Download presentation
Presentation is loading. Please wait.
1
Ch 4. The Network Layer Myungchul Kim mckim@icu.ac.kr
2
2 – Datagram – Routers do not run application- and transport- layer protocols – Forwarding vs routing – Forwarding: router-local action of transfering a packet from an input link to the appropriate out link – Routing: network-wide process determining the end-to-end paths that packets take from source to destination – Thr routing algorithm determines the values that are inserted into the routers’ forwarding table. – Packet switch Link-layer switch Router
3
3
4
4
5
5 Network service model – Defines the characteristics of end-to-end transport of packets between sending and receiving end systems. Guaranteed delivery Guaranteed delivery with bounded delay In-order packet delivery Guranteed minimal bandwidth Guaranteed maximum jitter Security service – Best-effort service: no service at all – ATM service model Constant bit rate (CBR): as if a dedicated fixed-bandwidth transmission link Available bit rate (ABR): cells cannot be reordered and a min cell transmission rate is guaranteed
6
6
7
7 Virtual circuit and datagram networks o Network layer vs transport layer – Host-to-host services, process-to-process services – Network layer: host-to-host connectionless service (datagram networks), host-to-host connection service (virtual-circuit networks) – End systems for transport layer vs routers and end systems for network layers
8
8 o Virtual circuit networks – ATM and frame relay – Virtual circuit A path VC numbers Entries in the forwarding table Page 345
9
9 Forwarding table 12 22 32 1 2 3 VC number interface number Incoming interface Incoming VC # Outgoing interface Outgoing VC # 1 12 3 22 2 63 1 18 3 7 2 17 1 97 3 87 … … Forwarding table in northwest router: Routers maintain connection state information!
10
10 – VC setup -> Data transfer -> VC tear down by ATM’s Q.2931 signaling protocol – Connection set up at the transport layer?
11
11 o Datagram networks – Prefix match at the page 348 – Longest prefix matching rule – Forwarding tables can be modifed at any time -> packets go different paths and arrive out of order
12
12 Forwarding table Destination Address Range Link Interface 11001000 00010111 00010000 00000000 through 0 11001000 00010111 00010111 11111111 11001000 00010111 00011000 00000000 through 1 11001000 00010111 00011000 11111111 11001000 00010111 00011001 00000000 through 2 11001000 00010111 00011111 11111111 otherwise 3 4 billion possible entries
13
13 What’s inside a router
14
14 o Input ports – A shadow copy of the forwarding table is typically stored at ech input port and updated by the routing processor – Increase lookup speeds: content addressable memories (CAM) allows a 32-bit IP address to be presented to the CAM, which returns the content of the forwarding table entry for that address in essentially constant time.
15
15 o Switching fabric
16
16 o Output ports
17
17 o Where does queueing occur – Packet queue can form at both the input ports and the output ports – Packet loss – Packet scheduler at the output port must choose one packet among those queued for transmission First-come-first-served Weighted fair queueing For quality-of-service guarantees
18
18
19
19
20
20 IP: forwarding and addressing in the Internet
21
21
22
22 o IP datagram fragmentation – Maximum transmission unit: a hard limit on the length of an IP datagram – Jolt2 attack: none of fragments has an offset of zero or overlapping IP fragments
23
23
24
24 o IPv4 addressing – 32 bits long (4 bytes) – Dotted-decimal notation – Globally unique – subnet
25
25 – Classless interdomain routing (CIDR) – a.b.c.d/x network portion of th IP address = prefix – Classfule addressing: C(/24) = 254 hosts, B(/16) = 65,634 hosts, broadcast = 255.255.255.255
26
26 o Obtaining a block of addresses – Internet Corporation for Assigned Name and Numbers (ICANN) Allocate IP addresses to regional Internet registries Manage the DNS root servers o Obtaining a host address: the Dynamic Host Configuration Protocol (DHCP) – DHCP server discovery – DHCP server offer(s) – DHCP request – DHCP ACK – A TCP connection maintanence problem for a mobile node
27
27
28
28
29
29 o Network address translation (NAT) – Private addresses have meaning within that network – The NAT router behaves to the outside world as a single device with a single IP address.
30
30 – Arguments on Network address translation (NAT) Prot numbers for addressing processes not for addressing hosts Routers are supposed to process packets only up to layer 3 Violates the end-to-end arguments IPv6
31
31 o Internet Control Message Protocol (ICMP) – Error reporting – Ping program – Source quench message – Tracerout
32
32
33
33 o IPv6 – IPv5 (ST-2 similar to RSVP) – Datagram format Expanded addressing capabilities: unicast, multicast, anycast address A streamlined 40-byte header Flow labeling and priority – IPv4 vs IPv6 Fragmentation/reassembly Header checksum Options
34
34
35
35 – Transition from IPv4 to IPv6 A flag day Dual-stack approach Tunneling – The US Office of Management and Budget (OMB): to IPv6 by June 2008 – Europe’s Third Generation Partnership Program (3GPP) 2007. – Difficult to change network-layer protocols
36
36
37
37
38
38 o IP security – IPsec – Virtual Private Networks (VPN) Cryptographic agreement on algorithms and keys Encryption of IP datagram payload Data integrity Origin authentication
39
39 Routing algoritms – Default router: the first-hop router – The least cost path – Global routing algorithm: link-state (LS) algorithms – Decentralized routing algorithm: distance-vector (DV) algorithms – Static routing algorithms vs dynamic routing – Load-sensitive algorithms vs load-insensitive
40
40 o Hierarchical routing – Autonomous systems (ASs) – Gateway routers – Within an AS, all routers run the same intra-AS routing protocol. – The ASs run the same inter-AS routing protocol.
41
41 Routing in the Internet o RIP (routing information protocol) – DV protocol – Hop count as a cost metric (max 15) – Routing updates every 30 seconds
42
42 o OSPF(open shortest path first) – LS protocol – Link’s state updates every 30 minutes – Advantages: Security: MD5 Multiple same-cost paths Integrated support for unicast and multicast routing Support for hierarchy within a single routing domain
43
43
44
44 o BGP (Border Gateway Protocol) – Obtain subnet reachablility information from neighboring ASs – Propagate the reachablility information to all routers interanl to the AS – Determine “good” routes to subnets based on the reachability information on AS policy.
45
45 BGP routing policy o A,B,C are provider networks o X,W,Y are customer (of provider networks) o X is dual-homed: attached to two networks – X does not want to route from B via X to C –.. so X will not advertise to B a route to C A B C W X Y legend : customer network: provider network
46
46 BGP routing policy (2) o A advertises path AW to B o B advertises path BAW to X o Should B advertise path BAW to C? – No way! B gets no “ revenue ” for routing CBAW since neither W nor C are B ’ s customers – B wants to force C to route to w via A – B wants to route only to/from its customers! A B C W X Y legend : customer network: provider network
47
47 Broadcast and Multicast Routing o Broadcast routing algorithms – N-way unicast – Uncontrolled flooding -> broadcast storm
48
48 – Controlled flooding Sequence-number-controlled flooding Reverse path forwarding (RPF)
49
49 – Spanning-tree broadcast
50
50
51
51 o Multicast – To a subset of network nodes – Class D multicast IP address for multicast group – Internet Group Management Protocol and mulcast routing protocols
52
52 – Multicast routing algorithms Multicast routing using a group-shared tree Multicast routing using a source-based tree with pruning
53
53 – Multicast routing in the Internet Distance Vector Multicast Routing Protocol (DVMRP) Protocol-Independent Multicast (PIM) routing protocol
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.