forwarding.
Flooding –a static algorithm – is to send every income packet on every outgoing line. (apart from one on which it
arrived): can be used as a benchmark for other algs as flooding always uses shortest path to destination.(shortest
delay)
Avoid infinite propagation by using a decreasing hop count.
To avoid forwarding a packet a second time, use a sequence number – note received packets, if new packet has a
higher sequence number than previously seen, do not forward => previously seen.
Count to infinity problem (good news travels fast, bad travels slowly –when a link breaks.
A—B—C—D—E
B—C—D—E
(solve by setting infinity to max no of paths +1)
Delay metric in dist vector routing is queue length. Not take account of bandwidth. Also Dist Vector Routing takes
long to converge
Newer algorithm takes in to consideration.
Link state routing.
MANETS eg AODV
Congestion is caused by sudden arrival of streams of data on multiple lines with a fewer output lines, slow
processors with inadequate memory (buffers for queuing), low bandwidth (low throughput)
Router sends feedback as a packet to the source of the traffic, or sends notification by a flag bit. Can also warn
routers on outgoing lines. Can also proactively find out about state of network by sending out probe packets.
Closed loop:
On a virtual circuit:
carry out admission control. -when congestion is detected, do not set up more virtual circuits until the problem has
cleared.
Careful routing around the problem routers atg VC setup
Set up an agreement (negotiate it) at connection time, to guarantee resources for the connection.
On a datagram subnet
Signal congestion by sending a warning bit in all ack packets to warn/alert source to cut back
Send choke packet to source. Till it arrives, more pkts will be sent. Note that after a fixed interval, source monitors
for more choke pkts. Increases after congestion are in smaller increments than when cutting back.
Send hop by hop choke packets - congested router gets immediate relief, at the expense of use of buffers at
preceding routers. -see fig 5.28 p 393
Load shedding - resort to disarding packets when congestion does not disapear in a reasonable time
RED= random early detection: eg in TCP - reduce transmission rates before congestion occurs (NB: TCP was
designed for wired networks where packet loss is mostly due to buffer overruns, rather than transmission errors)
Jitter control - Jitter= variation/standard deviation in the packet arrival times. Algorithms can be employed to speed
up delayed pkts, ie process delayed packets sooner than ones ahead of schedule to minimise jitter (if these pkts are
competing for transmission). Jitter can be controlled/eliminated by employing a buffer.
QOS:
A stream of packets from a source to a destination is called a flow. A flow is characterized by reliability, delay, jitter
and bandwidth.
Providing a guarantee for these parameters to match the application needs determine the QoS of the flow.
See fig 5-30 on p 397
What is the importance of these parameters?
App Reliability Delay Jitter Bandwidth
Email High Low Low Low
File Transfer
Web access high medium low medium
Remote login
Audio on
Demand
Video on low low high high
Demand
Telephony
Video low high high high
Conferencing
Internetworking
Define The Internet, internet, intranet
Two or more interconnected networks = internet
Networks differ in physical and datalink layers-the way packets are framed, etc.
internet work is necessary to send packets from one network type to another, of a different type, or the need to
transit a network of a different type.
Packet sizes are different. Addressing conventions. Networks may be connection oriented or connection-less, some
networks support multicasting, and other support re-ordered packets. Flow control, error control and congestion
control are implemented differently. Some networks support encryption, others do not.
See Fig 5.43 on p 420
Network layer -use router. If different protocols are employed on the different network, use a multiprotocol router.
Transport layer: employ transport layer gateway eg to support flow between TCP and SNA.
A special case of internet work when source and destination networks are similar, but the intermediate network is
different: employ tunneling.. A multiprotocol router strips off the framing, and frames it for the WAN interface. The
destination strips off the framing and creates an IP for the destination network. Essentially, the IP packet is
encapsulated in a WAN packet.
Note: to transit and ATM network (with small cell sizes), an IP packet name need to be segmented and re-assembled
at the exit router. This is transparent segmentation /fragmentation.
The IP Protocol
See IP packet format on page 434, fig 5.53
A packet header has among other things source and destination addresses. Maximum packet size (total length field)
is 65,535bytes
IP Addressing:
An IP address refers to a network interface => a host can have more than one IP address eg, a host with two cards
will have two addresses.
Classful addressing and classless addressing -see network videos - TCP/IP networking.
An IP address is written as four bytes, dot separated. (32 bits) (dotted decimal notation)
Class A, B, C, D, E
Class A starts with 0, and has 7bits for network number, 24 bits for network address
See fig 5.55
To implement subnetting, some bits are taken away from the host number to create a subnet number, eg instead of a
14-bit network number and 16-bit host number for a class B network, a 6-bit subnet can be created with a 10bit host
number. Ie 14-bit network number+6bit subnet +10bit host number. It is then possible to create 64 networks
(subnets) (ie 6bits) each with 1022 hosts (10bits, less all-0 and all-1 address).
A subnet mask is also needed to indicate split between (network number+subnet number) and host number. Simply
add the bits in the subnet to the network portion. Thus, for this example, the subnet mask will consist of 2+14+6 bits
ie 22bits, resulting in a doted decimal notation of 255.255.252.0. The alternative notation is to write /22 namely
255.255.252.0/22. A normal class B address can be written as /16.
That is to say, the first 22 bits are whre the changes will occur, rather than in the first 24-bits as in the case of a
typical class c address..
Routing is done by performing a logical AND between an address and the subnet mask. The result gives the
destination network number.
CIDR= classless interDomain routing. - this allocates IP addresses in variable sized block, rather than by classes.
Employing the classful method of addressing wastes blocks of IP addresses.
Drawbacks;
? Whole networks may be represented to the world as just one IP, rather than each host appearing uniquely.
Internet protocols:
ICMP: Internet Control Message Protocol- for control messages between routers etc.
ARP: Address resolution protocol; Network layer communications are IP based, but must be mapped to specific 48-
bit MAC addresses. Nodes broadcast a request for the MAC whose IP corresponds to the desired IP. That host
replies accordingly. Information received is cached for a short period for subsequent communications.-
Optimization: when a host boots, it requests for its own IP address. All nodes get to know