4: Network Layer4a-1 Miscellaneous Last Modified: 6/28/2015 7:54:21 PM.

Slides:



Advertisements
Similar presentations
Chapter 4 Distributed Bellman-Ford Routing
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Network Layer Packet Forwarding IS250 Spring 2010
Distance-Vector and Path-Vector Routing Sections , 4.3.2, COS 461: Computer Networks Spring 2011 Mike Freedman
Routing - I Important concepts: link state based routing, distance vector based routing.
Network Layer-11 CSE401N: Computer Networks Lecture-9 Network Layer & Routing.
CIS 235: Networks Fall, 2007 Western State College Computer Networks Fall, 2007 Prof Peterson.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Chapter 4 Distance Vector Problems, and Link-State Routing Professor Rick Han University of Colorado at Boulder
Distance-Vector Routing COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in COS 105) Michael Freedman
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer The service should be independent of the router.
Katz, Stoica F04 EECS 122: Introduction to Computer Networks Link State and Distance Vector Routing Computer Science Division Department of Electrical.
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
Announcement r Project 2 extended to 2/20 midnight r Project 3 available this weekend r Homework 3 available today, will put it online.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
4: Network Layer4a-1 14: Intro to Routing Algorithms Last Modified: 7/12/ :17:44 AM.
Announcement r Project 2 Extension ? m Previous grade allocation: Projects 40% –Web client/server7% –TCP stack21% –IP routing12% Midterm 20% Final 20%
EE 122: Intra-domain routing Ion Stoica September 30, 2002 (* this presentation is based on the on-line slides of J. Kurose & K. Rose)
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
4: Network Layer 4a-1 14: Intro to Routing Algorithms Last Modified: 8/8/ :41:16 PM.
Computer Networking Intra-Domain Routing, Part I RIP (Routing Information Protocol)
CS 4700 / CS 5700 Network Fundamentals Lecture 9: Intra Domain Routing Revised 7/30/13.
1 Overview Midterm Solution Lab 5 Questions Lab Trouble Shooting Techniques.
Distance Vector Routing Protocols W.lilakiatsakun.
Review: routing algorithms. –Choose the appropriate paths. –Routing algorithms Flooding Shortest path routing (example). –Dijkstra algorithm. –Bellman-Ford.
1 Chapter 22 Network layer Delivery, Forwarding and Routing (part2)
Link-state routing  each node knows network topology and cost of each link  quasi-centralized: each router periodically broadcasts costs of attached.
1 Network Layer Lecture 14 Imran Ahmed University of Management & Technology.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Network Layer4-1 Distance Vector Algorithm Bellman-Ford Equation (dynamic programming) Define d x (y) := cost of least-cost path from x to y Then d x (y)
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
4: Network Layer4a-1 13: Intro to IP and ICMP Last Modified: 11/9/2015 7:16:06 PM.
Network Layer4-1 Distance Vector: link cost changes Link cost changes: r node detects local link cost change r updates distance table (line 15) r if cost.
Distance Vector Local Signpost Direction Distance Routing Table For each destination list: Next Node Distance Table Synthesis Neighbors exchange table.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Routing 1 Network Layer Network Layer goals:  understand principles behind network layer services:  routing (path selection)  how a router works  instantiation.
Internet Routing r Routing algorithms m Link state m Distance Vector m Hierarchical routing r Routing protocols m RIP m OSPF m BGP.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 3 Rutgers University Internet Institute Instructor: Chris Uriarte.
4: Network Layer4a-1 Distance Vector Routing Algorithm iterative: r continues until no nodes exchange info. r self-terminating: no “signal” to stop asynchronous:
Network Layer (2). Review Physical layer: move bits between physically connected stations Data link layer: move frames between physically connected stations.
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Chapter Goals m Understand network layer principles and Internet implementation r Started routing.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
IP tutorial - #2 Routing KAIST Dept. of CS NC Lab.
Network Layer.
CS 5565 Network Architecture and Protocols
CSE390 – Advanced Computer Networks
Routing Information Protocol (RIP)
Distance-Vector Routing Protocols
Routing: Distance Vector Algorithm
Distance Vector Routing: overview
14: Intro to Routing Algorithms
Road Map I. Introduction II. IP Protocols III. Transport Layer
Lecture 10 Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CS3516: These slides are generated from.
EEC-484/584 Computer Networks
CS 3700 Networks and Distributed Systems
RFC 1058 & RFC 2453 Routing Information Protocol
ECE453 – Introduction to Computer Networks
CS 3700 Networks and Distributed Systems
Net 323 D: Networks Protocols
CS 455/555 Intro to Networks and Communications
Communication Networks
COS 461: Computer Networks
Network Layer (contd.) Routing
EE 122: Intra-domain routing: Distance Vector
Network Layer.
EE 122: Intra-domain routing: Link State
Presentation transcript:

4: Network Layer4a-1 Miscellaneous Last Modified: 6/28/2015 7:54:21 PM

4: Network Layer4a-2 Grades r Resubmit graded HW2 so that we can note who graded each assignment m Will compute means for each grader and adjust accordingly m If you are not satisfied with that can submit written request for regrade r Midterm – one person graded all instances of a given question so should be fair m If you have a question, may submit written request for regrade

4: Network Layer4a-3 Programming Assignment 2 Resources r Standard Assignment m Linux home directories (coming today) m All: keiko, splash, stella, namu, nova (.csuglab.cornell.edu) m Meng Additional: cfs01 - cfs20 (.cs.cornell.edu) m 20 GB for everyone (~40 MB per team; if run out of disk space let Dora Abdullah know) r Optional Assignment m 7 machines in 330 Upson Linux Installation (marked with red dots) m 7 machines in 315 Upson Linux Installation (marked with red dots) m Get more information (including passwords) from Ranveer m You must officially sign up!! ASAP please

4: Network Layer4a-4 Note on homeworks r Details in homework; High level information in class – why? m Any particular gory detail is not essential; a feel for reality is m Homeworks are the place for gory details in this class (too many details to cover in lectures) m Confront “inconsistencies” of reality when have all references available to you m Test what you are learning against the real world r Would people like to see us cover homework solutions in class?

4: Network Layer4a-5 Clarifications r Path MTU Discovery r Count to Infinity

4: Network Layer4a-6 Path MTU Discovery:TCP r If doing Path MTU Discovery, start with minimum of receiver’s specified MSS or local MTU and set the Don’t Fragment Bit r If ICMP message received indicating that fragmentation was required, then segment size will be reduced r Periodically (every 10 min or so), TCP will try a higher segment size up to the receiver’s MSS to see if new route is being used that would allow larger segments r Not all implementations support this

4: Network Layer4a-7 Path MTU Discovery: UDP r Not like TCP where sender sends stream in chunks as they see fit and receiver reads in chunks as they see fit r With UDP, the size of the UDP packet is much more visible to the application r May send with DF bit off r May send with DF bit on and if get ICMP messages then IP on host may fragment before sent but not exposed to application layer to encourage smaller amounts of data sent r Again not all implementations support

4: Network Layer4a-8 Path MTU Discovery r Look in Ethereal at TCP segments, will see Do Not Fragment Bit is set m If on Ethernet, don’t usually see adjustment m Ethernet has one of the smaller MTUs so never get an ICMP error saying needs to be smaller m If sent from local network with larger MTU might see this activity

4: Network Layer4a-9 Distance Vector: link cost changes Link cost changes: r node detects local link cost change r updates distance table (line 15) r if cost change in least cost path, notify neighbors (lines 23,24) X Z Y 1 algorithm terminates “good news travels fast”

4: Network Layer4a-10 Distance Vector: link cost changes Link cost changes: r good news travels fast r bad news travels slow - “count to infinity” problem! X Z Y 60 algorithm continues on!

4: Network Layer4a-11 Distance Vector: poisoned reverse If Z routes through Y to get to X : r Z tells Y its (Z’s) distance to X is infinite (so Y won’t route to X via Z) r will this completely solve count to infinity problem? X Z Y 60 algorithm terminates

4: Network Layer4a-12 Bigger Loops and Poison Reverse A E D CB D (A,D) E c(E,D) + min {D (A,w)} D w = = 2+3 = 5 D (A,B) E c(E,B) + min {D (A,w)} B w = = 8+6 = 14 Loop back through E! Poison reverse will fix this Loop back through E! Poison reverse will not fix this E will try to send through B B’s route is through C so no poison reverse A E D CB

4: Network Layer4a-13 Count to Infinity Example with Bigger Loop B will learn bad news C will have told B infinity because its route is through B, so B won’t reroute through C E however will have told B about a good route through D (cost 6) B will choose that route instead and advertise it as the new best to C (cost 6+8 = 14); it will be worse than the old one it advertised to C (old cost = 1) C will propagate this updated “best” route to D (cost 15) D will propagate this new “best” route to E (cost 17) E will update the “best” route to B (cost 19) Last time it advertised cost 6 to B It will loop around adding 13 each time (cost of loop) Will continue until cost E advertises to B is bigger than 500 A E D CB A E D CB