Alahazrat Network · URDU Gif Forma ALAHAZRAT NETWORK Nah zr 'til t . ala ha z rat network O ry . Z
08H6 Network
-
Upload
anurag-srivastav -
Category
Documents
-
view
222 -
download
0
description
Transcript of 08H6 Network
-
12/03/2005
Reti di Calcolatori 1
12/03/2005 Reti di Calcolatori 1
Fisico
Rete
Applicazione
HOST A
Fisico
Rete
Router
Bit
Frame
Pacchetto
Fisico
Rete
Router
Bit
Frame
Pacchetto
Bit
Frame
Pacchetto
Fisico
Rete
Applicazione
HOST B
Unit di trasmissione dati a livello trasporto
Unit di trasmissione dati a livello applicazione
Limite della sottorete di interconnessione
Trasporto
Data link Data link Data link Data link
Trasporto
Livello Network
12/03/2005 Reti di Calcolatori 2
Network Layer Design Isues
Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation of Connection-Oriented
Service Comparison of Virtual-Circuit and Datagram
Subnets
12/03/2005 Reti di Calcolatori 3
Store-and-Forward Packet Switching
The environment of the network layer protocols.
fig 5-1
12/03/2005 Reti di Calcolatori 4
Implementation of Connectionless Service
Routing within a diagram subnet.
12/03/2005 Reti di Calcolatori 5
Implementation of Connection-Oriented Service
Routing within a virtual-circuit subnet.
12/03/2005 Reti di Calcolatori 6
Comparison of Virtual-Circuit and Datagram Subnets
-
12/03/2005
Reti di Calcolatori 2
12/03/2005 Reti di Calcolatori 7
Routing Each node in a WAN is a router
that accepts an input packet, examines the destination address, and forwards the packet on to a particular telecommunications line.
How does a router decide which line to transmit on?
A router must select the one transmission line that will best provide a path to the destination and in an optimal manner.
Often many possible routes exist between sender and receiver.
12/03/2005 Reti di Calcolatori 8
Routing
The subnet with its nodes and telecommunication links is essentially a weighted network graph.
The edges, or telecommunication links, between nodes, have a cost associated with them.
The cost could be a delay cost, a queue size cost, a limiting speed, or simply a dollar amount for using that link.
12/03/2005 Reti di Calcolatori 9
Routing
The routing method, or algorithm, chosen to move packets through a network should be: Optimal, so the least cost can be found Fair, so all packets are treated equally Robust, in case link or node failures occur and the
network has to reroute traffic. Not too robust so that the chosen paths do not
oscillate too quickly between troubled spots.
12/03/2005 Reti di Calcolatori 10
Routing Algorithms
Conflict between fairness and optimality.
12/03/2005 Reti di Calcolatori 11
Least Cost Routing Algorithm
Dijkstras least cost algorithm finds all possible paths between two locations.
By identifying all possible paths, it also identifies the least cost path.
The algorithm can be applied to determine the least cost path between any pair of nodes.
12/03/2005 Reti di Calcolatori 12
Flooding Routing When a packet arrives at a node,
the node sends a copy of the packet out every link except the link the packet arrived on.
Traffic grows very quickly when every node floods the packet.
To limit uncontrolled growth, each packet has a hop count. Every time a packet hops, its hop count is incremented. When a packets hop count equals a global hop limit, the packet is discarded.
-
12/03/2005
Reti di Calcolatori 3
12/03/2005 Reti di Calcolatori 13
Centralized Routing One routing table is kept at a central node. Whenever a node needs a routing decision, the central node is consulted. To survive central node failure, the routing table should be kept at a backup
location. The central node should be designed to support a high amount of traffic
consisting of routing requests.
12/03/2005 Reti di Calcolatori 14
Distributed Routing Each node maintains its own routing table. No central site holds a global table. Somehow each node has to share information with other nodes
so that the individual routing tables can be created. Possible problem with individual routing tables holding
inaccurate information.
12/03/2005 Reti di Calcolatori 15
Isolated Routing
Each node uses only local information to create its own routing table.
Advantage - routing information does not have to be passed around the network.
Disadvantage - a nodes individual routing information could be inaccurate, or out of date.
12/03/2005 Reti di Calcolatori 16
Adaptive Routing versus Static Routing
With adaptive routing, routing tables can change to reflect changes in the network
Static routing does not allow the routing tables to change.
Static routing is simpler but does not adapt to network congestion or failures.
12/03/2005 Reti di Calcolatori 17
Network Congestion When a network or a part of a
network becomes so saturated with data packets that packet transfer is noticeably impeded, network congestion occurs.
Preventive measure include providing backup nodes and links and preallocation of resources.
To handle network congestion, you can perform buffer preallocation, choke packets, or permit systems.
Forward and backward explicit congestion control also used
When too much traffic is offered, congestion sets in and
performance degrades sharply.
12/03/2005 Reti di Calcolatori 18
Congestion Prevention PoliciesPolicies that affect congestion.
5-26
-
12/03/2005
Reti di Calcolatori 4
12/03/2005 Reti di Calcolatori 19
Quality of Service
Before making a connection, user requests how much bandwidth is needed, or if connection needs to be real-time
Network checks to see if it can satisfy user request If user request can be satisfied, connection is
established If a user does not need a high bandwidth or real-time,
a simpler, cheaper connection is created
12/03/2005 Reti di Calcolatori 20
Requirements
How stringent the quality-of-service requirements are.
12/03/2005 Reti di Calcolatori 21
Buffering
Smoothing the output stream by buffering packets.
12/03/2005 Reti di Calcolatori 22
Internetworking How Networks Differ How Networks Can Be Connected Concatenated Virtual Circuits Connectionless Internetworking Tunneling Internetwork Routing Fragmentation
12/03/2005 Reti di Calcolatori 23
Connecting Networks
12/03/2005 Reti di Calcolatori 24
How Networks DifferSome of the many ways networks can differ.
5-43
-
12/03/2005
Reti di Calcolatori 5
12/03/2005 Reti di Calcolatori 25
How Networks Can Be Connected
(a) Two Ethernets connected by a switch.
(b) Two Ethernets connected by routers.
12/03/2005 Reti di Calcolatori 26
Concatenated Virtual Circuits
Internetworking using concatenated virtual circuits.
12/03/2005 Reti di Calcolatori 27
Connectionless Internetworking
A connectionless internet.
12/03/2005 Reti di Calcolatori 28
Tunneling
Tunneling a packet from Paris to London.
12/03/2005 Reti di Calcolatori 29
Tunneling (2)
Tunneling a car from France to England.
12/03/2005 Reti di Calcolatori 30
Internetwork Routing
(a) An internetwork. (b) A graph of the internetwork.
-
12/03/2005
Reti di Calcolatori 6
12/03/2005 Reti di Calcolatori 31
Fragmentation
(a) Transparent fragmentation.(b) Nontransparent fragmentation.
12/03/2005 Reti di Calcolatori 32
Fragmentation (2)
Fragmentation when the elementary data size is 1 byte.(a) Original packet, containing 10 data bytes.(b) Fragments after passing through a network with maximum
packet size of 8 payload bytes plus header.(c) Fragments after passing through a size 5 gateway.
12/03/2005 Reti di Calcolatori 33
The Network Layer in the Internet
The IP Protocol IP Addresses Internet Control ProtocolsOSPF The Interior Gateway Routing Protocol BGP The Exterior Gateway Routing Protocol Internet MulticastingMobile IP IPv6
12/03/2005 Reti di Calcolatori 34
Design Principles for Internet
Make sure it works. Keep it simple. Make clear choices. Exploit modularity. Expect heterogeneity. Avoid static options and parameters. Look for a good design; it need not be perfect. Be strict when sending and tolerant when receiving. Think about scalability. Consider performance and cost.
12/03/2005 Reti di Calcolatori 35
Collection of Subnetworks
The Internet is an interconnected collection of many networks.
12/03/2005 Reti di Calcolatori 36
Communication in the Internet
The transport layer takes data streams and breaks them up into datagrams
Each datagram is transmitted through the Internet (possibly fragmented into smaller units)
When all the pieces get to the destination machines they are reassembled by the network layer to the original datagram which is then handed to the transport layer
The transport layer inserts the received datagram into the receiving process input stream.
-
12/03/2005
Reti di Calcolatori 7
12/03/2005 Reti di Calcolatori 37
The Internet Protocol (IP)
IP prepares a packet for transmission across the Internet.
The IP header is encapsulated onto a transport data packet.
The IP packet is then passed to the next layer where further network information is encapsulated onto it.
12/03/2005 Reti di Calcolatori 38
Progression of a packet from one network to another
12/03/2005 Reti di Calcolatori 39
Using IP, a subnet router: Makes routing decision based on the destination
address. May have to fragment the datagram into smaller
datagrams (very rare) using Fragment Offset. May determine that the current datagram has been
hopping around the network too long and delete it (Time to Live).
The Internet Protocol (IP)
12/03/2005 Reti di Calcolatori 40
The IP Protocol
The IPv4 (Internet Protocol) header.
12/03/2005 Reti di Calcolatori 41
The IP Protocol (2)
Some of the IP options.
5-54
12/03/2005 Reti di Calcolatori 42
IP Addresses
All devices connected to the Internet have a 32-bit IP address associated with it. Think of the IP address as a logical address (possibly
temporary), while the 48-bit address on every NIC is the physical, or permanent address.
Computers, networks and routers use the 32-bit binary address, but a more readable form is the dotted decimal notation. For example, the 32-bit binary address
10000000 10011100 00001110 00000111translates to 128.156.14.7
There are basically four types of IP addresses: Classes A, B, C and D.
-
12/03/2005
Reti di Calcolatori 8
12/03/2005 Reti di Calcolatori 43
IP Addresses
IP address formats.
12/03/2005 Reti di Calcolatori 44
IP Addresses (2)
Special IP addresses.
12/03/2005 Reti di Calcolatori 45
Subnets
A campus network consisting of LANs for various departments.
12/03/2005 Reti di Calcolatori 46
Sometimes you have a large number of IP address to manage.
By using subnet masking, you can break the host ID portion of the address into a subnet ID and host ID.
Some examples: the subnet mask 255.255.255.0 applied to a class B address
will break the host ID (normally 16 bits) into an 8-bit subnet ID and an 8-bit host ID;
the subnet mask 255.255.252.0 applied to a class B address will break the host ID (normally 16 bits) into an 6-bit subnet ID and an 10-bit host ID.
IP Subnet Masking
12/03/2005 Reti di Calcolatori 47
Subnets (2)
Class B network subnetted into 64 subnets.
12/03/2005 Reti di Calcolatori 48
CIDR Classless InterDomainRouting
A set of IP address assignments.
5-59
-
12/03/2005
Reti di Calcolatori 9
12/03/2005 Reti di Calcolatori 49
Network Address Translation (NAT)
NAT lets a router represent an entire local area network to the Internet as a single IP address.
All traffic leaving this LAN appears as originating from a global IP address.
All traffic coming into this LAN uses this global IP address.
This security feature allows a LAN to hide all the workstation IP addresses from the Internet.
Since the outside world cannot see into the LAN, you do not need to use registered IP addresses on the inside LAN.
12/03/2005 Reti di Calcolatori 50
Network Address Translation (NAT)
We can use the following blocks of addresses for private use: 10.0.0.0 10.255.255.255 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255
When a user on inside sends a packet to the outside, the NAT interface changes the users inside address to the global IP address. This change is stored in a cache.
When the response comes back, the NAT looks in the cache and switches the addresses back.
No cache entry? The packet is dropped. Unless NAT has a service table of fixed IP address mappings. This service table allows packets to originate from the outside.
12/03/2005 Reti di Calcolatori 51
NAT Network Address Translation
Placement and operation of a NAT box.
12/03/2005 Reti di Calcolatori 52
Internet Control Message Protocol
The principal ICMP message types.
5-61
12/03/2005 Reti di Calcolatori 53
ARP The Address Resolution Protocol
Three interconnected /24 networks: two Ethernets and an FDDI ring.
12/03/2005 Reti di Calcolatori 54
Dynamic Host Configuration Protocol
Operation of DHCP.
-
12/03/2005
Reti di Calcolatori 10
12/03/2005 Reti di Calcolatori 55
The Main IPv6 HeaderThe IPv6 fixed header (required).
12/03/2005 Reti di Calcolatori 56
Extension Headers
IPv6 extension headers.
12/03/2005 Reti di Calcolatori 57
Extension Headers (2)
The hop-by-hop extension header for large datagrams (jumbograms).
12/03/2005 Reti di Calcolatori 58
Extension Headers (3)
The extension header for routing.
/ColorImageDict > /JPEG2000ColorACSImageDict > /JPEG2000ColorImageDict > /AntiAliasGrayImages false /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages true /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict > /GrayImageDict > /JPEG2000GrayACSImageDict > /JPEG2000GrayImageDict > /AntiAliasMonoImages false /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 1200 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict > /AllowPSXObjects false /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputCondition () /PDFXRegistryName (http://www.color.org) /PDFXTrapped /Unknown
/Description >>> setdistillerparams> setpagedevice