1 CSE524: Lecture 11 Network Layer Functions. 2 Exam.

Slides:



Advertisements
Similar presentations
Routing - I Important concepts: link state based routing, distance vector based routing.
Advertisements

Network Layer-11 CSE401N: Computer Networks Lecture-9 Network Layer & Routing.
1 Computer Networks Network Layer (Part 1). 2 Last classes Data-link layer –Functions –Specific implementations, devices.
The Network Layer. 2 Announcements Project 4 is due next Monday, April 9th Homework 5 available later today, due next Wednesday, April 11th Prelim II.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
Introduction to Networking Bin Lin TA March 3 rd, 2005 Recital 6.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m routing (path selection) m dealing with.
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer The service should be independent of the router.
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
1 Announcements Review session next Friday 03/11 Homework 5 due on Friday 03/04 Project 3 due Wednesday 03/16.
Announcement r Project 2 extended to 2/20 midnight r Project 3 available this weekend r Homework 3 available today, will put it online.
Lecture 7 Overview. Two Key Network-Layer Functions forwarding: move packets from router’s input to appropriate router output routing: determine route.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.5 Routing algorithms m Link state m Distance.
Announcement r Project 2 due next week! r Homework 3 available soon, will put it online r Recitation tomorrow on Minet and project 2.
EE 122: Intra-domain routing Ion Stoica September 30, 2002 (* this presentation is based on the on-line slides of J. Kurose & K. Rose)
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 Announcement #1 r Did you all receive homework #1 and #2? r Homework #3 will be available online during the day r Midterm.
Routing Algorithm March 3 rd, Routing Graph abstraction for routing algorithms: graph nodes are routers graph edges are physical links  link cost:
Network Layer Goals: understand principles behind network layer services: –routing (path selection) –dealing with scale –how a router works –advanced topics:
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
4: Network Layer4a-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m routing (path selection) m dealing.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
IP routing. Simple Routing Table svr 4% netstat –r n Routing tables DestinationGatewayFlagsRefcntUseInterface UGH00emd UH10lo0.
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
4: Network Layer4-1 Schedule Today: r Finish Ch3 r Collect 1 st Project r See projects run r Start Ch4 Soon: r HW5 due Monday r Last chance for Qs r First.
The Network Layer & Routing
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
Overview of Internet Routing (I) Fall 2004 CS644 Advanced Topics in Networking Sue B. Moon Division of Computer Science Dept. of EECS KAIST.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 20 Omar Meqdadi Department of Computer Science and Software Engineering University.
Internet Routing r Routing algorithms m Link state m Distance Vector m Hierarchical routing r Routing protocols m RIP m OSPF m BGP.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Chapter4_3.
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Chapter Goals m Understand network layer principles and Internet implementation r Started routing.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Project 2 r DUE Wed: 02/24 Network Layer4-1. Project 2 r DUE Wed: 02/24 r DUE Mon: 02/29 Network Layer4-2.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
4: Network Layer4a-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m routing (path selection) m dealing.
IP tutorial - #2 Routing KAIST Dept. of CS NC Lab.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
The Network Layer.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CPSC 335 Data Communication.
Network Layer Goals: Overview:
EEC-484/584 Computer Networks
Network Layer Introduction Datagram networks IP: Internet Protocol
Network layer functions
Chapter 4 – The Network Layer & Routing
Road Map I. Introduction II. IP Protocols III. Transport Layer
EEC-484/584 Computer Networks
ECE453 – Introduction to Computer Networks
Network Layer I have learned from life no matter how far you go
EEC-484/584 Computer Networks
Chapter 4: Network Layer
Network Layer (contd.) Routing
Chapter 4: Network Layer
EE 122: Intra-domain routing: Link State
Presentation transcript:

1 CSE524: Lecture 11 Network Layer Functions

2 Exam

3 Where we’re at… Internet architecture and history Internet protocols in practice Application layer Transport layer Network layer –Network-layer functions –Specific network layer protocols (IP) and devices Data-link layer Physical layer

4 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router Important functions: –Addressing: address assignment –Delivery semantics: unicast, multicast, anycast, broadcast, ordering –Security: provide privacy, authentication, etc. at the network layer –Fragmentation: break-up packets based on data-link layer properties –Quality-of-service: provide predictable performance –Routing: path selection and packet forwarding network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical application transport network data link physical application transport network data link physical

5 NL: Demux to upper layer Sends payload to the next layer in protocol stack –Usually transport layer –Can be other layers (recall tunneling discussion)

6 NL: Error detection Protection of data and/or header at the network layer –Provide extra protection on top of data-link layer and below transport layer –End-to-end principle Is this necessary? IPv6 answer =>No

7 NL: Delivery semantics Communication modes –Unicast (One source to one destination) –Anycast (One source to any of a set of destinations) –Multicast (One or more sources to a set of destinations) –Broadcast (One source to all destinations) Ordering –In-order vs. out-of-order delivery –Recall ATM service models If time permits, we will look at multicast at the end of the course.

8 NL: Security Secrecy –No eavesdropping Integrity –No man-in-the-middle attacks Authenticity –Ensure identity of source If time permits, we will look at network security at the end of course…..

9 NL: Fragmentation Different link-layers have different MTUs –Split packets into multiple fragments –Where to do reassembly? End nodes – avoids unnecessary work Dangerous to do at intermediate nodes –Buffer space –Must assume single path through network –May be re-fragmented later on in the route again

10 NL: Fragmentation is Harmful Uses resources poorly –Forwarding costs per packet –Best if we can send large chunks of data –Worst case: packet just bigger than MTU Poor end-to-end performance –Loss of a fragment Reassembly is hard –Buffering constraints

11 NL: Fragmentation References –Characteristics of Fragmented IP Traffic on Internet Links. Colleen Shannon, David Moore, and k claffy -- CAIDA, UC San Diego. ACM SIGCOMM Internet Measurement Workshop program.htmlCharacteristics of Fragmented IP Traffic on Internet Linkshttp:// program.html –C. A. Kent and J. C. Mogul, "Fragmentation considered harmful," in Proceedings of the ACM Workshop on Frontiers in Computer Communications Technology, pp , Aug

12 NL: Fragmentation Remove fragmentation from the network (IPv6) Path MTU Discovery –Network layer does no fragmentation –Host does Path MTU discovery –ICMP message for oversized packets

13 NL: Quality-of-Service Q: What service model for “channel” transporting packets from sender to receiver? guaranteed bandwidth? preservation of inter-packet timing (no jitter)? loss-free delivery? in-order delivery? congestion feedback to sender? ? ? ? virtual circuit or datagram? The most important abstraction provided by network layer: service abstraction

14 NL: Connection-oriented virtual circuits Phone circuit abstraction (recall ATM discussion) –Model call setup and signaling for each call before data can flow guaranteed performance during call call teardown and signaling to remove call –Network support each packet carries circuit identifier (not destination host ID) every router on source-dest path maintains “state” for each passing circuit link, router resources (bandwidth, buffers) allocated to VC to guarantee circuit-like performance application transport network data link physical application transport network data link physical 1. Initiate call 2. incoming call 3. Accept call 4. Call connected 5. Data flow begins 6. Receive data

15 NL: Connectionless datagram service Postal service abstraction (Internet) –Model no call setup or teardown at network layer no service guarantees –Network support packets carry only destination host ID no state within network on end-to-end connections packets between same source-dest pair may take different paths application transport network data link physical application transport network data link physical 1. Send data 2. Receive data

16 NL: Best of both worlds? Adding circuits to the Internet –Intserv, Diffserv (at the end of course if time permits) –Chapter 6 in book Start from scratch and redesign –ATM

17 NL: Addressing Hierarchical vs. flat –Routing table size Global vs. local –Applications (NAT) –Processing speed Variable-length vs. fixed-length –Flexibility –Processing costs –Header size

18 NL: Routing The most complicated and important function the network layer provides –Directing data from source to destination Routing algorithms and architectures –Link state algorithms –Distance vector algorithms Routing hierarchies –Area routing –Landmark routing (at end of course time-permitting)

19 NL: Routing algorithms Graph abstraction for routing algorithms: graph nodes are routers graph edges are physical links –link cost Delay $ cost congestion level Goal: determine “good” path (sequence of routers) thru network from source to dest. Routing protocol A E D CB F “good” path: –typically means minimum cost path –other def’s possible

20 NL: Routing algorithms Global or decentralized information? Global: all routers have complete topology, link cost info “link state” algorithms Decentralized: router knows physically- connected neighbors, link costs to neighbors iterative process of computation, exchange of info with neighbors “distance vector” algorithms Static or dynamic? Static: routes change slowly over time Dynamic: routes change more quickly –periodic update –in response to link cost changes

21 NL: What to look for in routing algorithms Communication costs Processing costs Optimality Stability –Convergence time –Loop freedom –Oscillation damping

22 NL: Link state routing algorithms Used in OSPF (intra-domain routing protocol) Basic steps Start condition –Each node assumed to know state of links to its neighbors Step 1 –Each node broadcasts its local link states to all other nodes –Reliable flooding mechanism Step 2 –Each node locally computes shortest paths to all other nodes from global state –Dijkstra’s shortest path tree (SPT) algorithm

23 NL: Step 1 Link State Packets (LSPs) to broadcast state to all nodes Periodically, each node creates a link state packet containing: –Node ID –List of neighbors and link cost –Sequence number –Time to live (TTL) –Node outputs LSP on all its links

24 NL: Step 1 Reliable Flooding –When node J receives LSP from node K If LSP is the most recent LSP from K that J has seen so far, J saves it in database and forwards a copy on all links except link LSP was received on Otherwise, discard LSP –How to tell more recent Use sequence numbers –Same method as sliding window protocols –Needed to avoid stale information from flood –Problem: sequence number wrap-around »Lollipop sequence space

25 NL: Step 1 and wrapped sequence numbers Wrapped sequence numbers –0-N where N is large –If difference between numbers is large, assume a wrap –A is older than B if…. A < B and |A-B| < N/2 or… A > B and |A-B| > N/2 What about new nodes or rebooted nodes that are out of sync with sequence number space? –Lollipop sequence (Perlman 1983)

26 NL: Step 1 and lollipop sequence numbers Divide sequence number space Special negative sequence for recovering from reboot –New and rebooted nodes use negative sequence numbers –Upon receipt of negative number, other nodes inform these nodes of current “up-to-date” sequence number A older than B if –A < 0 and A < B –A > 0, A < B and (B – A) < N/4 –A > 0, A > B and (A – B) > N/4 0 -N/2 N/2 - 1

27 NL: Step 2 Dijkstra’s algorithm all link costs on the network are known all nodes have same info computes least cost paths from one node (‘source”) to all other nodes –gives routing table for that node iterative: after k iterations, know least cost path to k destinations Notation: c(i,j): link cost from node i to j. cost infinite if not direct neighbors D(v): current value of cost of path from source to dest. V p(v): predecessor node along path from source to v, that is next v N: set of nodes whose least cost path definitively known A Link-state routing algorithm

28 NL: Step 2 (Dijkstra’s algorithm example) 1 Initialization: 2 N = {A} 3 for all nodes v 4 if v adjacent to A 5 then D(v) = c(A,v) 6 else D(v) = infinity 7 8 Loop 9 find w not in N such that D(w) is a minimum 10 add w to N 11 update D(v) for all v adjacent to w and not in N: 12 D(v) = min( D(v), D(w) + c(w,v) ) 13 /* new cost to v is either old cost to v or known 14 shortest path cost to w plus cost from w to v */ 15 until all nodes in N

29 NL: Step 2 (Dijkstra’s algorithm example) AFBDEC B CDE F

30 NL: Step 2 (Dijkstra’s algorithm example) AFBDEC B CDE F

31 NL: Step 2 (Dijkstra’s algorithm example) AFBDEC B CDE F

32 NL: Step 2 (Dijkstra’s algorithm example) AFBDEC B CDE F

33 NL: Step 2 (Dijkstra’s algorithm example) AFBDEC B CDE F

34 NL: Step 2 (Dijkstra’s algorithm example) AFB DE C B CDE F