The Network Layer - - PDF document

the network layer
SMART_READER_LITE
LIVE PREVIEW

The Network Layer - - PDF document

r


slide-1
SLIDE 1

29 March, 2002 1

The Network Layer

Computer Communication Course Computer Communication Course

2 29 March, 2002 The Computer Communications Course

Why do We Need Network Layer?

  • ✁✄✂✆☎✞✝
✟✡✠☞☛ ✌✍✟✎✌✞✏✎✑✒✂✞✓✕✔✗✖✡✘✞✟✙☎✡✌✚✓✎✛✎✌✜✘✚☛ ☛✚✝ ✟✡✏✎✌✚✓✡✖✎✂✚✟✢✟✎✌✚✖✕✏✢✝ ✟✡✠✜✟✎✌✞✌✚✣✤☎ ✥ ✦✤✧★✁✄☎✞✩✢✪✕✘✢☎✕✏✬✫✞✭✢✏✗☛ ✂✚✖✎✘✚☛ ✮✕☎✢✖✡✘✚☛ ✘✚✫☞✝ ☛ ✝ ✏ ✯✱✰✢✓ ✂✚✫✲☛ ✌✚✳★☎
  • ✁✄✂✆☎✞✝
✟✡✠☞☛ ✌✴✦✤✧★✁✵✖✡✘✞✟✙☎✡✌✚✓✎✛✎✌✜✘✚☛ ☛✢✭✕☎✡✌✚✓ ☎ ✥ ✶✚✏✡✷✤✌✚✓✕✟✎✌✞✏✤✮✢✸✹✂✚✔✡✌☞✟✗✺✒✝ ✟✡✠✚✮✞✻✤✘✢☎✕✏✬✶✚✏✕✷✢✌☞✓✡✟✎✌✚✏✢✮✢✼✜✯✞✓✕✝ ✟✎✌✞✏✢✮✕✌✞✏✡✖✤✽
  • ✾☞✟✡✏
✌☞✓✎✖✡✂✚✟✢✟✎✌✚✖✕✏✢✝ ✟✡✠✜✦✤✧★✁✄☎✞✩ ✥ ✿✒✘✤✳★✌✴✦✤✧★✁✄☎✞✩✤✭✕☎✡✌✍✫✞✓✢✝ ✣✞✠✕✌✤☎ ✥ ❀❁✝ ✪✕✪✕✌✚✓ ✌☞✟✡✏✬✦✤✧★✁✄☎✞✩✚✽ ✽ ✽ ❂ ❃ ❀❁✝ ✪✕✪✕✌✚✓ ✌☞✟✡✏✄✪✤✓ ✘✤✳★✌✜✪✕✂✞✓✡✳★✘✢✏ ☎✞✮✕✘✤✣✚✣☞✓ ✌✤☎✡☎✞✝ ✟✡✠✬☎✤✖✕✷✤✌✚✳★✌✤☎✞✮✕✌✞✏✡✖
  • ❄❅☎✡✌✚✓
☎✆✣✤✌✤☎✞✝ ✓ ✌✱✭✤✟✤✝ ✪✕✂✞✓✡✳❆☎✡✌☞✓ ✛✤✝ ✖✎✌✹✩✢✘✕☎✗✏✡✷✢✂✤✭✢✠✤✷✜✏✕✷✢✌☞✓ ✌✹❇ ☎✙✂✚✟✤☛ ✯✗✘✗☎✞✝ ✟✡✠☞☛ ✌ ✰✤✷✢✯✢☎✞✝ ✖✎✘✚☛✞✟✎✌✞✏✡✑✒✂✞✓✡✔✆❈ ✦✤✧★✁✬❉ ✩ ✥ ✁✄✂❊✟✎✌✞✌✚✣✱✏ ✂✴☛ ✝ ✟✢✔✬✏ ✂✱✖✎✌☞✟✡✏✕✓ ✘☞☛✢✰✕✂☞✝ ✟✡✏ ✥ ✶✞✘✢☎✡✯✆✭✕☎✡✘✢✠✕✌✹✩✚✟✎✂✱✟✎✌✞✌✚✣✱✏ ✂✱✔✤✟✎✂✤✑❋✏ ✂✞✰✡✂✲☛ ✂✤✠✕✯

3 29 March, 2002 The Computer Communications Course

Interconnection through Switching Elements

  • ✿✒✂☞☛
✭✢✏✢✝ ✂✚✟✤✩✢✾☞✟✡✏ ✌☞✓✡✖✎✂✚✟✢✟✎✌✚✖✕✏✙✦✞✧❁✁✙☎✬✭✕☎✞✝ ✟✡✠
  • ☞❍✒■
❏ ❑✕▲✚■ ▼ ◆✍❖✚P ❖✤◗✙❖✚▼✹❏
  • ✿❅✑★✝
✏✡✖✢✷☞✝ ✟✡✠✗✌✲☛ ✌☞✳★✌☞✟✡✏ ☎✗✏✡✓ ✘✞✟✎☎✡✪✕✌☞✓✙✣✤✘✢✏✎✘✬✪✞✓ ✂✞✳❘✂✚✟✎✌✍✟✎✌✞✏✎✑✒✂✞✓✕✔✬✏ ✂ ✘✞✟✎✂✤✏✕✷✢✌☞✓ ✥ ❙✡✂✢☎✡☎✞✝ ✫✲☛ ✯✜✣✹✝ ✪✕✪✕✌☞✓ ✌✲✟✡✏✬✟✎✌✚✏✎✑✒✂✞✓✕✔✡☎ ✥ ✺☞✂✤✭✕✏✢✝ ✟✡✠✴☛ ✂✤✠✚✝ ✖✜✝ ☎✱✝ ✟✬✏✡✷✢✌✜☎✕✑★✝ ✏✡✖✕✷✲✝ ✟✡✠✬✌✹☛ ✌✚✳★✌✲✟✡✏ ☎
  • ✿❅✑★✝
✏✡✖✢✷☞✝ ✟✡✠✗✌✲☛ ✌☞✳★✌☞✟✡✏ ☎✞✩✤❚✒✘✤✏ ✌✞✑✒✘✢✯✕☎✗❯✆✺✚✂✤✭✢✏ ✌✚✓ ☎✗❯✆✧❁✸❅✼❱☎✕✑★✝ ✏✡✖✕✷✤✌✤☎ ✥ ✧❆✰✕✂✤✑✒✌✚✓ ✪✢✭✚☛✢✖✡✂✞✳✙✰✢✭✕✏ ✌☞✓✙❈ ✾✚❙✬✠✢✘✢✏ ✌✞✑✒✘✢✯✤❯✢✓ ✂✤✭✢✏ ✌✚✓✡❉ ✥ ✧❆✰✢✭✤✓ ✌✴✷✤✘✤✓✡✣✞✑✒✘✞✓ ✌✴✣✤✌✚✛✤✝ ✖✡✌✴❈ ✳★✂✞✣✤✌✚✓✕✟✄✾✚❙✆✓ ✂✤✭✢✏ ✌☞✓ ☎✚✮✢✧★✸❅✼✱❉

4 29 March, 2002 The Computer Communications Course

Hosts and the Subnet

Subnet Router LAN Host

5 29 March, 2002 The Computer Communications Course

The Network Layer Functions

  • ✺☞✂✤✭✕✏✢✝
✟✡✠✚✩✞✳★✂✤✛✎✌✴✰✕✘✤✖✤✔✎✌✚✏ ☎✙✪✤✓ ✂✞✳❘☎✡✂✤✭✢✓✡✖✡✌✜✏✎✂✜✣✤✌✞☎✕✏✢✝ ✟✎✘✤✏✢✝ ✂☞✟✬✷✤✂✢☎✕✏ ☎ ✥ ✖✕✷✤✂✢✂✢☎✡✌✜✘✜✰✕✘✢✏✡✷✱❈ ❲✡❳✢❨✒❏ ❖ ❉✒✏✡✷✞✓ ✂✤✭✢✠✤✷✜✏✕✷✢✌✴✓ ✂✤✭✕✏✎✌✚✓ ☎ ✥ ✳★✘✕✯✜✓ ✌✚❩✕✭✚✝ ✓ ✌✴✳★✘✞✔✞✝ ✟✡✠✆✳★✘✚✟✎✯✜✷✤✂✞✰✡☎✬✘✢✏✆✝ ✟✡✏✎✌✚✓✡✳★✌✚✣✲✝ ✘✢✏ ✌✴✓ ✂✤✭✢✏ ✌✚✓ ☎ ✥ ✷✤✘✞✟✕✣✲☛ ✌☞✣✍✫✢✯✆✏✡✷✤✌✴✓ ✂✤✭✕✏✎✌✚✓ ☎✞✩ ❃ ✷✤✘✤✓✡✣✚❬ ✑★✝ ✓ ✌✚✣✱❯✬✂✚✟✕✖✎✌☞❬ ✰✕✌✚✓✡❬ ✖✎✂✚✟✢✟✎✌☞✖✡✏✢✝ ✂✚✟✙❯✆✰✕✌✚✓✡❬ ✰✕✘✤✖✤✔✎✌✚✏
  • ❭✚✂✚✟✡✠✢✌✤☎✕✏✢✝
✂✚✟✬✖✡✂✚✟✡✏✡✓ ✂☞☛ ✥ ✖✎✂✚✟✡✠✢✌✤☎✕✏✢✝ ✂✚✟✬✰✤✓ ✌✞✛✎✌✲✟✡✏✢✝ ✂✚✟✙✘✞✟✕✣✴✣✤✌✚✏ ✌✚✖✕✏✢✝ ✂✚✟
  • ❪✱✭✕✘✚☛
✝ ✏ ✯✗✂✢✪✜✿✹✌☞✓✎✛✤✝ ✖✡✌ ✥ ✓ ✌✲☛ ✝ ✘✞✫✲✝ ☛ ✝ ✏ ✯☞✮✕✏✤✝ ✳✗✝ ✟✡✠☞✮✤✫✤✘✞✟✕✣✚✑★✝ ✣✚✏✡✷☞✮✞✽ ✽ ✽
  • ❫✬✝
✣✲✝ ✟✡✠✜✦✤✧★✁✵✷✤✌✞✏ ✌☞✓ ✂✤✠✕✌☞✟✎✌✹✝ ✏ ✯☞✩ ✥ ✭✞✟✤✝ ✪✕✂✞✓✡✳❘✘✤✣✚✣✚✓ ✌✞☎✡☎✞✝ ✟✡✠✗☎✢✖✢✷✢✌☞✳★✌ ✥ ✣✤✌✞✘✚☛ ✝ ✟✡✠✆✑★✝ ✏✡✷✱✣✹✝ ✪✕✪✕✌☞✓ ✌✲✟✡✏★✪✤✓ ✘✞✳❁✌✜✪✕✂✞✓✡✳★✘✢✏✎☎

6 29 March, 2002 The Computer Communications Course

The Network Layer: End to End Service

Transport Network Data Link Physical Transport Network Data Link Physical

❴ ❵✲❛✡❜✬❝❞❜✡❡ ❢☞❣✕❤ ✐✙❥ ❦ ❧✡❜✢❤❞♠ ❣✕♥ ❡✎❤ ❣✢❥ ♦❅❡ ❛✕❜✬♠ ❣✢♣❞♣❅q✎♥✕r ♠ ❦ ❡✡r ❣✕♥★♦ q✡s✢♥ ❜✡❡❞❦✡♥✎t✬✉✕❤ ❣✕✈✎r t✕❜✢♦❅❡ ❛✕❜ r ♥ ❡ ❜✢❤ ✇ ❦✕♠ ❜✄❡ ❣★❡ ❛✕❜✬♠ ❣✕♣❞♣❅q✡♥✕r ♠ ❦✎❡✡r ❣✕♥★♦ q✡s✢♥ ❜✡❡❞❡ ❣★❡ ❛✕❜✙❛✞r ①✕❛✕❜✢❤❁❥ ❦ ❧✡❜✢❤ ♦ ❴ ❵✲❛✡❜✬❝❞❜✡❡ ❢☞❣✕❤ ✐✙❥ ❦ ❧✡❜✢❤❁r ♦❞❡ ❛✡❜ ② ③✢④✤⑤✕⑥✢⑦ ❥ ❦ ❧✡❜✢❤✒❡ ❛✕❦✎❡❞t✢❜✡❦✢❥ ♦❞❢✒r ❡ ❛✄❡ ❛✕❜ ⑧✢③ ⑥✤⑦ ⑨ ⑦ ③✕⑨ ⑧✕③✎⑥✢⑦ ❡✎❤ ❦✡♥✎♦✎♣❁r ♦ ♦✡r ❣✕♥ ❴ ❵✲❛✡❜✬❝❞❜✡❡ ❢☞❣✕❤ ✐✙❥ ❦ ❧✡❜✢❤❁r ♥✎✈ ❣✢❥ ✈ ❜✕♦ ⑤✢⑩✡❶ ⑧✬⑩ ❷✕❸✄⑤✹❹ ⑤✢❺ ❻ ❛✡❣✕♦ ❡❞❦✡♥✎t✗❤ ❣✡q ❡ ❜✤❤❁r ♥❁❡ ❛✕❜✙♥✎❜✡❡ ❢☞❣✕❤ ✐
slide-2
SLIDE 2

7 29 March, 2002 The Computer Communications Course

Network Layer Design Issues

✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠
✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠
✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠
✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠
✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠
✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠
✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠
✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠ ✟ ☛ ☛ ✠ ✡ ✎ ✟ ✂ ✡ ☎
✆ ✟
☛ ☎ ✆ ✂
✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠ ✟ ☛ ☛ ✠ ✡ ✎ ✟ ✂ ✡ ☎
✆ ✟
☛ ☎ ✆ ✂
✂ ✄ ☎ ✆ ✝ ✞ ✟ ✂ ✟ ✠ ✡
☛ ☞ ✌ ✍ ✡ ✎ ✟ ✠
  • ✁✄✌✚✏✎✑✒✂✞✓✕✔✙☎✡✌✚✓✎✛✤✝
✖✎✌✤☎✬☎✢✷✤✂✤✭✞☛ ✣✴✫✤✌ ✁✄✌✚✏✎✑✒✂✞✓✕✔✙☎✡✌✚✓✎✛✤✝ ✖✎✌✤☎✬☎✢✷✤✂✤✭✞☛ ✣✴✫✤✌ ✝ ✟✢✣✤✌✚✰✕✌☞✟✕✣✤✌✲✟✡✏★✂✢✪✆✏✡✷✤✌✜☎✕✭✤✫☞✟✎✌✞✏ ✝ ✟✢✣✤✌✚✰✕✌☞✟✕✣✤✌✲✟✡✏★✂✢✪✆✏✡✷✤✌✜☎✕✭✤✫☞✟✎✌✞✏ ✏ ✌✚✖✢✷✚✟✡✂☞☛ ✂✤✠✕✯ ✏ ✌✚✖✢✷✚✟✡✂☞☛ ✂✤✠✕✯
  • ✸❅✷✤✌✜✏✕✓
✘✚✟✎☎✢✰✕✂✞✓ ✏✆☛ ✘✢✯✕✌☞✓★☎✢✷✤✂✤✭✞☛ ✣✴✫✤✌ ✸❅✷✤✌✜✏✕✓ ✘✚✟✎☎✢✰✕✂✞✓ ✏✆☛ ✘✢✯✕✌☞✓★☎✢✷✤✂✤✭✞☛ ✣✴✫✤✌ ☎✢✷✲✝ ✌✹☛ ✣✤✌✚✣✜✪✤✓ ✂✞✳❘✏✡✷✤✌✍✟✡✭✤✳✬✫✢✌✚✓✢✮✢✏ ✯✞✰✡✌✹✮ ☎✢✷✲✝ ✌✹☛ ✣✤✌✚✣✜✪✤✓ ✂✞✳❘✏✡✷✤✌✍✟✡✭✤✳✬✫✢✌✚✓✢✮✢✏ ✯✞✰✡✌✹✮ ✘✞✟✕✣✱✏ ✂✞✰✕✂☞☛ ✂✤✠✢✯✗✂✢✪✗✏✕✷✢✌✜☎✕✭✞✫✚✟✎✌✚✏ ☎ ✘✞✟✕✣✱✏ ✂✞✰✕✂☞☛ ✂✤✠✢✯✗✂✢✪✗✏✕✷✢✌✜☎✕✭✞✫✚✟✎✌✚✏ ☎ ✰✤✓ ✌✞☎✡✌☞✟✡✏ ✰✤✓ ✌✞☎✡✌☞✟✡✏
  • ✸❅✷✤✌✴✟✡✌✞✏✎✑✒✂✞✓✕✔✙✘✤✣☞✣✚✓
✌✤☎✡☎✡✌✞☎✙✘✤✛✎✘✚✝ ☛ ✘✞✫✲☛ ✌ ✸❅✷✤✌✴✟✡✌✞✏✎✑✒✂✞✓✕✔✙✘✤✣☞✣✚✓ ✌✤☎✡☎✡✌✞☎✙✘✤✛✎✘✚✝ ☛ ✘✞✫✲☛ ✌ ✏ ✂✜✏✡✷✢✌✱✏✡✓ ✘✚✟✎☎✢✰✡✂✞✓✎✏✆☛ ✘✕✯✢✌✚✓✄☎✢✷✢✂✤✭✚☛ ✣✱✭✕☎✡✌ ✏ ✂✜✏✡✷✢✌✱✏✡✓ ✘✚✟✎☎✢✰✡✂✞✓✎✏✆☛ ✘✕✯✢✌✚✓✄☎✢✷✢✂✤✭✚☛ ✣✱✭✕☎✡✌ ✭✞✟✤✝ ✪✕✂✞✓✡✳ ✟✡✭✢✳✬✫✤✌✚✓✢✝ ✟✡✠✜✰✚☛ ✘✚✟✄✘✤✖✢✓ ✂✢☎✡☎ ✭✞✟✤✝ ✪✕✂✞✓✡✳ ✟✡✭✢✳✬✫✤✌✚✓✢✝ ✟✡✠✜✰✚☛ ✘✚✟✄✘✤✖✢✓ ✂✢☎✡☎ ✦✤✧★✁✄☎✬✘✞✟✕✣✑✏❆✧★✁✄☎✤✽ ✦✤✧★✁✄☎✬✘✞✟✕✣✑✏❆✧★✁✄☎✤✽

8 29 March, 2002 The Computer Communications Course

The Network Layer Service Paradigms

❴ ❭✚✂✚✟✢✟✎✌✚✖✡✏✤✝ ✂✚✟✕❬ ✂✞✓✢✝ ✌☞✟✡✏✎✌✚✣✲✩ ✥ ✖✎✂✚✟✢✟✡✌✚✖✡✏✢✝ ✂✚✟✬✳✄✭✕☎✕✏✗✫✢✌✜☎✡✌✚✏✄✭✤✰✆✰✤✓✢✝ ✂✞✓✄✏ ✂✱✖✎✂✞✳✙✳✄✭✞✟✤✝ ✖✡✘✢✏✢✝ ✂✚✟ ✫✤✌✞✏✎✑✒✌✤✌✲✟✬✰✕✌✤✌☞✓ ☎ ✥ ❩✢✭✡✘☞☛ ✝ ✏✎✯✗✂✢✪✬☎✡✌☞✓✎✛✤✝ ✖✡✌✱❈ ❪✜✂✚✿❅❉✹✘✞✟✕✣✴✖✎✂✢☎✕✏✆✝ ☎✜✟✎✌✞✠✢✂✤✏✢✝ ✘✤✏ ✌✚✣✱✑❞✷✤✌☞✟ ✏✡✷✤✌✴✖✎✂✚✟✢✟✎✌✚✖✕✏✢✝ ✂✚✟✜✝ ☎✬☎✡✌✞✏✙✭✤✰ ✥ ✪✢✭✚☛ ☛✤✣✞✭✤✰✞☛ ✌✓✒✹✮✕✂✞✓✎✣✞✌✚✓ ✌✚✣✴✖✎✂✞✳✙✳✄✭✞✟✤✝ ✖✡✘✢✏✢✝ ✂✚✟ ✥ ✪✚☛ ✂✤✑ ✖✎✂✚✟✡✏✡✓ ✂☞☛✤✰✤✓ ✌✚✛✎✌☞✟✡✏ ☎✬✪✕✘✕☎✕✏✄☎✡✌✲✟✕✣✤✌✚✓ ☎✬✪✤✓ ✂✞✳❘☎✕✑✒✘✤✳✙✰✚✝ ✟✡✠✬☎✞☛ ✂✤✑ ✓ ✌✚✖✡✌✲✝ ✛✎✌☞✓ ☎ ✥ ✂✞✰✢✏✢✝ ✂✚✟✎✘☞☛ ☛ ✯✜❈ ✣✞✌✚✰✕✌☞✟✕✣✲✝ ✟✡✠✗✂✚✟✙✏✡✷✤✌✴✖✕✷✤✂✢☎✡✌☞✟✬❪✜✂✞✿❞❉✹✠✢✭✕✘✤✓ ✘✚✟✡✏ ✌✤✌☞✣ ✣✤✌✹☛ ✝ ✛✎✌☞✓ ✯☞✮✤✖✎✂✚✟✎✪✚✝ ✓✡✳★✘✢✏✢✝ ✂✚✟✄✂✢✪✜✣✤✌✲☛ ✝ ✛✎✌✚✓ ✯☞✮✤✰✢✓✢✝ ✂✚✓✕✝ ✏✢✝ ✌✞☎✗✳★✘✢✯✱✫✢✌ ✰✤✓ ✂✞✛✤✝ ✣✤✌☞✣ ✥ ✏✡✷✤✌✴✖✎✂✞✳✙✰✚☛ ✌✔✒✹✝ ✏ ✯✴✝ ☎✗✰✢✭✢✏✗✝ ✟✙✏✡✷✤✌✍✟✎✌✞✏✎✑✒✂✞✓✕✔✜☛ ✘✢✯✢✌✚✓✙❈ ☎✕✭✞✫☞✟✎✌✞✏✡❉

9 29 March, 2002 The Computer Communications Course

The Network Layer Service Paradigms

  • ❭✚✂✚✟✢✟✎✌✚✖✕✏✢✝
✂✚✟✤☛ ✌✤☎✡☎✞✩ ✥ ✟✎✂✱✖✎✂✚✟✢✟✎✌✚✖✕✏✢✝ ✂✚✟✙☎✡✌✞✏✡✭✢✰ ✥ ✟✎✂✱✰✡✘✞✖✢✔✡✌✞✏✄✂✞✓✎✣✞✌✚✓✢✝ ✟✡✠ ✥ ✟✎✂✆✪✚☛ ✂✤✑❋✖✡✂✚✟✡✏✡✓ ✂☞☛ ✥ ✰✕✘✤✖✢✔✡✌✚✏✗☛ ✂✢☎✡☎✗❯✆✣✞✭✤✰✚☛ ✝ ✖✡✘✢✏✢✝ ✂✚✟✆✝ ☎✙✘☞☛ ☛ ✂✤✑✒✌✚✣ ✥ ✏✡✷✤✌ ✕✞❖✕●❅❏✲❖✗✖✘✖ ❳✢❲☞❏ ✣✤✌✲☛ ✝ ✛✎✌✚✓ ✯✗☎✡✌☞✳★✘✞✟✡✏✢✝ ✖✎☎ ✥ ✝ ✟✕✏ ✌✚✓ ✪✕✘✤✖✡✌✲✩✞✿❁✶☞✁✆❀✚✙❅❙✢✧❁❭✜✛✚✶☞✸❁✮✤✺✒✶✚❭✹✶✞✾✣✢✹✶✤✙❞❙✕✧❁❭✜✛☞✶☞✸ ✥ ✏✡✷✤✌✴✖✎✂✞✳✙✰✚☛ ✌✔✒✹✝ ✏ ✯✴✝ ☎✗✰✢✭✢✏✗✝ ✟✙✏✡✷✤✌✱✏✡✓ ✘✞✟✎☎✢✰✕✂✞✓✎✏✗☛ ✘✕✯✢✌✚✓✙❈ ✷✤✂✢☎✕✏ ☎✢❉

10 29 March, 2002 The Computer Communications Course

Subnet Structure: Virtual Circuits

❴ ✥✚❣✕q✡❤ ♠ ❜✘✦ ❡ ❣✘✦ t✢❜✕♦ ❡✎r ♥✎❦ ❡✡r ❣✕♥★✉ ❦✎❡ ❛✗s✡❜✕❛✕❦✡✈ ❜✕♦❁♣❅q✕♠ ❛✆❥ r ✐ ❜ ⑦ ⑤✢② ⑤ ✧✤⑧✢③ ❷✎⑤✬❶✩★ ❺ ❶ ✪✫★ ⑦ ❴ ✬✙❣✕❤ ❜✙♦ q✢r ❡ ❦✕s✤❥ ❜✙✇ ❣✕❤❞♠ ❣✕♥✎♥ ❜✢♠ ❡✡r ❣✡♥❁❣✢❤ r ❜✕♥✎❡ ❜✢t✬♦ ❜✢❤ ✈✡r ♠ ❜ ❴ ✭✢❦✢❥ ❥✡♦ ❜✕❡ q✎✉✯✮ ❡ ❜✕❦✡❤ ✦ t✕❣✕❢✲♥★✇ ❣✢❤✒❜✡❦✕♠ ❛✬♠ ❦✢❥ ❥ ✰✕⑤✣✱ ③✡❺ ⑤ t✢❦ ❡ ❦✙♠ ❦✡♥★✇✡❥ ❣✡❢ ❴ ❜✡❦✕♠ ❛✬✉ ❦✕♠✎✐ ❜✕❡❁s✕❜✤❥ ❣✡♥ ①✢♦❅❡ ❣✄♦ ❣✕♣✒❜✳✲✔✭✬❦✡♥✎t✗♠ ❦✕❤ ❤ r ❜✕♦❁♦ ❛✕❣✕❤ ❡✴✲✓✭✜r t✢❜✕♥ ❡✡r ✇✕r ❜✢❤✶✵ ♥ ❣✡❡❞t✢❜✕♦ ❡ ❛✕❣✡♦ ❡✜✷✓✸✣✹ ❴ ✺❅❥ ❥✡✉✎❦✡♠✎✐ ❜✕❡ ♦★r ♥❁❦✄✈✎r ❤ ❡ q ❦✢❥✡♠✡r ❤ ♠ q✕r ❡❞❦✕❤ ❜✬❤ ❣✕q ❡ ❜✕t✬❣✡♥❁❡ ❛✕❜✙♦ ❦✕♣✒❜✬✉ ❦✎❡ ❛ ❴ ⑤✲❹ ⑤✕❺ ❻ ❤ ❣✡q ❡ ❜✤❤✒❣✡♥★♦ ❣✡q✡❤ ♠ ❜✯✦ t✢❜✕♦ ❡❞✉✎❦✎❡ ❛✬♣✒❦✢r ♥ ❡ ❦✢r ♥✎♦✶✻ ♦ ❡ ❦✎❡ ❜✘✼ ✇ ❣✢❤✒❜✡❦✕♠ ❛✙✉✎❦✡♦ ♦✎r ♥ ① ♠ ❣✡♥✎♥✎❜✢♠ ❡✡r ❣✡♥ ✽ ❡✎❤ ❦✡♥✎♦ ✉ ❣✢❤ ❡ ✦ ❥ ❦ ❧✡❜✢❤❞♠ ❣✕♥✎♥ ❜✢♠ ❡✡r ❣✡♥❁❣✕♥✕❥ ❧✗r ♥✡✈ ❣✤❥ ✈ ❜✕t✙❡ ❢☞❣★❜✢♥✎t✬♦ ❧✕♦ ❡ ❜✤♣❅♦ ❴ ✾✢❣✡q✎❡ ❜✤❤❞♠✎❤ ❦✡♦ ❛✙❡ ❜✢❤ ♣★r ♥✎❦ ❡ ❜✢♦❅❦✢❥ ❥✘✲✔✭✤♦❁✉ ❦✡♦ ♦✎r ♥ ①✙❡ ❛✤❤ ❣✕q ①✕❛✆r ❡ ❴ ❥ r ♥✕✐✘✮✡❤ ❣✡q ❡ ❜✤❤❞❤ ❜✕♦ ❣✡q✡❤ ♠ ❜✢♦✴✵ s✕❦✡♥✎t✢❢✒r t✕❡ ❛✔✮✡s✢q✎✇ ✇ ❜✢❤ ♦ ✹✲♣✒❦ ❧✬s✡❜✬⑩✎② ② ③✡❶ ⑩✤⑦ ⑤✢❸✄❡ ❣✿✲✓✭ ❴ ❀✎❣✕♥ ①❁✲✓✭✬♦ ❜✡❡ q✎✉★❡✡r ♣✒❜ ❴ ✥✹❥ ❣✡❢✍❤ ❜✢♦ ✉✎❣✡♥✡♦ ❜✄❡ ❣✄❡ ❤ ❦✎✇✎✇✡r ♠❁✉✎❦✎❡ ❡ ❜✤❤ ♥✄♠ ❛✕❦✎♥ ①✡❜

11 29 March, 2002 The Computer Communications Course

Virtual Circuits: Signaling Protocols

  • ✭✕☎✡✌✚✣✱✏
✂✆☎✡✌✞✏✎✭✤✰✚✮✢✳★✘✚✝ ✟✡✏ ✘☞✝ ✟✵✏ ✌✤✘✞✓✡❬ ✣✤✂✤✑★✟✳✢✲❭
  • ✭✕☎✡✌✚✣
✝ ✟✗✧★✸❅✼✍✮✕✪✤✓ ✘✞✳★✌✚❬ ✓ ✌✲☛ ✘✕✯☞✮✯❂✄✽ ❃✚❄
  • ✟✎✂✤✏✙✭✡☎✕✌✚✣
✝ ✟✬✏ ✂✞✣✤✘✕✯☞❇ ☎✬✾☞✟✡✏ ✌✚✓✕✟✎✌✞✏ ✘✤✰✤✰✚☛ ✝ ✖✡✘✢✏✢✝ ✂✚✟ ✏✡✓ ✘✞✟✎☎✢✰✕✂✞✓✎✏ ✟✎✌✞✏✡✑✒✂✞✓✡✔ ✣✤✘✤✏ ✘✴☛ ✝ ✟✢✔ ✰✤✷✢✯✢☎✞✝ ✖✎✘✚☛ ❅ ❆ ✷✤♥✕r ❡✡r ❦ ❡ ❜✗♠ ❦✢❥ ❥ ❇ ❆ ✷✢♥✡♠ ❣✢♣❁r ♥ ①✬♠ ❦✢❥ ❥ ❈✤❆ ✺✒♠ ♠ ❜✢✉ ❡★♠ ❦✢❥ ❥ ❉✓❆ ✭✢❦✢❥ ❥✕♠ ❣✕♥✎♥ ❜✤♠ ❡ ❜✢t ❊✤❆ ✸✚❦✎❡ ❦✄✇✡❥ ❣✡❢✍s✡❜✡①✤r ♥✎♦ ❋ ❆ ✾✢❜✢♠ ❜✤r ✈ ❜✙t✕❦✎❡ ❦ ✘✤✰✤✰✚☛ ✝ ✖✡✘✢✏✢✝ ✂✚✟ ✏✡✓ ✘✞✟✎☎✢✰✕✂✞✓✎✏ ✟✎✌✞✏✡✑✒✂✞✓✡✔ ✣✤✘✤✏ ✘✴☛ ✝ ✟✢✔ ✰✤✷✢✯✢☎✞✝ ✖✎✘✚☛ ❡✎❤ ❦✡♥✎♦ ✉ ❣✢❤ ❡ ❡✎❤ ❦✡♥✎♦ ✉ ❣✢❤ ❡ ❦✡✉✡✉✕❥ r ♠ ❦ ❡✡r ❣✕♥ ❦✡✉✡✉✕❥ r ♠ ❦ ❡✡r ❣✕♥

12 29 March, 2002 The Computer Communications Course

Routing in VC Subnets

  • The routing table of each intermediate node is a translation table

from the pair (Linein, VCin) to (Lineout, VCout)

  • When a packet arrives, the node puts VCout in the packet’s VC

field, and send the packet on the designated output line

slide-3
SLIDE 3

13 29 March, 2002 The Computer Communications Course

Routing Tables in VC Subnets

A B C D I B 1 C 1 A 1 C 2 A 2 D 1 A B C D I B 1 C 1 A 1 C 2 A 2 D 1

14 29 March, 2002 The Computer Communications Course

Some VC Design Issues

  • Choosing connection number

each router chooses VC numbers independently

ambiguities should be avoided

  • When should VCs be released?

Each process is required to indicate when it stops using VC

In public networks VC release is enforced by charging for the connect time

  • How should the VC setup packet be routed?

Use the datagram routing tables (see next slides)

15 29 March, 2002 The Computer Communications Course

Choosing Connection Numbers for Full-Duplex Communication (III)

A B C D D 2 => B 1 B 1 => D 2 B 1 = > ??? 1 1 X Y C 3 => A 1 A 1 => C 3 A 1 => ??? 2 3

16 29 March, 2002 The Computer Communications Course

Choosing Connection Numbers for Full-Duplex Communication (II)

A B C D 3 2 X Y D 2 => B 1 B 1 => D 2 C 3 => A 1 A 1 => C 3 1 1

17 29 March, 2002 The Computer Communications Course

Choosing Connection Numbers for Full-Duplex Communication (III)

A B C D D 2 => B 1 B 1 => D 2 B 1 = > ??? 1 1 X Y C 3 => A 1 A 1 => C 3 A 1 => ??? 2 3

18 29 March, 2002 The Computer Communications Course

Subnet Structure: Datagram Subnets

  • ✼✆✂✞✓
✌✜☎✕✭✚✝ ✏ ✘✚✫☞☛ ✌✆✪✕✂✚✓✙✖✎✂✚✟✢✟✎✌☞✖✡✏✢✝ ✂✚✟✤☛ ✌✤☎✡☎✬☎✡✌✚✓✎✛✤✝ ✖✎✌✤☎
  • ✁✄✂✱✖✎✘☞☛
☛✡☎✡✌✚✏✎✭✤✰✬✂✤✛✎✌✚✓✡✷✤✌✤✘✤✣
  • ✶✞✘✞✖✕✷✱✰✕✘✤✖✤✔✎✌✚✏✗✝
☎✗✓ ✂✤✭✢✏ ✌✚✣✜☎✡✌✚✰✕✘✤✓ ✘✤✏ ✌✲☛ ✯ ✥ ❙✡✘✤✖✤✔✎✌✚✏ ☎✙☎✢✷✤✂✤✭✚☛ ✣ ✝ ✟✕✖✞☛ ✭✢✣✞✌✆✪✤✭✞☛ ☛✕☎✡✂✤✭✤✓✡✖✎✌✜✘✞✟✕✣✴✣✤✌✞☎✕✏✢✝ ✟✎✘✤✏✢✝ ✂☞✟ ✘✤✣☞✣✚✓ ✌✤☎✡☎ ✥ ✰✕✘✤✖✢✔✡✌✚✏ ☎✬✏ ✯✞✰✚✝ ✖✡✘✚☛ ☛ ✯✱✓ ✂✤✭✢✏ ✌☞✣✜✭✕☎✞✝ ✟✡✠✆✣✞✌✤☎✕✏✢✝ ✟✎✘✢✏✢✝ ✂✚✟✬✷✤✂✢☎✕✏✄✾✲❀ ✥ ✰✕✘✤✖✢✔✡✌✚✏ ☎✆✫✤✌✞✏✎✑✒✌✞✌☞✟✙☎✡✘✤✳★✌✜☎✡✂✤✭✤✓✎✖✡✌✚❬ ✣✤✌✤☎✕✏✬✰✕✘✚✝ ✓✙✳★✘✕✯✆✏ ✘✚✔✡✌ ✣✲✝ ✪✕✪✕✌✚✓ ✌☞✟✡✏✬✰✕✘✢✏✡✷✤☎
✂✤✭✢✏ ✌✚✓ ☎✞✩✚✟✎✂✗☎✕✏✎✘✢✏ ✌✜✘✞✫✤✂✤✭✢✏★✌✲✟✕✣✚❬ ✏ ✂✞❬ ✌✲✟✕✣✱✖✡✂✚✟✢✟✎✌✚✖✕✏✢✝ ✂✚✟✎☎ ✥ ✟✎✂✴✟✎✌✞✏✎✑✒✂✞✓✕✔✢❬ ☛ ✌✚✛✎✌✲☛✤✖✎✂✚✟✕✖✡✌✚✰✢✏★✂✢✪✁ ✖✎✂✚✟✢✟✎✌☞✖✡✏✢✝ ✂✚✟✄✂ ✥ ☎✗✟✤☛ ✯✱✰✡✘✞✖✢✔✡✌✞✏ ☎✱✝ ✟✙✘✱✟✎✂✞✣✤✌✜✘✤✓ ✌ ☛ ✂✢☎✕✏✙✑❞✷✢✌✲✟✙✏✡✷✤✌✍✟✎✂✞✣✤✌✴✖✕✓ ✘✕☎✤✷✢✌✞☎
slide-4
SLIDE 4

19 29 March, 2002 The Computer Communications Course

Datagram Networks: the Internet Model

✘✤✰✤✰✚☛ ✝ ✖✡✘✢✏✢✝ ✂✚✟ ✏✡✓ ✘✞✟✎☎✢✰✕✂✞✓✎✏ ✟✎✌✞✏✡✑✒✂✞✓✡✔ ✣✤✘✤✏ ✘✴☛ ✝ ✟✢✔ ✰✤✷✢✯✢☎✞✝ ✖✎✘✚☛ ✘✤✰✤✰✚☛ ✝ ✖✡✘✢✏✢✝ ✂✚✟ ✏✡✓ ✘✞✟✎☎✢✰✕✂✞✓✎✏ ✟✎✌✞✏✡✑✒✂✞✓✡✔ ✣✤✘✤✏ ✘✴☛ ✝ ✟✢✔ ✰✤✷✢✯✢☎✞✝ ✖✎✘✚☛ ❅ ❆ ✥☞❜✕♥✎t✬t✢❦✎❡ ❦ ❇ ❆ ✾✢❜✢♠ ❜✤r ✈ ❜✙t✕❦✎❡ ❦

20 29 March, 2002 The Computer Communications Course

C A B D E B B C E D B E E A A C E D D E E A E B B C E E E

Routing Tables in Datagram Subnets

  • ✶✞✘✞✖✕✷✴✟✎✂✞✣✤✌✴✷✤✂☞☛
✣✤☎✞✮✕✪✕✂✞✓★✌✞✘✤✖✢✷✱✣✤✌✤☎✕✏✢✝ ✟✎✘✢✏✢✝ ✂✚✟✆✟✎✂✞✣✤✌✲✮✢✏✡✷✤✌✴✟✡✭✤✳✬✫✤✌✚✓★✂✢✪ ✏✡✷✤✌✜✂✤✭✕✏✡✰✢✭✢✏✗☛ ✝ ✟✎✌✱✏✡✷✤✘✢✏✬✓ ✌✞✘✤✖✢✷✢✌✞☎✬✏✡✷✲✝ ☎✜✟✎✂✞✣✤✌ ❈ ▼✕❖✁★❏✒▲✤❳✄✂ ❉

21 29 March, 2002 The Computer Communications Course

Datagram Subnets Design Issues

  • ✺☞✂✤✭✕✏✢✝
✟✡✠✆✏ ✘✞✫✲☛ ✌✤☎✚✩ ✥ ☎✕✏ ✘✤✏✢✝ ✖✗✓ ✂✤✭✢✏ ✌✤☎ ✥ ✖✎✂✢☎✢✏✬✫✤✘✕☎✡✌☞✣✆✘✞✣✤✘✤✰✢✏✢✝ ✛✎✌✴✓ ✂✤✭✢✏ ✌✞☎✞✩✤✏ ✌✚✳✙✰✕✂✞✓ ✘✤✓ ✯✜✖✎✯✞✖✤☛ ✌✤☎✙✘✚✟✕✣ ✂✢☎✢✖✞✝ ☛ ☛ ✘✤✏✢✝ ✂✚✟✎☎✆✳★✘✕✯✆✂✞✖✕✖✡✭✤✓
  • ❭✚✂✚✟✡✠✕✌✞☎✕✏✢✝
✂✚✟✗✖✎✂✚✟✡✏✕✓ ✂☞☛ ✩ ✥ ✷✤✘✤✓✡✣✤✌✚✓✙✏✡✷✢✘✚✟✆✝ ✟✙✏✡✷✤✌ ✢☞❭ ✟✎✌✞✏✎✑✒✂✞✓✕✔✡☎✆✫✤✌✚✖✡✘✢✭✕☎✡✌✍✟✎✂✤✏✡✷✲✝ ✟✡✠✴✝ ☎ ✓ ✌✤☎✡✌☞✓ ✛✎✌☞✣ ✝ ✟✄✘✞✣✞✛✎✘✚✟✕✖✎✌ ✥ ✾✚❙✙☎✡✂☞☛ ✭✕✏✢✝ ✂✚✟✤✩✢✾✞❭✲✼✱❙✗❈ ✾☞✟✡✏✎✌✚✓✕✟✎✌✞✏✙❭✚✂✚✟✡✏✡✓ ✂☞☛✢✼✜✌✤☎✡☎✡✘✤✠✕✌✴❙✕✓ ✂✤✏ ✂✞✖✡✂☞☛ ❉

22 29 March, 2002 The Computer Communications Course

VC vs Datagram

VC subnet Datagram subnet Initial Setup Required None Addressing During Setup (parsing) Short VC # on each packet On each packet State information One per VC none Routing Route is chosen at setup. All packets follow this route Each packet is routed independently Effects of Router failure All VCs passing through this router are terminated None Congestion control Simple: allocate enough buffers at setup Difficult

23 29 March, 2002 The Computer Communications Course

Routing State vs. Bandwidth

  • ✾☞✟
✢☞❭✱✌✞✘✤✖✕✷✴✓ ✂✤✭✢✏ ✌☞✓✙✰✕✂✤✏ ✌☞✟✡✏✢✝ ✘✚☛ ☛ ✯✱✳✗✝ ✠✤✷✞✏✗✔✎✌✞✌✚✰✬☎✕✏ ✘✤✏ ✌✜✘✞✫✤✂✤✭✕✏✄✌✤✘✞✖✕✷ ✢☞❭✴✌✔✒✹✝ ☎✕✏✢✝ ✟✡✠✴✝ ✟✬✏✡✷✢✌✜☎✡✯✢☎✕✏ ✌✚✳
  • ❫❁✂✤✑✒✌✞✛✎✌☞✓✕✮✢✏✡✷✤✌✱✷✤✌✤✘✞✣✤✌✚✓✄✂✤✛✎✌✚✓✡✷✤✌✤✘✤✣
✝ ☎✜✟✎✌✞✠☞☛ ✝ ✠☞✝ ✫✲☛ ✌✴❈ ☎✢✷✤✂✞✓ ✏✳✢☞❭ ✟✡✭✤✳✬✫✢✌☞✓✎❉
  • ✾☞✟✜❀✹✘✢✏
✘✢✠✞✓ ✘✤✳❘✏✕✷✢✌✴✓ ✂✤✭✕✏✎✌✚✓★☎✕✏ ✘✤✏ ✌✜☎✞✝ ☎✕✌✴✣✤✂✢✌✞☎✆✟✎✂✤✏✬✣✤✌✚✰✕✌☞✟✕✣✜✂✚✟✬✏✡✷✢✌ ✟✡✭✤✳✬✫✢✌☞✓★✂✢✪✆✖✡✂✚✟✢✟✎✌✚✖✕✏ ✌✚✣✜✘✤✰✤✰✚☛ ✝ ✖✡✘✢✏✢✝ ✂✚✟✎☎
  • ❫❁✂✤✑✒✌✞✛✎✌☞✓✕✮✢✏✡✷✤✌✱✷✤✌✤✘✞✣✤✌✚✓✄✂✤✛✎✌✚✓✡✷✤✌✤✘✤✣✴✳✗✝
✠✞✷✤✏✗✫✤✌✱✷✲✝ ✠✞✷

24 29 March, 2002 The Computer Communications Course

Service X Subnet Structure

Upper layer Type of Subnet UDP over IP UDP over IP over ATM TCP over IP ATM AAL1 over ATM

Connectionless Connection-oriented Datagram Virtual Circuit