DEEPAK.P COMMUNICATION NETWORKS Mr. DEEPAK P. Associate Professor ECE Department SNGCE 1

Preview:

Citation preview

DEEPAK.P

COMMUNICATION NETWORKS

Mr. DEEPAK P.Associate ProfessorECE Department

SNGCE

1

DEEPAK.P

UNIT 3Inter Networking

2

DEEPAK.P

Inter network

3

Inter networkInternetworking is the practice of connecting a computer

network with other networks through the use of gateways.

Internetworking is a combination of the words inter ("between") and networking;

The most common example of internetworking is the Internet

Inter networking can be classified in to two1. Connection oriented or concatenated of virtual circuit

subnets2. Connectionless or Datagram

4 DEEPAK.P

DEEPAK.P

Connection Oriented Virtual circuit

5

Virtual Circuit• A virtual network link is a link that does not consist of a

physical (wired or wireless) connection between two computing devices but is implemented using methods of network virtualization.

6 DEEPAK.P

Concatenated of Virtual Circuit

7 DEEPAK.P

B

A X.25

Subnet 1

Subnet 3

Host

ATM

M M

Subnet 2

SNA

Multi protocol router (Gateway)

Routers

SNA-System Network Architecture

Virtual Circuit Establishment1. Subnet shows that the destination is remote destination and

builds a virtual circuit to the router nearest to the destination.

2. It then constructs a virtual circuit from that router to an external gateway (multi protocol router).

3. This gateway notes down the existence of this virtual circuit in its table and builds another virtual circuit to a router which is in the next subnet.

4. This process continues until the destination host has been reached.

8 DEEPAK.P

Virtual Circuit Establishment

5. After building the virtual circuit, data packets begin to flow along the path

AdvantageBuffer can be reserved in advanceShorter header can be usedSequencing can be guaranteed

DrawbacksThere is no alternate path to avoid congestionRouter failure creates big problems

9 DEEPAK.P

DEEPAK.P

Connection less

10

Datagram Internetworking

11 DEEPAK.P

Path 2 B

A

Subnet 1

Subnet 3

Host

M M

Subnet 2Multi protocol router (Gateway)

Routers

MM

Path 1

Datagram packets

Datagram packets

Datagram InternetworkingThe packets that are forwarded across the Internet are known

as IP datagramsAn IP datagram consists of a header and a payloadThe header contains information that allows Internet routers to

forward the datagram from the source host to the destination host

12 DEEPAK.P

Datagram InternetworkingHeader contains all information needed to deliver datagrams

to destination computer 1. Destination address2. Source address3. Identifier4. Other delivery information

Router examines header of each datagram and forwards datagram along path to destination

13 DEEPAK.P

Advantage& Disadvantage DatagramAdvantage

Higher BandwidthDeal with congestion in a better wayIt is robust in Router failure

DrawbacksNo guarantee of packetsAddressing is difficultLonger header is needed

14 DEEPAK.P

DEEPAK.P

Datagram forwarding in IP

15

Delivery of an IP datagramInternetwork is a collection of LANs or point-to-point links

or switched networks that are connected by routers.

16 DEEPAK.P

IP forwarding Using DatagramThe IP forwarding algorithm, commonly known as IP

routing.It is a specific implementation of routing for IP networks and

gives a more directed approach in forwarding datagram's over a network.

In order to achieve a successful transfer of data the algorithm uses a routing table to select a next-hop router as the next destination for a datagram.

The IP address that is selected is known as the next-hop address.

17 DEEPAK.P

Datagram forwarding in IPAn IP network is a logical entity with a network numberWe represent an IP network as a “cloud”

18 DEEPAK.P

Networks and IP addressingIP address:

Network part + Host part

Network:Any host can physically be reached by any other host

without intervening routerAll hosts in the same network have the same network

number

19 DEEPAK.P

Forwarding DatagramsHeader contains all information needed

to deliver datagrams to destination computerDestination address– Source address– Identifier– Other delivery information

Router examines header of each datagram and forwards datagram along path to destination

20 DEEPAK.P

Routing tablesEach router and each host keeps a routing table which tells the

router how to process an outgoing packet

Main columns:

1. Destination address: where is the IP datagram going to?2. Next hop: how to send the IP datagram?3. Interface: what is the output port?

21 DEEPAK.P

IP Frame format

22 DEEPAK.P

Beginning of Data

Header

Payload

IP HeaderProtocol Version(4 bits) : This is the first

field in the protocol header.

This field occupies 4 bits.

This signifies the current IP protocol version being used.

Most common version of IP protocol being used is version 4 while version 6 is out in market and fast gaining popularity.

23 DEEPAK.P

IP HeaderHeader Length(4 bits) : This field provides

the length of the IP header.

The length of the header is represented in 32 bit words.

Since this field is of 4 bits so the maximum header length allowed is 60 bytes.

24 DEEPAK.P

IP HeaderType of service(8 bits) :

The first three bits of this field are known as priority bits and are ignored as of today.

The next 4 bits represent type of service and the last bit is left unused.

The 4 bits that represent TOS are : minimize delay, maximize throughput, maximize reliability and minimize monetary cost.

25 DEEPAK.P

IP HeaderTotal length(16 bits): This represents the

total IP datagram length in bytes.

Since the header length (described above) gives the length of header and this field gives total length so the length of data and its starting point can easily be calculated using these two fields.

Since this is a 16 bit field and it represents length of IP datagram so the maximum size of IP datagram can be 65535 bytes.

26 DEEPAK.P

IP HeaderIdentification(16 bits): This field is used for uniquely identifying the IP

datagrams.

This value is incremented every-time an IP datagram is sent from source to the destination.

This field comes in handy while reassembly of fragmented IP data grams.

27 DEEPAK.P

IP HeaderFlags(3 bits): This field comprises of three bits.

While the first bit is kept reserved as of now, the next two bits have their own importance.

The second bit represents the ‘Don’t Fragment’ bit.

The third bit represents the ‘More Fragment’ bit.

28 DEEPAK.P

IP HeaderFragment offset(13 bits):

In case of fragmented IP data grams, this field contains the offset( in terms of 8 bytes units) from the start of IP datagram.

So again, this field is used in reassembly of fragmented IP datagrams.

29 DEEPAK.P

IP HeaderTime to live(8 bits) : This value represents number of hops that the

IP datagram will go through before being discarded.

The value of this field in the beginning is set to be around 32 or 64 (lets say) but at every hop over the network this field is decremented by one.

When this field becomes zero, the data gram is discarded. So, we see that this field literally means the effective lifetime for a datagram on network.30 DEEPAK.P

IP HeaderProtocol(8 bits) :

This field represents the transport layer protocol that handed over data to IP layer.

This field comes in handy when the data is demultiplex-ed at the destination as in that case IP would need to know which protocol to hand over the data to.

31 DEEPAK.P

IP HeaderHeader Checksum(16 bits) : This fields

represents a value that is calculated using an algorithm covering all the fields in header (assuming this very field to be zero).

This value is calculated and stored in header when IP data gram is sent from source to destination and at the destination side this checksum is again calculated and verified against the checksum present in header.

If the value is same then the datagram was not corrupted else its assumed that data gram was received corrupted. So this field is used to check the integrity of an IP datagram.32 DEEPAK.P

IP HeaderSource and destination IP(32 bits each) : These fields store the source and destination

address respectively.

Since size of these fields is 32 bits each so an IP address os  maximum length of 32 bits can be used.

So we see that this limits the number of IP addresses that can be used.

To counter this problem, IP V6 has been introduced which increases this capacity.

33 DEEPAK.P

IP HeaderOptions(Variable length) : This field

represents a list of options that are active for a particular IP datagram.

This is an optional field that could be or could not be present.

If any option is present in the header then the first byte is represented as follows :

34 DEEPAK.P

IP Header

In the description above, the ‘copy flag’ means that copy this option to all the fragments in case this IP datagram gets fragmented.

The ‘option class’ represents the following values : 0 -> control, 1-> reserved, 2 -> debugging and measurement, and 3 -> reserved. Some of the options are given below :

35 DEEPAK.P

IP Header

36 DEEPAK.P

IP HeaderData: This field contains the data from the

protocol layer that has handed over the data to IP layer. Generally this data field contains the header and data of the transport layer protocols. Please note that each TCP/IP layer protocol attaches its own header at the beginning of the data it receives from other layers in case of source host and in case of destination host each protocol strips its own header and sends the rest of the data to the next layer.

37 DEEPAK.P

Routing tablesNext hop and interface column can often

be summarized as one columnRouting tables are set so that datagrams gets

closer to the its destination.

38 DEEPAK.P

Delivery with routing tables

39 DEEPAK.P

DEEPAK.P

Tunneling

40

TunnelingIt is used when source and destination networks of same

type are to be connected through a network of different type.

Consider an ethernet network to be connected to another ethetnet through a WAN

The task is send on IP packet from host A of Ethernet 1 to the host B of ehernet 2 wia a WAN.

In this example, the IP packet do not have to deal with WAN.

41 DEEPAK.P

TunnelingThe host A&B do not have to deal with WAN

The multiprotocol routers M1 and M2 will have to understand about IP and WAN packet.

Therefore WAN can be imagined to be equivalent to a big tunnel extending between multiprotocol routers M1 and M2.

So this technique is called Tunneling

42 DEEPAK.P

Tunneling

43 DEEPAK.P

WAN Tunnel

B

Ethernet 2

M2

IP

Ethenet Frame

IP

WAN packet

IP packet is inside the payload field of WAN packet

Header

A

Ethernet 1

M1

HOST HOST

Sequence of events in Tunneling

1. Host A construct a packet containing the IP address of host B

2. It then inserts this IP packet in to ethernet frame.

3. This frame is addressed to the multi protocol router M1.

4. Host A then puts this frames on Ethernet.

44 DEEPAK.P

Sequence of events in Tunneling

5. When M1 receives this frames, it removes IP packet, inserts it in the IP payload packet of the WAN network layer packet and addresses the WAN packet to M2.

6. The multi protocol router M2 remeoves the IP packet and send it to host B in an ethernet frame.

45 DEEPAK.P

DEEPAK.P

ARP

46

ARPAddress Resolution Protocol (ARP) is a

telecommunications protocol used for resolution of network layer addresses into link layer addresses

ARP was defined by RFC (radio Frequency Committee) 826 in 1982

If a machine talks to another machine in the same network, it requires its physical or MAC address.

ARP is used to convert an IP address to a physical address such as an Ethernet address

47 DEEPAK.P

ARPIP address of the destination node is broadcast and the

destination node informs the source of its MAC address.

Assume broadcast nature of LAN

Broadcast IP address of the destination

Destination replies it with its MAC address.

Source maintains a cache of IP and MAC address bindings

48 DEEPAK.P

ARP

49 DEEPAK.P

ARP

50 DEEPAK.P

NetworkLayer

Link Layer

IP

ARP NetworkAccess RARP

Media

ICMP IGMP

TransportLayer

TCP UDP

ARP

51 DEEPAK.P

Send broadcast request

receive unicast response

ARPA host wishing to obtain a physical address broadcasts an

ARP request onto the TCP/IP network.

The host on the network that has the IP address in the request then replies with its physical hardware address.

52 DEEPAK.P

ARPProblem: Router A needs to forward an IP datagram to

router B (which is on the same Ethernet LAN)

Router A knows the IP address of B.

But the IP datagram must be encapsulated within an Ethernet frame, whose Ethernet destination address is the address of B’s NIC

How can A discover the Ethernet Address of B’s NIC?

53 DEEPAK.P

ARP

54 DEEPAK.P

ARPA uses the Address Resolution Protocol (ARP) to discover

B’s NIC Ethernet address.

A broadcasts an Ethernet frame on the LAN.

The payload of the frame is an ARP request: who has address 148.4.20.10 (B’s IP address).

All computers in the LAN hear the broadcast.

The computer whose IP address is 148.4.20.10 (B) replies to A: my ethernet address is aa:bb:cc:dd:ee:ff.

55 DEEPAK.P

ARPNow A has the ethernet address of B ’s NIC, and can send

the IP datagram to B encapsulated within an Ethernet frame with destination address aa:bb:cc:dd:ee:ff.

56 DEEPAK.P

ARP request/reply Ethernet Frame

57 DEEPAK.P

ARP Header format

58 DEEPAK.P

ARP HeaderHardware type (HTYPE)

This field specifies the network protocol type. Example: Ethernet is 1.

Protocol type (PTYPE) This field specifies the internetwork protocol for which the

ARP request is intended. For IPv4, this has the value 0x0800. The permitted PTYPE

values share a numbering space with those for Eather typeHardware length (HLEN) Length (in octets) of a hardware

address. Ethernet addresses size is 6.

59 DEEPAK.P

ARP HeaderProtocol length (PLEN) Length (in octets) of addresses used in the upper layer

protocol. (The upper layer protocol specified in PTYPE.) IPv4 address size is 4.

Operation  Specifies the operation that the sender is performing: 1 for request, 2 for reply.

Sender hardware address (SHA) media address of the sender.

60 DEEPAK.P

ARP HeaderSender protocol address (SPA) internetwork address of the

sender.

Target hardware address (THA) media address of the intended receiver. This field is ignored in requests.

Target protocol address (TPA) internetwork address of the intended receiver. ARP protocol parameter values have been standardized

and are maintained by the Internet Assigned Numbers Authority (IANA).

61 DEEPAK.P

DEEPAK.P

ICMP

62

ICMPData delivery using IP datagram is the best delivery

scheme but it has two deficiencies.

Lack of error control

Lack of assistance mechanism.

These ICMP can compensate these deficiencies.

It is a companion to IP protocol

63 DEEPAK.P

ICMP

64 DEEPAK.P

IGMP

IP

ICMP

ARP

RARP

Network Layer

ICMPInternet Control Message Protocol

It is a network layer protocol

Used mostly for error reporting at the IP level.

But its message is not passed directly to the data link layer

The messages are first encapsulated inside IP datagram before going to the lower layer

65 DEEPAK.P

Encapsulation of ICMP messages

66 DEEPAK.P

ICMP

67 DEEPAK.P

ERROR REPORTING

ICMP MESSAGE

QUERY

ICMPThe error reporting message reports problems occurred at

router or a host.

The query message , which occurs in pairs , help a host or a network manager to get specific information from a router or another host

ICMP does not correct errors , it simply reports them.

68 DEEPAK.P

ICMP error reporting

69 DEEPAK.P

Destination un reachable

Error reporting

Re directionSource Quench

Time exceeded

Parameter problems

Source quench--- Flow control to IP

Parameter problem– Any ambiguity in the header part

Re direction--- Host routing table updation is caaried out

ICMPFor example, if the TTL of the IP datagram reaches 0

when it reaches a router, the datagram is dropped by the router, and the router sends an ICMP message back to the source of the datagram to inform it that the datagram was dropped because its TTL reached 0 (Time Exceeded)

If a router does not know how to route an IP datagram, it drops the datagram an send an ICMP message back to the source (Destination unreachable).

70 DEEPAK.P

ICMP Messages with message number

71 DEEPAK.P

ICMP header

72 DEEPAK.P

ICMP headerType field defines the type of message

Code field specifies reason for particular message

Checksum for error reporting

73 DEEPAK.P

DEEPAK.P

DHCP

74

DHCPDynamic Host Configuration ProtocolAllows a computer to obtain an IP address and

other parameters from a DHCP server

A DHCP server is a program running in some fixed computer in the LAN that has been configured to assign IP addresses from a given range to other computers in the LAN that request them

The DHCP server also provides things like default routes, and DNS server addresses

75 DEEPAK.P

DHCPDHCP requests are broadcasted within the local

LAN (frame dest ff:ff:ff:ff:ff:ff)If the DHCP server is in a different LAN, the

request won’t reach that server.

One way around this is to configure some other computer in the LAN as a dhcp relay agent : the relay will intercept the DHCP request and forward it to the DHCP server on the other LAN

Simplifies management, as only one DHCP sever needs to be configured for the entire network, rather than having to configure separate DHCP servers for each LAN76 DEEPAK.P

DEEPAK.P

Subnetting

77

Subnet

A sub network, or subnet, is a logically visible subdivision of an IP network.

The practice of dividing a network into two or more networks is called subnetting.

All computers that belong to a subnet are addressed with a common, identical, most-significant bit-group in their IP address

78 DEEPAK.P

Subnet

Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security.

The most common reason is to control network traffic.

79 DEEPAK.P

DEEPAK.P

IP Packet

80

IP Packet

81 DEEPAK.P

IP Packet

An IP packet has two fundamental components:

1. IP header IP header contains many fields that are used by routers to

forward the packet from network to network to a final destination.

Contains layer 3 info Fields within the IP header identify the sender, receiver,

and transport protocol and define many other Parameters.

2. Payload Represents the information (data) to be delivered to the

receiver by the sender. Contains data & upper-layer info

82 DEEPAK.P

IP Versions

83 DEEPAK.P

DEEPAK.P

IPV4

84

IPV4

Internet Protocol is one of the major protocol in TCP/IP protocols suite.

This protocol works at Network layer of OSI model and at Internet layer of TCP/IP model.

Thus this protocol has the responsibility of identification of hosts based upon their logical addresses and to route data between/among them over the underlying network.

IPv4 is a connectionless protocol for use on packet-switched networks.

85 DEEPAK.P

IPV4

Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) Internet, and routes most traffic on the Internet.

However, a successor protocol, IPv6, has been defined and is in various stages of production deployment.

IPv4 is described in IETF publication RFC 791

It operates on a best effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery.86 DEEPAK.P

IPV4

IPv4 uses 32-bit (four-byte) addresses, which limits the address space to 4294967296 (232) addresses.

87 DEEPAK.P

IPv4 - Packet Structure

The encapsulated data is referred to as IP Payload.

IP header contains all the necessary information to deliver the packet at the other end.

88 DEEPAK.P

IPv4 - Packet Structure

89 DEEPAK.P

IPv4 - Addressing

IPv4 supports three different type of addressing modes:

Unicast Addressing Mode:

In this mode, data is sent only to one destined host.

The Destination Address field contains 32- bit IP address of the destination host.

Here client sends data to the targeted server

90 DEEPAK.P

IPv4 – Unicast Addressing

91 DEEPAK.P

IPv4 – Broadcast Addressing Mode:In this mode the packet is addressed to all

hosts in a network segment.

The Destination Address field contains special broadcast address i.e. 255.255.255.255.

When a host sees this packet on the network, it is bound to process it.

Here client sends packet, which is entertained by all the Servers:

92 DEEPAK.P

IPv4 – Broadcast Addressing Mode:

93 DEEPAK.P

IPv4 – Multicast Addressing Mode:

This mode is a mix of previous two modes, i.e. the packet sent is neither destined to a single host nor all the host on the segment.

In this packet, the Destination Address contains special address which starts with 224.x.x.x and can be entertained by more than one host.

94 DEEPAK.P

IPv4 – Multicast Addressing Mode:

95 DEEPAK.P

DEEPAK.P

IPV6

96

IPV6

Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.

IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion.

IPv6 is an Internet Layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks,

97 DEEPAK.P

IPV6

98 DEEPAK.P

IPV6 & IP V 4

99 DEEPAK.P

IPV6 & IP V 4

100 DEEPAK.P

DEEPAK.P

Routing

101

RoutingRouting means finding a suitable path for a

packet from sender to destination

102 DEEPAK.P

RoutingRouting is the main function of the network

layer.

Network layer protocols responsible for deciding which output line an incoming packet should be transmitted on.

Routing is usually performed by a dedicated device called a router.

The path with lowest cost is considered as best.

103 DEEPAK.P

RoutingThe routing algorithm is the part of a network

layer software responsible for deciding which output line a packet should be transmitted on

Each router stores information about forwarding in a routing table

– Initialized at system initialization– Must be updated as network topology changesA routing table contains a list of destination

networks and next hop for each destinationNote that a router has several IP addresses!– One IP address per interface

104 DEEPAK.P

Classification of RoutingRouting schemes differ in their delivery semantics:Unicast: delivers a message to a single specific node.

Broadcast: delivers a message to all nodes in the network.

Multicast: delivers a message to a group of nodes that have expressed interest in receiving the message.

Anycast: delivers a message to any one out of a group of nodes, typically the one nearest to the source.

Geocast: delivers a message to a geographic area.

105 DEEPAK.P

Classification of RoutingRouting can be classified in to two

Static Routing or Non adaptiveDo not consider measurement and estimate of current

traffic and topology on their routing decisionsEg. Flooding, Flow based routing, Shortest path

Dynamic Routing or AdaptiveChange routing decisions to reflect changes in topologyEg. Distance vector routing , Link state routing

106 DEEPAK.P

Routing Protocols

107 DEEPAK.P

Routing Protocols

RIP(Routing information Protocol

Interior (Routing inside an autonomous System)

Exterior (Routing between autonomous system)

OSPF(Open shortest path first

BGP (Border gateway Protocol)

Desirable Properties of Routing Algorithms

108 DEEPAK.P

DEEPAK.P

Static Routing

109

FloodingIt is a static algorithm

Every incoming packet is sent out on every outgoing line except the one it arrived on.

It will generate vast no of duplicate packets.

110 DEEPAK.P

Flooding

111 DEEPAK.P

Application of FloodingMilitary application

Distributed database application

Wireless network

112 DEEPAK.P

Selective Flooding

Variation of flooding is selective flooding

Do not send every incoming packet out on every line.

It sends to the line that are going approximately in the right direction.

113 DEEPAK.P

Flow-based RoutingSimilar in spirit to minimum distance,

but takes traffic flow into consideration.

From the known average amount of traffic and the average length of a packet you can compute the mean packet delays using queuing theory.

Flow-based routing then seeks to find a routing table to minimize the average packet delay through the subnet.

114 DEEPAK.P

Flow-based RoutingAssume that traffic is huge from A to B

115 DEEPAK.P

H

D

C

FE

G

B

A

TAKE THE ROUTE AGEFC INSTEAD OF ABC

Shortest pathLinks between routers have a cost associated

with them.In general it could be a function of

DistanceBandwidthAverage trafficCommunication costMean queue lengthMeasured delayRouter processing speed

116 DEEPAK.P

Shortest path algorithmsThe shortest path algorithm just finds the

least expensive path through the network, based on the cost function.

Dijkstras algorithms

Bellman-ford algorithms

117 DEEPAK.P

DEEPAK.P

Dynamic Routing

118

DEEPAK.P

Distance vector Routing

119

Distance Vector RoutingIn this routing each router 'telling the

neighbors about the whole network'.

Each router maintains a table called vector.Each router periodically shares its knowledge about the

entire network with its neighbors.

The working principle of distance vector routing includes

Knowledge about the whole networkRouting only to neighbors Information sharing at regular intervals

120 DEEPAK.P

Distance Vector Routing

121 DEEPAK.P

Distance Vector RoutingIn distance vector algorithms, each router has to

follow the following steps:It counts the weight of the links directly

connected to it and saves the information to its table.

In a particular period of time, the router sends its table to its neighbor routers (not to all routers) and receives the routing table of each of its neighbors.

Based on the information the router receives from its neighbors' routing tables, it updates its own.

122 DEEPAK.P

Distance Vector RoutingDistance vector routing is also called

Distributed bellman- ford algorithmFord-Fulkerson algorithm

In distance vector routing Cost is based on

Hop countTime delayNo of packets in a queue.

123 DEEPAK.P

Distance Vector Routing

124 DEEPAK.P

Distance Vector RoutingThe cost of each link is set to 1. Thus, the least cost path is simply the path

with the fewer hops.The table below represents each node’s

knowledge about the distance to all other nodes:

125 DEEPAK.P

Distance Vector RoutingInitially, each node sets a cost of 1 to its

directly connected neighbors and infinity to all the other nodes.

Below is shown the initial routing table at node A:

126 DEEPAK.P

Distance Vector RoutingDuring the next step, every node sends a

message to its directly connected neighbors. That message contains the node's personal list of distances.

127 DEEPAK.P

Distance vector Routing

128 DEEPAK.P

12

25

40

14

23

18A17

0

21

9

29

24

36

18

27

7

20

3120

24

0

11

33

22

31

19

8

30

19

60

20

14

7

9

22

28

36

24

22

40

3119

21

22

10

9

0

A

I

H

I

I

HH

A

I

-

K

K

20

28

20

17

30

1812

8

10

0

15

6

A I H K J

New Routing Table for JJA delay is 8 JI delay is 10

JH delay is 12

JK delay is 6

129 DEEPAK.P

Distance Vector RoutingProblem (assume that cost is 1 for each link)

130 DEEPAK.P

DEEPAK.P

Link state Routing

131

Link state RoutingLink state algorithms are sometimes

characterized informally as each router 'telling the other router about its neighbors'.

The concept has 5 parts

Discover it’s neighbors and learn their network addressMeasure the delay or cost to each of it’s neighbors.Construct a packet telling all it has learned.Send this packet to all other routers.Compute the shortest path to every other router.

132 DEEPAK.P

Link state Routing

133 DEEPAK.P

neighbor to all routers

neighbor to all routers

neighbor to all routers

neighbor to all routers

neighbor to all routers

neighbor to all routers

DEEPAK.P

Routing for Mobile Hosts

134

Routing for mobile HostsWireless hosts are often mobile, changing location

over time

This mobility of a wireless host may cause the host to connect to Different networks at different points of time.

135 DEEPAK.P

DEEPAK.P

CIDR

136

CIDR

137 DEEPAK.P

CIDR

138 DEEPAK.P