UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.

Slides:



Advertisements
Similar presentations
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Advertisements

1 IPv6. 2 Problem: 32-bit address space will be completely allocated by Solution: Design a new IP with a larger address space, called the IP version.
IP datagrams Service paradigm, IP datagrams, routing, encapsulation, fragmentation and reassembly.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Introduction to TCP/IP TCP / IP –including 2 protocols Protocol : = a set of rules that govern the communication between different devices Protocol : =
Lecture 5: TCP/IP OSI layers 3 (IP) and 4 (TCP/UDP) IPv4 – addresses and routing, “best-effort” service Ethernet, Appletalk, etc wrap IP packets with their.
IP Protocol - Introduction Dr. Farid Farahmand. Introduction TDM transport networks are not sufficient for data communications Low utilization TDM networks.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
Network Layer Packet Forwarding IS250 Spring 2010
1 6/14/ :27 CS575Internetworking & Routers1 Rivier College CS575: Advanced LANs Chapter 13: Internetworking & Routers.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 23 Introduction to Computer Networks.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
TCP/IP Lecture Extra. TCP/IP Developed by DARPA (Defense Advanced Research Projects) TCP is a connection-oriented transport protocol that sends data as.
Introduction to TCP/IP
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
Extending Networks. Three Levels of Extension Physical Layer –Repeaters Link Layer –Bridges –Switches Network –Routers: “Connecting networks”
1 Version 3.0 Module 9 TCP/IP Protocol and IP Addressing.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
EECC694 - Shaaban #1 lec #7 Spring The OSI Reference Model Network Layer.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Gursharan Singh Tatla Transport Layer 16-May
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Chapter 4: Managing LAN Traffic
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
10/8/2015CST Computer Networks1 IP Routing CST 415.
10/13/2015© 2008 Raymond P. Jefferis IIILect 07 1 Internet Protocol.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
TCOM 515 IP Routing. Syllabus Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
MOBILITY SUPPORT Abdullah Alghamdi. G ENERIC HANDOVER PERFORMANCE REQUIREMENTS Handover rates Fast reservations:  Minimize RTT during QoS establishment.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. TCP/IP Addressing and Data Delivery  The TCP/IP Protocol Suite  IP Addressing.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Computer Networks 0110-IP Gergely Windisch
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
Lecture 14 Mobile IP. Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
The Network Layer UNIT-4 snistforum.com. Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
IP: Addressing, ARP, Routing
Chapter 5 The Network Layer.
CS 457 – Lecture 10 Internetworking and IP
The Network Layer Network Layer Design Issues:
PRESENTATION COMPUTER NETWORKS
Routing Fundamentals and Subnets
Net 323 D: Networks Protocols
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
Computer network technology
Computer Networks Protocols
Review of Internet Protocols Network Layer
Presentation transcript:

UNIT-IV Computer Network Network Layer

Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer is layer 3. The network layer is responsible for packet forwarding including routing through intermediate routers, whereas the data link layer is responsible for media access control, flow control and error checking. Functions of the network layer include:  Connection model: connectionless communication  Host addressing  Message forwarding

Routing Prepared by - ROHIT KOSHTA Routing is the process of forwarding of a packet in a network so that it reaches its intended destination. The main goals of routing are:  Correctness  Simplicity  Robustness  Stability  Fairness  Optimality

Routing algorithms Prepared by - ROHIT KOSHTA Dijkstra's algorithm Bellman-ford algorithm Broadcast Routing Multicast Routing, Hierarchical routing

Dijkstra's algorithm Prepared by - ROHIT KOSHTA Dijkstra's algorithm is an algorithm for finding the shortest paths between nodes in a graph, which may represent, for example, road networks. For a given source node in the graph, the algorithm finds the shortest path between that node and every other. The shortest path algorithm is widely used in network routing protocols

Bellman-ford algorithm Prepared by - ROHIT KOSHTA The Bellman–Ford algorithm is an algorithm that computes shortest paths from a single source vertex to all of the other vertices in a weighted digraph. The algorithm is usually named after two of its developers, Richard Bellman and Lester Ford, Jr., who published it in 1958 and 1956, respectively. Bellman-Ford algorithm is a procedure used to find all shortest path in a graph from one source to all other nodes. The algorithm requires that the graph does not contain any cycles of negative length, but if it does, the algorithm is able to detect it.

Congestion Control Prepared by - ROHIT KOSHTA Bellman-ford algorithm

Broadcast Routing Prepared by - ROHIT KOSHTA By default, the broadcast packets are not routed and forwarded by the routers on any network. Routers create broadcast domains. But it can be configured to forward broadcasts in some special cases. A broadcast message is destined to all network devices. Broadcast routing can be done in two ways (algorithm):  A router creates a data packet and then sends it to each host one by one. In this case, the router creates multiple copies of single data packet with different destination addresses. All packets are sent as unicast but because they are sent to all, it simulates as if router is broadcasting. This method consumes lots of bandwidth and router must destination address of each node.  Secondly, when router receives a packet that is to be broadcasted, it simply floods those packets out of all interfaces. All routers are configured in the same way.

Broadcast Routing (contd) Prepared by - ROHIT KOSHTA This method is easy on router's CPU but may cause the problem of duplicate packets received from peer routers. Reverse path forwarding is a technique, in which router knows in advance about its predecessor from where it should receive broadcast. This technique is used to detect and discard duplicates.

Broadcast Routing (contd) Prepared by - ROHIT KOSHTA

Multicast Routing Prepared by - ROHIT KOSHTA Multicast routing is special case of broadcast routing with significance difference and challenges. In broadcast routing, packets are sent to all nodes even if they do not want it. But in Multicast routing, the data is sent to only nodes which wants to receive the packets. The router must know that there are nodes, which wish to receive multicast packets (or stream) then only it should forward. Multicast routing works spanning tree protocol to avoid looping. Multicast routing also uses reverse path Forwarding technique, to detect and discard duplicates and loops.

Multicast Routing (contd) Prepared by - ROHIT KOSHTA

Congestion Prepared by - ROHIT KOSHTA When too many packets are present in a part of a subnet, the performance degrades. This situation is called as congestion. Congestion in a network may occur when the load on the network i.e. the number of packets sent to the network is greater than the capacity of the network (i.e. the number of packets a network can handle). As the traffic increases further, the performance degrades more and more packets are lost and congestion worsens.

Causes of congestion Prepared by - ROHIT KOSHTA Too many inputs on the same channel Slow links / less bandwidth Slow processors

Principles of Congestion Control Prepared by - ROHIT KOSHTA The solutions to congestion problems can be divided into two categories or groups:  Open loop solutions  Closed loop solutions Open loop congestion control is based on the prevention of congestion Closed loop solutions are for removing the congestion.

Prevention Policies Prepared by - ROHIT KOSHTA Policies  Data link layer policies  Retransmission  Acknowledgement  Flow control  Out of order caching  Network layer policies  Virtual circuit  Packet queuing  Packet discard  Routing Algorithm  Packet lifetime management  Transport layer policies  Retransmission  Out of order caching  Acknowledgement  Flow control  Time out determination

Virtual Circuit Prepared by - ROHIT KOSHTA The virtual circuit is one which gets established when the data is to be transferred. It routes the data to the nearest destination network. The gateway notes down the existence of this virtual circuit in its table and builds another virtual circuit to a router which is in the next subnet. This process continues untill the destination host has been reached.

Datagram Prepared by - ROHIT KOSHTA Packets in IP layer are called datagrams. A datagram in a variable length packet with two parts namely the header and data. The header is 20 to 60 bytes in length. It contains the information essential for routing and delivery. The other part of the datagram is the data field which is of variable length.

IP Protocol Prepared by - ROHIT KOSHTA IP is a connectionless datagram protocol with no guarantee of reliability. It is an unreliable protocol because it does not provide any error control or flow control. It can only detect error and discards the packet if it is corrupted. It can be made more reliable on integrating with another protocol named TCP.

IP Addresses Prepared by - ROHIT KOSHTA IP addresses are 32 bit long and they are used in the source address and destination address fields of the IP header. The IP addresses for the hosts are assigned by the network administrator. IP address consists of two parts:  Network ID  Host ID

Comparative study of IPv4 & IPv6 Prepared by - ROHIT KOSHTA IPv4IPv possible addresses possible addresses 2. IPv4 is written by dotted decimal notation e.g IPv6 is hexadecimal and consists of 8 groups, containing 4 hexadecimal digits e.g. AC77:7834:2222:FACB 3. Basic header length is 20 bytes3. Basic header length is 40 bytes 4. Source and destination addresses are 32 bits in length. 4. Source and destination addresses are 128 bits in length. 5. IPsec support is optional.5. IPsec support is required. 6. Address Resolution Protocol is used. 6. Neighbour Solicitation Messages are used. 7. Must be configured either manually or through DHCP. 7. Does not require manual configuraion or DHCP.

Mobile IP Prepared by - ROHIT KOSHTA Mobile IP is the underlying technology for support of various mobile data applications and the networking applications. Mobile IP (or MIP ) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. The Mobile IP protocol allows for location-independent routing of IP datagrams on the Internet. Each mobile node is identified by its home address disregarding its current location in the Internet. While away from its home network, a mobile node is associated with a care-of address which identifies its current location and its home address is associated with the local endpoint of a tunnel to its home agent.care-of address