Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.

Slides:



Advertisements
Similar presentations
What's inside a router? We have yet to consider the switching function of a router - the actual transfer of datagrams from a router's incoming links to.
Advertisements

Chapter 4 Network Layer A note on the use of these ppt slides:
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.5 Routing algorithms m Link state m Distance.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 15.
4: Network Layer4b-1 Router Architecture Overview Two key router functions: r run routing algorithms/protocol (RIP, OSPF, BGP) r switching datagrams from.
Chapter 4 Queuing, Datagrams, and Addressing
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright
1 Wide Area Networks and Internet CT1403 Lecture-8: Internet Network Layer (Part-3) By : Najla Al-Nabhan.
Network Layer4-1 Chapter 4 Network Layer Part 1: network layer overview datagram networks routers Computer Networking: A Top Down Approach 6 th edition.
CS 1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
Network Layer4-1 Summary: TCP Congestion Control When CongWin is below Threshold, sender in slow-start phase, window grows exponentially. When CongWin.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
Virtual Circuit Network. Network Layer 2 Network layer r transport segment from sending to receiving host r network layer protocols in every host, router.
Network Layer4-1 Chapter 4 Network Layer A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers).
Network Layer 4-1 Chapter 4 Network Layer. Network Layer 4-2 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3.
Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD School of Computer & Communication Engineering.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
1 CSE3213 Computer Network I Network Layer (7.1, 7.3, ) Course page: Slides modified from Alberto Leon-Garcia.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m routing (path selection) m dealing with.
1 John Magee 24 February 2014 CS 280: Network Layer: Virtual Circuits / Datagram Networks and What’s inside a Router? Most slides adapted from Kurose and.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Router Architecture Overview
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Forwarding.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r Understand principles behind network layer services: m Routing (path selection) m dealing with.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r Understand principles behind network layer services: m Routing (path selection) m dealing with.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
CSE 421 Computer Networks. Chapter 4 Network Layer Thanks to you All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723
Chapter 3 Part 3 Switching and Bridging
Chapter 4 Network Layer All material copyright
CS/ECE 438: Communication Networks
CS4470 Computer Networking Protocols
EEC-484/584 Computer Networks
Chapter 4: Network Layer
Chapter 3 Part 3 Switching and Bridging
CS 1652 The slides are adapted from the publisher’s material
Chapter 4-1 Network layer
What’s “Inside” a Router?
Network Layer I have learned from life no matter how far you go
October 26th, 2010 CS1652/Telcom2310 Jack Lange
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
EEC-484/584 Computer Networks
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
Chapter 3 Part 3 Switching and Bridging
Chapter 4: Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides:
Presentation transcript:

Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) that you mention their source (after all, we’d like people to use our book!)  If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Network Layer 4-1

Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router Hierarchical addressing: route aggregation Chapter 4: outline

Network Layer 4-3 Network layer  transport segment from sending to receiving host  on sending side encapsulates segments into datagrams  on receiving side, delivers segments to transport layer  network layer protocols in every host, router  router examines header fields in all IP datagrams passing through it application transport network data link physical application transport network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical

Network Layer 4-4 Two key network-layer functions  forwarding: move packets from router’s input to appropriate router output  routing: determine route taken by packets from source to dest.  routing algorithms analogy:  routing: process of planning trip from source to dest  forwarding: process of getting through single interchange

Network Layer value in arriving packet’s header routing algorithm local forwarding table header value output link Interplay between routing and forwarding routing algorithm determines end-end-path through network forwarding table determines local forwarding at this router

Network Layer 4-6 Connection setup  3 rd important function in some network architectures:  ATM, frame relay, X.25  before datagrams flow, two end hosts and intervening routers establish virtual connection  routers get involved  network vs transport layer connection service:  network: between two hosts (may also involve intervening routers in case of VCs)  transport: between two processes

Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4 addressing  ICMP  IPv6 4.5 routing algorithms  link state  distance vector  hierarchical routing 4.6 routing in the Internet  RIP  OSPF  BGP 4.7 broadcast and multicast routing Chapter 4: outline

Network Layer 4-8 Connection, connection-less service  datagram network provides network-layer connectionless service  virtual-circuit(vc) network provides network-layer connection service  analogous to TCP/UDP connecton-oriented / connectionless transport-layer services, but:  service: host-to-host  no choice: network provides one or the other  implementation: in network core

Network Layer 4-9 Virtual circuits  call setup, teardown for each call before data can flow  each packet carries VC identifier (not destination host address)  every router on source-dest path maintains “state” for each passing connection  link, router resources (bandwidth, buffers) may be allocated to VC (dedicated resources = predictable service) “source-to-dest path behaves much like telephone circuit”  performance-wise  network actions along source-to-dest path

Network Layer 4-10 VC implementation a VC consists of: 1.path from source to destination 2.VC numbers, one number for each link along path 3.entries in forwarding tables in routers along path  packet belonging to VC carries VC number (rather than dest address)  VC number can be changed on each link.  new VC number comes from forwarding table

Network Layer 4-11 VC forwarding table VC number interface number Incoming interface Incoming VC # Outgoing interface Outgoing VC # … … forwarding table in northwest router: VC routers maintain connection state information!

Network Layer 4-12 Virtual circuits: signaling protocols  used to setup, maintain teardown VC  used in ATM, frame-relay, X.25  not used in today’s Internet

Network Layer 4-13 Datagram networks  no call setup at network layer  routers: no state about end-to-end connections  no network-level concept of “connection”  packets forwarded using destination host address 1. send datagrams application transport network data link physical application transport network data link physical 2. receive datagrams

Network Layer Datagram forwarding table IP destination address in arriving packet’s header routing algorithm local forwarding table dest address output link address-range 1 address-range 2 address-range 3 address-range billion IP addresses, so rather than list individual destination address list range of addresses (aggregate table entries)

Network Layer 4-15 Destination Address Range through through through otherwise Link Interface Q: but what happens if ranges don’t divide up so nicely? Datagram forwarding table

Network Layer 4-16 Longest prefix matching Destination Address Range *** ********* ********* *** ********* otherwise DA: examples: DA: which interface? when looking for forwarding table entry for given destination address, use longest address prefix that matches destination address. longest prefix matching Link interface

Longest prefix matching - Exercise 1 Consider a datagram network using 32-bit host addresses. Suppose a router has four links, numbered 0 through 3, and packets are to be forwarded to the link interfaces as follows: Destination Address RangeLink Interface through through through otherwise3 a) Provide a forwarding table that has five entries, uses longest prefix matching, and forwards packets to the correct link interfaces. b) Describe how your forwarding table determines the appropriate link interface for datagrams with destination addresses:

Longest prefix matching - Exercise 2 Consider a datagram network using 8-bit host addresses. Suppose a router uses longest prefix matching and has the following forwarding table: For each of the four interfaces, give the associated range of destination host addresses and the number of addresses in the range.

Longest prefix matching - Exercise 3 Consider a datagram network using 8-bit host addresses. Suppose a router uses longest prefix matching and has the following forwarding table: For each of the four interfaces, give the associated range of destination host addresses and the number of addresses in the range.

Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4 addressing  ICMP  IPv6 4.5 routing algorithms  link state  distance vector  hierarchical routing 4.6 routing in the Internet  RIP  OSPF  BGP 4.7 broadcast and multicast routing Chapter 4: outline

Network Layer 4-21 Router architecture overview two key router functions:  run routing algorithms/protocol (RIP, OSPF, BGP)  forwarding datagrams from incoming to outgoing link high-seed switching fabric routing processor router input ports router output ports forwarding data plane (hardware) routing, management control plane (software) forwarding tables computed, pushed to input ports

Network Layer 4-22 line termination Data link processing (protocol, decapsulation) lookup, forwarding queueing Input port functions decentralized switching:  given datagram dest., lookup output port using forwarding table in input port memory  goal: complete input port processing at ‘line speed’  queuing: if datagrams arrive faster than forwarding rate into switch fabric physical layer: bit-level reception data link layer: e.g., Ethernet see chapter 5 switch fabric

Network Layer 4-23 Switching fabrics  Switching fabric transfer packet from input buffer/port to appropriate output buffer/port.  switching rate: rate at which packets can be transferred from inputs to outputs  often measured as multiple of input/output line rate  N inputs: switching rate N times line rate desirable  Three types of switching fabrics memory bus crossbar

Network Layer 4-24 Switching via memory: first generation routers  traditional computers with switching under direct control of CPU  packet copied to system’s memory  CPU extracts dest address from packet’s header, looks up output port in forwarding table, copies to output port  speed limited by memory bandwidth (2 bus crossings per datagram)  one packet at a time input port (e.g., Ethernet) memory output port (e.g., Ethernet) system bus

Network Layer 4-25 Switching via a bus  An input port transfers a packet directly to the output port over a shared bus, without intervention by the routing processor.  bus contention: switching speed limited by bus bandwidth.  one packet a time  switching via a bus is often sufficient for routers that operate in small local area and enterprise networks.  The Cisco 5600 [Cisco Switches 2012] switches packets over a 32 Gbps backplane bus.

Network Layer 4-26 Switching via interconnection network  forwards multiple packets in parallel  A crossbar switch is an interconnection network consisting of 2N buses that connect N input ports to N output ports.  When packet from port A needs to forwarded to port Y, controller closes cross point at intersection of two buses  If two packets from two different input ports are destined to the same output port, then one will have to wait at the input, since only one packet can be sent over any given bus at a time.  More sophisticated interconnection networks use multiple stages of switching elements

Network Layer 4-27 Output ports  buffering required when datagrams arrive from fabric faster than the transmission rate  scheduling discipline chooses among queued datagrams for transmission

Network Layer 4-28 Output port queueing  suppose R switch is N times faster than R line  still have output buffering when multiple inputs send to same output  queueing (wait) and loss due to output port buffer overflow! at t, packets more from input to output one packet time later switch fabric switch fabric

Network Layer 4-29 How much buffering?  RFC 3439 rule of thumb for buffer sizing was that the amount of buffering (B) should be equal to an average round-trip time (RTT, say 250 msec) times the link capacity (C). Thus, a 10 Gbps link with an RTT of 250 msec would need an amount of buffering equal to B = RTT · C = 2.5 Gbits of buffers.  recent recommendation: with N flows, buffering equal to RTT C. N

Network Layer 4-30 Input port queuing  fabric slower than input ports combined queuing may occur at input queues  queuing delay and loss due to input buffer overflow!  Head-of-the-Line (HOL) blocking: queued datagram at front of queue prevents others in queue from moving forward output port contention: only one red datagram can be transferred. lower red packet is blocked switch fabric one packet time later: green packet experiences HOL blocking switch fabric

Network Layer 4-31 IP addressing: interface  IP address: 32-bit identifier for host, router interface  interface: connection between host/router and physical link  routers typically have multiple interfaces  host typically has one active interface (e.g., wired Ethernet, wireless )  one IP address associated with each interface =

Hierarchical addressing: route aggregation “Send me anything with addresses beginning /20” / / /23 Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “Send me anything with addresses beginning /16” /23 Organization hierarchical addressing allows efficient advertisement of routing information: The ability to use a single network prefix to advertise multiple networks is often referred to as route aggregation or route summarization.

Network Layer 4-33 When other routers in the larger Internet see the address blocks /20 (from Fly-By- Night-ISP) and /23 (from ISPs-R-Us) and want to route to an address in the block /23, they will use a longest prefix matching rule, and route toward ISPs-R-Us, as it advertises the longest (more specific) address prefix that matches the destination address. “Send me anything with addresses beginning /20” / / /23 Fly-By-Night-ISP Organization 0 Organization 7 Internet Organization 1 ISPs-R-Us “Send me anything with addresses beginning /16 or /23” /23 Organization Hierarchical addressing: more specific routes

Network Layer 4-34 END