版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、The Network LayerChapter 5Network Layer Design IssuesStore-and-forward packet switchingServices provided to transport layerImplementation of connectionless serviceImplementation of connection-oriented serviceComparison of virtual-circuit and datagram networksStore-and-Forward Packet SwitchingThe env
2、ironment of the network layer protocols.ISPs equipmentServices Provided to the Transport LayerServices independent of router technology.Transport layer shielded from number, type, topology of routers.Network addresses available to transport layer use uniform numbering planeven across LANs and WANsIm
3、plementation of Connectionless ServiceRouting within a datagram networkISPs equipmentAs table (initially) As table (later) Cs Table Es TableImplementation of Connection-Oriented ServiceRouting within a virtual-circuit networkISPs equipmentAs table Cs Table Es TableComparison of Virtual-Circuit and D
4、atagram NetworksComparison of datagram and virtual-circuit networksRouting Algorithms (1)Optimality principleShortest path algorithmFloodingDistance vector routingLink state routingRouting in ad hoc networksRouting Algorithms (2)Broadcast routingMulticast routingAnycast routingRouting for mobile hos
5、tsRouting in ad hoc networksFairness vs. EfficiencyNetwork with a conflict between fairness and efficiency.The Optimality Principle(a) A network. (b) A sink tree for router B.Shortest Path Algorithm (1)The first five steps used in computing the shortest path from A to D. The arrows indicate the work
6、ing nodeShortest Path Algorithm (2)Dijkstras algorithm to compute the shortest path through a graph. . .Shortest Path Algorithm (3)Dijkstras algorithm to compute the shortest path through a graph. . . . .Shortest Path Algorithm (4)Dijkstras algorithm to compute the shortest path through a graph. . .
7、(a) A network. (b) Input from A, I, H, K, and the new routing table for J.Distance Vector RoutingThe Count-to-Infinity ProblemThe count-to-infinity problemLink State RoutingDiscover neighbors, learn network addresses.Set distance/cost metric to each neighbor.Construct packet telling all learned.Send
8、 packet to, receive packets from other routers.Compute shortest path to every other router.Learning about the Neighbors (1)Nine routers and a broadcast LAN. Learning about the Neighbors (2)A graph model of previous slide.Building Link State Packets(a) A network. (b) The link state packets for this n
9、etwork.Distributing the Link State PacketsThe packet buffer for router B in previous slideHierarchical RoutingHierarchical routing.Broadcast RoutingReverse path forwarding. (a) A network. (b) A sink tree. (c) The tree built by reverse path forwarding.Multicast Routing (1)(a) A network. (b) A spannin
10、g tree for the leftmost router. (c) Amulticast tree for group 1. (d) A multicast tree for group 2.Multicast Routing (2)Core-based tree for group 1.Sending to group 1.Anycast RoutingAnycast routes to group 1. Topology seen by the routing protocol.Routing for Mobile HostsPacket routing for mobile host
11、sRouting in Ad Hoc NetworksRange of As broadcast. After B and D receive it. After C, F, and G receive it.After E, H, and I receive it. The shaded nodes are new recipients. The dashed lines show possible reverse routes. The solid lines show the discovered route.Congestion Control Algorithms (1)Approa
12、ches to congestion controlTraffic-aware routingAdmission controlTraffic throttlingLoad sheddingCongestion Control Algorithms (2)When too much traffic is offered, congestion sets in and performance degrades sharply.Approaches to Congestion ControlTimescales of approaches to congestion controlTraffic-
13、Aware RoutingA network in which the East and West parts are connected by two links.Traffic Throttling (1)(a) A congested network. (b) The portion of the network that is not congested. A virtual circuit from A to B is also shown.Traffic Throttling (2)Explicit congestion notificationLoad Shedding (1)A
14、 choke packet that affects only the source.Load Shedding (2)A choke packet that affects each hop it passes through.Quality of ServiceApplication requirementsTraffic shapingPacket schedulingAdmission controlIntegrated servicesDifferentiated servicesApplication Requirements (1)How stringent the qualit
15、y-of-service requirements are.Categories of QoS and ExamplesConstant bit rateTelephonyReal-time variable bit rateCompressed videoconferencingNon-real-time variable bit rateWatching a movie on demandAvailable bit rate File transferTraffic Shaping (1)(a) Shaping packets. (b) A leaky bucket. (c) A toke
16、n bucketTraffic Shaping (2)(a) Traffic from a host. Output shaped by a token bucket of rate 200 Mbps and capacity (b) 9600 KB, (c) 0 KB.Traffic Shaping (3)Token bucket level for shaping with rate 200 Mbps and capacity (d) 16000 KB, (e) 9600 KB, and (f) 0KB.Packet Scheduling (1)Kinds of resources can
17、 potentially be reserved for different flows: Bandwidth. Buffer space. CPU cycles.Packet Scheduling (2)Round-robin Fair QueuingPacket Scheduling (3)Weighted Fair Queueing.Finishing times for the packets.Admission Control (1)An example flow specificationAdmission Control (2)Bandwidth and delay guaran
18、tees with token buckets and WFQ.Integrated Services (1)(a) A network. (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2.Integrated Services (2)(a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a cha
19、nnel to host 1.Differentiated Services (1)Expedited packets experience a traffic-free networkDifferentiated Services (2)A possible implementation of assured forwardingInternetworkingHow networks differHow networks can be connectedTunnelingInternetwork routingPacket fragmentationHow Networks DifferSo
20、me of the many ways networks can differHow Networks Can Be ConnectedA packet crossing different networks. Network and link layer protocol processing.Tunneling (1)Tunneling a packet from Paris to London.Tunneling (2)Tunneling a car from France to EnglandPacket Fragmentation (1)Packet size issues:Hard
21、wareOperating systemProtocolsCompliance with (inter)national standard.Reduce error-induced retransmissionsPrevent packet occupying channel too long.Packet Fragmentation (2)Transparent fragmentation. Nontransparent fragmentationPacket Fragmentation (3)Fragmentation when the elementary data size is 1
22、byte.(a) Original packet, containing 10 data bytes.Packet Fragmentation (4)Fragmentation when the elementary data size is 1 byte(b) Fragments after passing through a networkwith maximum packet size of 8 payload bytes plus header.Packet Fragmentation (5)Fragmentation when the elementary data size is
23、1 byte(c) Fragments after passing through a size 5 gateway.Packet Fragmentation (6)Path MTU DiscoveryThe Network Layer Principles (1)Make sure it worksKeep it simpleMake clear choicesExploit modularityExpect heterogeneity . . .The Network Layer Principles (2). . .Avoid static options and parametersL
24、ook for good design (not perfect)Strict sending, tolerant receivingThink about scalabilityConsider performance and costThe Network Layer in the Internet (1)The IP Version 4 ProtocolIP AddressesIP Version 6Internet Control ProtocolsLabel Switching and MPLSOSPFAn Interior Gateway Routing ProtocolBGPTh
25、e Exterior Gateway Routing ProtocolInternet MulticastingMobile IPThe Network Layer in the Internet (2)The Internet is an interconnected collection of many networks.The IP Version 4 Protocol (1)The IPv4 (Internet Protocol) header.The IP Version 4 Protocol (2)Some of the IP options.IP Addresses (1)An
26、IP prefix.IP Addresses (2)Splitting an IP prefix into separate networks with subnetting.IP Addresses (3)A set of IP address assignmentsIP Addresses (4)Aggregation of IP prefixesIP Addresses (5)Longest matching prefix routing at the New York router.IP Addresses (6)IP address formatsIP Addresses (7)Sp
27、ecial IP addressesIP Addresses (8)Placement and operation of a NAT box.IP Version 6 GoalsSupport billions of hostsReduce routing table sizeSimplify protocolBetter securityAttention to type of serviceAid multicastingRoaming host without changing addressAllow future protocol evolutionPermit coexistenc
28、e of old, new protocols. . .IP Version 6 (1)The IPv6 fixed header (required).IP Version 6 (2)IPv6 extension headersIP Version 6 (3)The hop-by-hop extension header for large datagrams (jumbograms).IP Version 6 (4)The extension header for routing.Internet Control Protocols (1)The principal ICMP message types.Internet Control Protocols (2)Two switched Ethernet LANs joined by a routerLabel Switching and MPLS (1)Transmitting a TCP segment using IP, MPLS, and PPP.Label Switching and MPLS (2)Forwarding an IP packet through an MPLS networkOSPFAn Int
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年人才池共建协议2篇
- 重庆市丰都县2023-2024学年四年级上学期语文期末试卷(含答案)
- 设备质量保证书质量保证函
- 诚信可靠的笔译
- 语文大专论文写作卷
- 货物质量担保协议
- 购销合同精简版式
- 购销水泥合同协议书
- 赔偿协议合同的违约处理与赔偿金额
- 超高性能混凝土技术购销条款
- 图书馆服务礼仪讲座
- 国开电大《小学数学教学研究》形考任务2答案
- 医药行业深度研究:国内二类苗市场快速发展期待重磅产品放量及研发加速
- Python语言程序设计基础智慧树知到课后章节答案2023年下南华大学
- 第七章 卡方检验
- 偏瘫病人肢体功能锻炼操作流程康复医学
- 潜孔钻机施工方案
- 大班阅读《是谁留下的痕迹》
- 使役态+被动态课件 【知识精讲精研】 高三日语一轮复习
- 当前中小学教师培训的理论、政策及标准解读
- 职业生涯规划大赛领导讲话稿(16篇)
评论
0/150
提交评论