• Sonuç bulunamadı

(PART 1) Chapter 4: Network Layer 55490005

N/A
N/A
Protected

Academic year: 2021

Share "(PART 1) Chapter 4: Network Layer 55490005"

Copied!
14
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

Chapter 4: Network Layer (PART 1)

1

Computer Networking: A Top Down Approach 6th Edition

Jim Kurose, Keith Ross

(2)

Introduction

Virtual Circuit and Datagram Networks

What is inside a router?

Outline

(3)

Introduction

Network layer protocols run in every host and routers

Routers examine header fields in all IP datagrams

Two key network-layer functions

Forwarding: Move packets from router’s input to matching output

Routing: Determine route taken by packets

from source to dest.

(4)

Introduction

Conncection Setup

3rd important function in some network architectures

ATM, frame relay, X.25

Before datagrams flow, routers establish virtual connection.

Network layer: between two hosts

Transport layer: between two processes

(5)

Virtual Circuit and Datagram Networks

Datagram networks provides network- layer connectionless service

Virtual-circuit network provides network- layer connection service

Service: host-to-host

No choice

Implementation: in network core

(6)

Virtual Circuit and Datagram Networks

Virtual Circuits

Source-to-dest path behaves much like telephone circuit

Performance-wise

Network actions

Each packet carries VC identifier

Every router on source-dest path maintains state for each passing connection

Link and router resources may be allocated

to VC

(7)

Virtual Circuit and Datagram Networks

Virtual Circuits

A VC consists of:

Path from source to destination

VC numbers one number for each link along path

Entries in forwarding tables in routers along

path

(8)

Virtual Circuit and Datagram Networks

Datagram networks

No call setup at network layer

Routers: No state about end-to-end connections

Packets forwarded using destination host address

Longest prefix matching:

When looking for forwarding table entry for given destination address, use longest

address prefix that matches destination

address

(9)

Virtual Circuit and Datagram Networks

Datagram or VC network

Internet (datagram)

Data exchange among computers

Many link types

Smart end systems

ATM (VC)

Evolved from telephony

Strict timing, reliability requirements

Dumb end systems

(10)

What is inside a Router?

Routers has mainly four components

Router input ports

Router output ports

Routing processor

High-speed switching fabric

(11)

What is inside a Router?

Input port functions

Physical layer: Bit-level reception

Data link layer: Ethernet

Decentralized switching:

Complete input port processing at line speed

Lookup output port

Queuing

(12)

What is inside a Router?

Switching Fabrics

Move packet from input buffer to output buffer

Switching Rate: Rate at which packets can be transfer from inputs to outputs

Three types of switching fabrics

Memory

Bus

Interconnection Network

(13)

What is inside a Router?

Output Ports

Buffering required from fabric faster rate

Datagram can be lost because of congestion, lack of buffers

Scheduling

Priority scheduling – who gets best

performance

(14)

What is inside a Router?

Input port queuing

Queueing delay and loss due to input buffer overflow

Head-of-the-Line (HOL) blocking: Queued

datagram at front of queue prevents others

in queue from moving forward.

Referanslar

Benzer Belgeler

Patolojide T3 olarak evrelendirilen 25 hastanın 21’inde BT’de doğru T evrelemesi yapılmış olup, 3 hastada T4 olarak yorumlanarak ileri evreleme yapılmıştır.. Bir hastada

Türk edebiyatında şiirleri dillerde en çok dolaşan şairlerden biri olan Attilâ Ilhan, 80 yaşında hayata veda etti!. A ttilâ İlhan'ın dünya görüşünü benim­

“Adım sonbahar”, “Yağmur ka­ çağı” dediği gibi yine bir son­ baharda duyguların şairi için bugün, sonbaharda “Elde var hüzün” diyoruz.. Romancı,

it initiates the cooperative transmission of R-RTS for the next hop progress of the DATA packet. If a node does not receive a DATA packet after SIFS period following R-CTS

In this section, we present three cooperative packet forwarding mechanisms for ad hoc net- works that exploit RDSTC. The proposed cooperative forwarding schemes form the basis for

 When you create a network apps you do not need to write software for network

 Multiple objects can be sent over single TCP connection between client server.. Web

 Reliable data transfer is important in applicaiton, transport and link layers.  The complexity of reliable data transfer protocol is related to the characteristics of