COMPUTER NETWORK DESIGN Network layer protocols

Similar documents
Detection of Denial of Service attacks using AGURI

Resistors, Current and Voltage measurements, Ohm s law, Kirchhoff s first and second law. Kirchhoff s first Objectives:

Proposed Cable Tables for SAS2

McAfee Network Security Platform

SLOVAK UNIVERSITY OF TECHNOLOGY Faculty of Material Science and Technology in Trnava. ELECTRICAL ENGINEERING AND ELECTRONICS Laboratory exercises

McAfee Network Security Platform

Macroscopic and Microscopic Springs Procedure

The PWM switch model introduced by Vatché Vorpérian in 1986 describes a way to model a voltage-mode switching converter with the VM-PWM switch model.

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

Abdominal Wound Closure Forceps

Section 6.1 Law of Sines. Notes. Oblique Triangles - triangles that have no right angles. A c. A is acute. A is obtuse

ITEC2620 Introduction to Data Structures

Math Circles Finite Automata Question Sheet 3 (Solutions)

VOLTAGE SAG IMPROVEMENT BY PARTICLE SWARM OPTIMIZATION OF FUZZY LOGIC RULE BASE

ECE 274 Digital Logic Spring Digital Design. Combinational Logic Design Process and Common Combinational Components Digital Design

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Installation manual. Daikin Altherma LAN adapter BRP069A61 BRP069A62. Installation manual Daikin Altherma LAN adapter. English

Evaluating territories of Go positions with capturing races

Analog Input Modules

Computers and Mathematics with Applications. An evaluation study of clustering algorithms in the scope of user communities assessment

AGA56... Analog Input Modules. Siemens Building Technologies HVAC Products

Patterns and Algebra

ALONG with the maturity of mobile cloud computing,

3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 9, SEPTEMBER Optimal Algorithms for Near-Hitless Network Restoration via Diversity Coding

ISM-PRO SOFTWARE DIGITAL MICROSCOPE OPERATION MANUAL

Advanced(Computer( Networks

(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world

Question Paper Wednesday 13 Thursday 14 January 2010

So Many Possibilities page 1 of 2

Probability and Statistics P(A) Mathletics Instant Workbooks. Copyright

McAfee Network Security Platform

MEASURE THE CHARACTERISTIC CURVES RELEVANT TO AN NPN TRANSISTOR

RWM4400UH High Performance Hand Held Wireless Microphone System

Multi-beam antennas in a broadband wireless access system

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Solutions to exercise 1 in ETS052 Computer Communication

GLONASS PhaseRange biases in RTK processing

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*

Published in: Wireless Communications and Networking Conference, IEEE WCNC 2009

Changing the routing protocol without transient loops

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks

Computational Complexity of a Pop-up Book

Geometric quantities for polar curves

Positron Emission Tomography (PET) Images

(CATALYST GROUP) B"sic Electric"l Engineering

Lecture 16. Double integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Optimal Time Slot Assignment for Mobile Ad Hoc Networks

A Low Power Parallel Sequential Decoder for Convolutional Codes

Mixed CMOS PTL Adders

Network Layer (Routing)

Algorithms for Memory Hierarchies Lecture 14

MOS Transistors. Silicon Lattice

A Novel Virtual Anchor Node-based Localization Algorithm for Wireless Sensor Networks

Regular languages can be expressed as regular expressions.

CHAPTER 3 BER EVALUATION OF IEEE COMPLIANT WSN

Topic 20: Huffman Coding

Aluminium Roof Outlets - Introduction to Detail Outlets

Interaction Analysis in Islanded Power Systems with HVDC Interconnections

MODEL 351 POWERGLIDE SERIES INSTRUCTIONS FOR INSTALLING SARGENT DOOR CLOSERS WITH "H" HOLDER ARMS

A Highly Interactive Pedigree Viewer

PORCH. Canopies and Accessories DECKING SYSTEMS. For more information. STOCKISTS For details of your nearest stockist for any product:

ASY P.O. BOX 729 TERRELL, TEXAS / PAGE 1 OF 13 SAM

PORCH. Canopies and Accessories. For more information. STOCKISTS For details of your nearest stockist for any product:

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

FOMA M702iG Manual for Data Communication

POWER TRIM. Table of Contents. Section 5C - Dual Power Trim System

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

ECE 274 Digital Logic Fall Digital Design. RTL Design RTL Design Method: Preview Example. RTL Design RTL Design Method

arxiv: v2 [cs.sy] 16 Nov 2012

Adaptive Droop Control Shunt Active Filter and Series AC Capacitor Filter for Power Quality Improvement in Power System

Understanding Three-Phase Transformers

A '-4" 10'-10" 16'-6" 7'-0" 23'-0" 10 3/4" 9'-6" 5 1/4" 2'-11 1/2" 2'-6" 3'-2 3/4" 3'-1" 4'-8 3/4" 2'-5 3/4" 2'-6" 7'-2" R.O. HD 7'-3" R.O.

QUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE

A Development of Embedded System for Speed Control of Hydraulic Motor

MinCounter: An Efficient Cuckoo Hashing Scheme for Cloud Storage Systems

Notes on Spherical Triangles

Notre Dame Tasks. Activity since last Telecon (Feb 7, 2011)

SERVICE MANUAL 9940/20/10

EQ: What are the similarities and differences between matrices and real numbers?

Computer Networks II

Student Book SERIES. Patterns and Algebra. Name

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ECE 274 Digital Logic Fall 2009 Digital Design

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

Improved sensorless control of a permanent magnet machine using fundamental pulse width modulation excitation

Advanced(Computer( Networks

DIN C-FORM & R-FORM PLUG, DIN SERIES VERTICAL, RIGHT ANGLE, SOLDER TAIL OR PRESS-FIT TERMINATION,.100" BACKPLANE REAR PLUG 3M TM


Hierarchical Extreme-Voltage Stress Test of Analog CMOS ICs for Gate-Oxide Reliability Enhancement*

Multivariable integration. Multivariable integration. Iterated integration

Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links

Digital Design. Sequential Logic Design -- Controllers. Copyright 2007 Frank Vahid

A Novel SVPWM Technology Used in PWM Rectifiers of WPGS

Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks

Elettra Evolution OK! OK! b. User manual

Transcription:

OMPUTER NETWORK ESIGN Network lyer protools Network lyer (lyer 3) Gruppo Reti TL nome.ognome@polito.it http://www.telemti.polito.it/ OMPUTER NETWORK ESIGN Review of network lyer protools - opyright This work is liensed under the retive ommons Noerivs-Nonommeril Liense. To view opy of this liense, visit: http://retiveommons.org/lienses/ndn/./ or send letter to retive ommons, 559 Nthn ott Wy, Stnford, liforni 9435, US. knowledgements Some pitures/slides tken from Kurose Ross omputer Networking OMPUTER NETWORK ESIGN Review of network lyer protools - Network lyer funtions Routing Exeuted looking t routing tles For every PU in pket swithing with dtgrm servie (IP) For every virtul iruit opening request (signlling) Routing tle ontin For every destintion the next-hop router Three elements Routing protools Routing lgorithms Forwrding rules ddressing Uniqueness ddress trnsltion ongestion ontrol (disussed lter) OMPUTER NETWORK ESIGN Review of network lyer protools - 3 Network lyer In the Internet Pket swithing with dtgrm servie IP protool (RF 79) defines Pket formt ddresses Forwrding proedures IP provide est effort servie onnetionless Stteless pproh Unrelile No QoS gurntees lthough some priority its in the pket heder re defined OMPUTER NETWORK ESIGN Review of network lyer protools - 4 IP pket heder 4 8 6 9 4 3 Version HLEN Servie Type Totl Length Identifition Flgs Frgment Offset Time To Live Protool Heder heksum Soure IP ddress estintion IP ddress Options P Frgmenttion MTU (Mximum Trnsfer Unit): mximum dtgrms zie (inluding heder) on link epends on lyer protool If the MTU on link does not permit the pket trnsmission Frgmenttion needed Frgments eome independent dtgrms, with similr heder to the originl dtgrm Frgmenttion fields, length, heder heksum re modified Stndrd size: yte OMPUTER NETWORK ESIGN Review of network lyer protools - 5 OMPUTER NETWORK ESIGN Review of network lyer protools - 6 Pg.

OMPUTER NETWORK ESIGN Network lyer protools Frgmenttion The re-ssemly of the originl dtgrm from the frgments is done only t the reeiving host (never in routers) Frgmenttion must e trnsprent to lyer 4 Frgmenttion is hrmful More overhed One frgment lost implies the whole pket dropped Higher loss proility Timer needed t the reeiver for re-ssemly purposes OMPUTER NETWORK ESIGN Review of network lyer protools - 7 IP ddressing: introdution IP ddress: 3-it identifier for host, router interfe Interfe onnetion etween host/router nd physil link router s typilly hve multiple interfes host typilly hs one interfe IP ddresses ssoited with eh interfe 3... 3... 3... 3...4 3...9 3...3 3..3. 3..3.7 3... 3..3. 3... = 3 4-8 OMPUTER NETWORK ESIGN Review of network lyer protools - 8 Sunets Sunets IP ddress: sunet prt (high order its) host prt (low order its) Wht s sunet? devie interfes with sme sunet prt of IP ddress n physilly reh eh other without intervening router 3... 3... 3... 3...4 3...9 3... 3...3 3..3.7 sunet 3..3. 3..3. network onsisting of 3 sunets 3... 3... 3...4 3...3 3..9. 3..7. 3..9. 3..7. 3..8. 3..8. 3...6 3..3.7 3... 3... 3..3. 3..3. OMPUTER NETWORK ESIGN Review of network lyer protools - 9 OMPUTER NETWORK ESIGN Review of network lyer protools - IP ddressing: IR IR: lssless Interomin Routing sunet portion of ddress of ritrry length ddress formt:...d/x, where x is # its in sunet portion of ddress sunet prt.3.6./3 host prt IP ddresses ssignments host gets n IP ddress By onfigurtion Stti ssignment Vi server through the HP: ynmi Host onfigurtion Protool Stti or dynmi ssignment Potentil to re-use ddresses network gets the sunet prt By n lloted portion of its provider ISP s ddress spe ISP's lok.3.6./ Orgniztion.3.6./3 Orgniztion.3.8./3 Orgniztion.3../3....... Orgniztion 7.3.3./3 OMPUTER NETWORK ESIGN Review of network lyer protools - OMPUTER NETWORK ESIGN Review of network lyer protools - Pg.

OMPUTER NETWORK ESIGN Network lyer protools Hierrhil ddressing for route ggregtion Hierrhil ddressing llows effiient dvertisement of routing informtion Redue routing tle size Orgniztion.3.6./3 Orgniztion.3.8./3 Orgniztion.3../3 Orgniztion 7..3.3./3. Fly-By-Night-ISP ISPs-R-Us Send me nything with ddresses eginning.3.6./ Send me nything with ddresses eginning 99.3../6 Internet Hierrhil ddressing: more speifi routes ISPs-R-Us hs more speifi route to Orgniztion Orgniztion.3.6./3 Orgniztion.3../3 Orgniztion 7..3.3./3 Orgniztion.3.8./3. Fly-By-Night-ISP ISPs-R-Us Send me nything with ddresses eginning.3.6./ Send me nything with ddresses eginning 99.3../6 or.3.8./3 Internet OMPUTER NETWORK ESIGN Review of network lyer protools - 3 OMPUTER NETWORK ESIGN Review of network lyer protools - 4 Routing protools nd lgorithms Gruppo Reti TL nome.ognome@polito.it http://www.telemti.polito.it/ Routing Routing protool How info on network sttus re exhnged mong routers to uild routing tles Routing lgorithm Rules to follow to define the est pths(s) towrd speifi destintion retes routing tles Forwrding proedure tions needed to move pkets from input to the proper output port Exploits routing tle OMPUTER NETWORK ESIGN Review of network lyer protools - 5 OMPUTER NETWORK ESIGN Review of network lyer protools - 6 Routing lgorithms Gol: efine good pth (sequene of link/nodes) from the soure to the destintion Every node () represents ll the soure/destintion onneted to it On the grph representing the network topology ost re ssoited to edges 5 Good pth 3 B 5 Minimum ost pth 3 E F ost Unitry ost, distne, dely, ongestion level, lod Stti or dynmi (network stte dependent) Influenes updte poliies Risk of osilltions Exmple: ost relted to link lod +e B e e Initil sitution +e +e B +e B +e pth reomputtion reomputtion +e +e B reomputtion OMPUTER NETWORK ESIGN Review of network lyer protools - 7 OMPUTER NETWORK ESIGN Review of network lyer protools - 8 Pg. 3

OMPUTER NETWORK ESIGN Network lyer protools Routing lgorithms: exmples No oordintion mong nodes needed Rndom Rndomly selet one output port Flooding Mke opy nd forwrd to ll output ports efletion or hot potto Normlly used on regulr topologies Mny good pths towrd the destintion If proper output port ville, rooute. Otherwise hoose nother port None requires uffering (uffering on the link) Esy ut performne degrdtion istriuted routing protools Tody more used thn entrlized lthough entrlized routing is gining inresing interest (SN pprohes) Two fmilies, relying on : Glol info: Known topology to eh node through info exhnge mong ll nodes Run grph trversl lgorithm to define routing tle Link stte lgorithms Prtil info: Eh node is wre of its neighours nd of its link ost Rehility info exhnged mong djent nodes istne vetor lgorithm OMPUTER NETWORK ESIGN Review of network lyer protools - 9 OMPUTER NETWORK ESIGN Review of network lyer protools - Need for hierrhil routing Idel se ll routers identil Flt, non hierrhil network Unprtil Slility: with million destintions ll in one routing tle? Info exhnge to uild routing tles would require huge mount of ndwidth dministrtive utonomy Internet is network of networks (mnged independently) Eh network dministrtor is willing to devise its own routing poliies OMPUTER NETWORK ESIGN Review of network lyer protools - Hierrhil routing Router ggregted in res, nmed utonomous System (S) Set of routers, possily of omplex struture (mny sunets nd routers) under the sme dministrtive ontrol Protools run in S re nmed IGP: Interior Gtewy Protool Router in the sme S use the sme IGP routing protool Router in different S my use different IGP protools OMPUTER NETWORK ESIGN Review of network lyer protools - Hierrhil routing In every S gtewy routers re identified Responsile to route towrds destintions externl to the S Protools run mong S re nmed IGP protools Run IGP protools with other routers in the sme S Run inter-s (EGP: Exterior Gtewy Protool) with other gtewy router ddress ggregtion eomes key issue Routing tles reted y oth EGP nd IGP protools Routing Intr-S nd Inter-S. d. inter-s, intr-s routing in gtewy.. B. B Gtewys: Run inter-s protools mong tem Run intr-s protools with other routers within the sme S network lyer link lyer physil lyer OMPUTER NETWORK ESIGN Review of network lyer protools - 3 OMPUTER NETWORK ESIGN Review of network lyer protools - 4 Pg. 4

OMPUTER NETWORK ESIGN Network lyer protools Routing Intr-S nd Inter-S Host h.. d Intr-S routing Within S Inter-S routing Between S e B B.. B Intr-S routing In S B Host h Routing protools Internl Link ost often set equl to to route on the sis of hop ount RIP (distne vetor) RF 73 OSPF (link stte) RF 583 IS-IS (link stte) RF 4 Externl Poliy sed routing EGP (Exterior Gtewy Protool) RF 94 BGP (Border Gtewy Protool) RF 67 OMPUTER NETWORK ESIGN Review of network lyer protools - 5 OMPUTER NETWORK ESIGN Review of network lyer protools - 6 Pg. 5