1. INTERNETWORKING
An arbitrary collection of networks interconnected to provide some sort of host-host to packet delivery service
2. IP
IP Service Model
Packet Format
IP Fragmentation and Reassembly
3. ARP
Address Translation Protocol (ARP) Map IP addresses into physical addresses
Techniques
ARP (Address Resolution Protocol)
Most host Operating Systems provide a way to manually configure the IP information for the host. Drawbacks of manual configuration
4. REVERSE ADDRESS RESOLUTION PROTOCOL
(RARP) is a Link layer networking protocol. RARP is described in internet EngineeringTask ForceETF) publication RFC 903. It has been rendered obsolete by the Bootstrap Protocol (BOOTP) and the modern Dynamic Host Configuration Protocol(DHCP). BOOTP configuration server assigns an IP address to each client from a pool of addresses. BOOTP uses the User Datagram Protocol (UDP)
5. DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)
6. INTERNET CONTROL MESSAGE PROTOCOL
Defines a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully
ICMP-Redirect
7. ROUTING
Forwarding versus Routing –
Forwarding: – to select an output port based on destination address and routing table
Routing: – process by which routing table is built
Forwarding table VS Routing table
Forwarding table:
– Used when a packet is being forwarded and so must contain enough information to accomplish the forwarding function
– A row in the forwarding table contains the mapping from a network number to an outgoing interface and some MAC information, such as Ethernet Address of the next hop
Routing table
– Built by the routing algorithm as a precursor to build the forwarding table
– Generally contains mapping from network numbers to next hops
– For a simple network, we can calculate all shortest paths and load them into some nonvolatile storage on each node.
– Such a static approach has several shortcomings
– It does not deal with node or link failures
– It does not consider the addition of new nodes or links
– It implies that edge costs cannot change
– Need a distributed and dynamic protocol
– Two main classes of protocols
– Distance Vector
– Link State
8. ROUTING ALGORITHMS
Distance Vector
Slightly different circumstances can prevent the network from stabilizing
This cycle stops only when the distances reach some number that is large enough to be considered infinite
Count-to-infinity problem
Use some relatively small number as an approximation of infinity. For example, the maximum number of hops to get across a certain network is never going to be more than 16. One technique to improve the time to stabilize routing is called split horizon. When a node sends a routing update to its neighbors, it does not send those routes it learned from each neighbor back to that neighbor
For example, if B has the route (E, 2, A) in its table, then it knows it must have learned this route from A, and so whenever B sends a routing update to A, it does not include the route (E, 2) in that update. In a stronger version of split horizon, called split horizon with poison reverse. B actually sends that back route to A, but it puts negative information in the route to ensure that A will not eventually use B to get to E
For example, B sends the route (E, ∞) to A
Link State Routing
Strategy: Send to all nodes (not just neighbors) information about directly connected links (not entire routing table).
9. ADDRESSING
Global Addresses
IP Datagram Forwarding Strategy. every datagram contains destination's address if directly connected to destination network, then forward to host. if not directly connected to destination network, then forward to some router forwarding table maps network number into next hop each host has a default router. each router maintains a forwarding table
Example (router R2)
if (NetworkNum of destination = NetworkNum of one of my interfaces) then deliver packet to destination over that interface
else
if (NetworkNum of destination is in my forwarding table) then deliver packet to NextHop router
else
deliver packet to default router
For a host with only one interface and only a default router in its forwarding table, this simplifies to
if (NetworkNum of destination = my NetworkNum)then deliver packet to destination directly
else
deliver packet to default router
10. CIDR
Classless Addressing
Classless Inter-Domain Routing: A technique that addresses two scaling concerns in the Internet. The growth of backbone routing table as more and more network numbers need to be stored in them Potential exhaustion of the 32-bit address space
Address assignment efficiency: Arises because of the IP address structure with class A, B, and C addresses. Forces us to hand out network address space in fixed-size chunks of three very different sizes. A network with two hosts needs a class C address. Address assignment efficiency = 2/255 = 0.78. A network with 256 hosts needs a class B address
ADDRESS ASSIGNMENT EFFICIENCY = 256/65535 = 0.39
Problem with this solution. Excessive storage requirement at the routers. If a single AS has, say 16 class C network numbers assigned to it, Every Internet backbone router needs 16 entries in its routing tables for that AS. This is true, even if the path to every one of these networks is the same If we had assigned a class B address to the AS. The same routing information can be stored in one entry
Efficiency = 16 × 255 / 65, 536 = 6.2%
CIDR tries to balance the desire to minimize the number of routes that a router needs to know against the need to hand out addresses efficiently. CIDR uses aggregate routes Uses a single entry in the forwarding table to tell the router how to reach a lot of different networks. Breaks the rigid boundaries between address classes
Consider an AS with 16 class C network numbers. Instead of handing out 16 addresses at random, hand out a block of contiguous class C addresses Suppose we assign the class C network numbers from 192.4.16 through 192.4.31 Observe that top 20 bits of all the addresses in this range are the same (11000000 00000100 0001). We have created a 20-bit network number (which is in between class B network number and class C number). Requires to hand out blocks of class C addresses that share a common prefix
21 videos|113 docs|66 tests
|
1. What is the purpose of the Data Link Layer in computer networks? |
2. What are the key functions of the Data Link Layer? |
3. What are the two sublayers of the Data Link Layer? |
4. How does the Data Link Layer handle flow control? |
5. What are the common protocols used in the Data Link Layer? |
|
Explore Courses for Computer Science Engineering (CSE) exam
|