Escolar Documentos
Profissional Documentos
Cultura Documentos
Network Layer
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4 -1
Chapter 4: Network Layer
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4 -2
Chapter 4 Outline
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4 -3
Network Layer Functions
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4 -5
Virtual circuits
call setup, teardown for each call before data can flow
each packet carries VC identifier (not destination host ID)
every router on source-destination path maintains “state”
for each passing connection
transport-layer connection only involved two end systems
Link and router resources (bandwidth, buffers) may be
allocated to VC
to get circuit-like performance.
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4 -6
Virtual Circuits: Signaling Protocols
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4 -7
Datagram networks: the Internet model
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4 -8
Network Layer Service Models:
Guarantees ? Congestion
Network Service
Architecture Model Bandwidth Loss Order Timing feedback
rate congestion
ABR: Available bit rate
CBR: Constant bit rate
VBR: Variable bit rate
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4 -9
QoS Factors
Timing
Connection Establishment Delay
End-To-End Delay
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-10
Service Clases
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-11
Guaranteed QoS
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-12
Predictable Service
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-13
Best Effort Services
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-14
Datagram or VC Network: why?
Internet ATM
data exchange among evolved from telephony
computers human conversation:
“elastic” service, no strict strict timing, reliability
timing req. requirements
“smart” end systems need for guaranteed
(computers) service
can adapt, perform “dumb” end systems
control, error recovery
telephones
simple inside “network”,
complexity inside
complexity at “edge”
network
many link types
different characteristics
uniform service is
difficult
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-15
Active Queue Management (AQM)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-16
Buffering in IP routers
Network
Interface
Network
Interface
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-18
FIFO Queueing in the Router
(Drop Tail)
Network
Interface
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-19
FIFO Queueing in the Router
(Drop Tail)
Network
Interface
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-20
FIFO Queueing in the Router
(Drop Tail)
Network
Interface
Network
Interface
Goals:
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-23
RED Operation
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-24
Active Queue Management
Random Early Detection (RED)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-25
Chapter 4 Outline
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-26
Routing
Routing protocol
Goal: determine “good” path 5
(sequence of routers) thru 3 C
network from source to dest. B
2 5
A 3 1
2 F
Graph abstraction for
1 2
routing algorithms: D E
1
graph nodes are Abstract model of a network
routers
graph edges are “good” path:
physical links typically means minimum
link cost: delay, $ cost, cost path
or congestion level other definitions possible
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-27
Routing Algorithm Classifications
1. Global: 1. Static:
all routers have complete routes update slowly
topology, link cost info
over time
“link state” algorithms
2. Decentralized: 2. Dynamic:
router knows physically- routes update more
connected neighbors, link quickly
costs to neighbors periodic update
iterative process of
in response to link
computation, exchange of
info with neighbors cost changes
“distance vector” algorithms
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-28
A Link-
Link-State Routing Algorithm
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-29
Notation:
5 5
N: set of nodes whose 3 C
B
least cost path 2 5
definitively known A 23
3 1 F
c(i,j): link cost from node 1 2
i to j. cost infinite if D E
1
not direct neighbors
Example: N: A, B, C, D, E, F
p(v): nodes along path
from source to v C(A,C)=5; C(C,A)=5
C(B,D)=2; C(D,B)=3
D(v): current value of
…
cost of path from
source to destination Source=A
p(F): A-D-E-F
v. D(F)=4
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-30
Dijsktra’s Algorithm
v
n = number of nodes (except the source)
1 Initialization:
2 N = {A} D(v) c(w,v)
3 for all nodes v
4 if v adjacent to A
w
5 then D(v) = c(A,v)
6 else D(v) = infinity A
7 D(w)
8 Loop
9 find w not in N such that D(w) is a minimum
10 add w to N
n(n+1)/2) 11 update D(v) for all v adjacent to w and not in N:
times 12 D(v) = min( D(v), D(w) + c(w,v) )
13 /* new cost to v is either old cost to v or known
14 shortest path cost to w plus cost from w to v */
15 until all nodes in N
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-31
Dijkstra’s Algorithm: example
5
D(v): Distance (cost) of A to v. 3
P(v): nodes along path fromA to v. B C
2 5
A 3 1
2 F
1 2
D E
1
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-32
Dijkstra’s Algorithm: discussion1
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-33
Dijkstra’s Algorithm: discussion2
Oscillations possibility:
Suppose link costs are equal to
the load carried on the link, or A
1
the delay that experienced. D 1+e
B
0 0
Link costs are not symmetric, 1 0 e
C
c(A,B) equals c(B,A) only if the 1
load on both directions on the e
AB link is the same. Fig. a- Initial routing
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-34
Discussion2 (cont.)
… oscillations possible: 1
A
Algorithm is run: C D 1+e
B
determines (Fig. a) the 0
0 0
1 C e
clockwise path to A has a cost 1
of 1, while the
counterclockwise path to A e
Fig. a- Initial routing
has a cost of 1 + e. Hence C ’s
least-cost path to A is now
clockwise. A
2+e 0
Similarly, B determines that D B
its new least-cost path to A is 1+e 1
0 0
also clockwise, resulting in 1 C 1
costs shown in Fig. b. e
Fig. b- B, C find better
path to A is clockwise
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-35
Discussion2 (cont.)
A
… oscillations possible: 0 2+e
D B
0 0
When algorithm is run next, 1 1 C 1+e
1
nodes B, C, and D all detect a e
zero-cost path to A in the Fig. c- B, C, D find better
path to A is counterclockwise
counterclockwise direction,
and all route their traffic to A
the counterclockwise routes. 2+e 0
D B
The next time the LS 1+e 1
algorithm is run, B, C, and D all 1 0 0
C 1
then route their traffic to the
e
clockwise routes. Fig. d- B, C, D find better
path to A is clockwise
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-36
Dijkstra’s Algorithm: discussion2
Solution2 :all routers do not run the LS algorithm at the same time
(a reasonable solution).
Routers run the LS algorithm with the same periodicity, the
execution instance of the algorithm would not be the same at
each node.
Researchers have noted: Routers in the Internet can self-
synchronize among themselves. That is, even though they
initially execute the algorithm with the same period but at
different instants of time, the algorithm execution instance can
eventually become, and remain, synchronized at the routers.
Avoid such self-synchronization: Introduce randomization into
the period between execution instants of the algorithm at each
node.
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-37
Distance Vector Routing Algorithm
(Decentralized)
Iterative:
Distance Table data structure
continues until no
nodes exchange info. each node has its own:
self-terminating: no row for each possible destination
“signal” to stop column for each directly-
attached neighbor to node
Asynchronous:
example: in node X, for dest. Y
nodes need not
via neighbor Z: DX(Y,Z)
exchange info/iterate
in lock step!
X Z
distributed: D (Y,Z) = c(X,Z) + minw {D (Y,w)}
each node
distance from X to Y, via Z as next hop
communicates only with
directly-attached
neighbors
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-38
Distance Table: example
neighbor: j
1 C
B A B D
7
8 2
A A 1 14 5
destination: i
1 E D B 7 8 5
source 2 C 6 9 4
E’s neighbor A D 4 11 2
B’s neighbor E
Distance table: D(i, j)
B
D (A,C)
C E
D (A,B)=
D
B B
E c(E,B) = c(E,B) + minw{D (A,w)}
… = 8 + 6 = 14
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-39
Distance table gives routing table
A 1 14 5 A A,1
B 7 8 5 B D,5
C 6 9 4 C D,4
D 4 11 2 D D,4
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-40
Distance Vector Routing: overview
Iterative, asynchronous:
each local iteration caused
Each node:
by: wait for (change in local link
local link cost change cost or message from
message from neighbor: its neighbor)
least cost path change
from neighbor
Distributed: recompute distance table
each node notifies
neighbors only when its
least cost path to any if least cost path to any
destination changes destination has changed,
neighbors then notify notify neighbors
their neighbors if
necessary
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-41
Distance Vector Algorithm:
* Y
DX (*,v) v
At node: X w
1 Initialization: DX (y,w)
X’s adjacents
destinations X
2 for all adjacent nodes v:
3 DX (*,v) = ∞ /* the * means "for all desstinations" */
4 DX (v,v) = c(X,v)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-42
Distance Vector Algorithm (cont.):
8 loop
9 wait ( until I see a link cost change to neighbor v
10 or until I receive update from neighbor v )
11
12 if ( c(X,v) changes by d )
13 /* change cost to all dest's via neighbor v by d */
14 /* note: d could be positive or negative */
15 for all destinations y: DX (y,v) = DX (y,v) + d
16
17 else if (update received from v for destination Y)
18 /* shortest path from V to some Y has changed */
19 /* V has sent a new value for its minW DV (Y,w) */
20 /* call this received new value is "newval" */
21 for the single destination y: DX (Y,v) = c(X,v) + newval
22
23 if we have a new minW DX(Y,w) for any destination Y
24 send new value of minW DX(Y,w) to all neighbors
25
26 forever
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-43
Distance Vector Algorithm: example
time
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-44
Distance Vector Algorithm: example
4
1 X dose not sends
3 DX(Y,Y) to Y and Z.
Y
2 1
X sends new 4
DX(Y,Z) to Y and Z
X Z 2 2
7
X learns this term from Y
X Y
1 D (Z,Y) = c(X,Y) + minw {D (Z,w)}
= 2+1 = 3
X Z
D (Y,Z) = c(X,Z) + minw{D (Y,w)}
1 = 7+1 = 8
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-45
Distance Vector: link cost changes
Link cost changes:
t0:Y detects local link cost change. t2: Y receives Z’s update and
updates distance table (line 15). then updates its table, DY (X,X)
least cost path DY (X,X) changes, not changed, terminate.
notify neighbors (lines 23,24).
t1: Z receives Y’s update and
then updates its table.
1 Y
4 1
X Z
50
algorithm
terminates
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-46
Distance Vector: link cost changes
Y Y Y
algorithm
continues
on!
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-47
Poisoned reverse solution: “count to infinity” problem!
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-48
Comparison of LS and DV algorithms
Message complexity Robustness: what happens
LS: with n nodes, E links, if router malfunctions?
O(nE) msgs sent each LS:
DV: exchange between Node (router) can
neighbors only advertise incorrect link
convergence time varies cost
Speed of Convergence each node computes only
its own table: robustness
LS: O(n2) algorithm requires
O(nE) msgs DV:
may have oscillations DV node can advertise
DV: convergence time varies incorrect least-cost
paths
may be routing loops
each node’s table used by
count-to-infinity problem
others
error propagate thru
network
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-49
Chapter 4 Outline
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-50
Hierarchical Routing
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-52
Intra--AS and Inter-
Intra Inter-AS routing
C.b
B.a Gateways:
A.a •perform inter-AS
b A.c c routing amongst
a themselves
a
b •perform intra-AS
C a
d B routers with other
c routers in their
A b
AS
▪Routers in an AS
Intra-AS
Intra- Inter-AS
Inter- have information
Routing Routing
Inter/intra-AS Algorithm Algorithm
about routing paths
routing in within that AS.
gateway A.c
Routing Table
DL DL DL
PHL PHL PHL
To/from A.b To/from B.a and A.a
To/from A.d
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-53
Intra--AS and Inter-
Intra Inter-AS routing
C.b
B.a
A.a
Host2
b A.c c
a a
b
C a B
d Intra-AS routing
c
A b within AS B
Intra-AS routing
Host1 within AS A
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-54
Chapter 4 outline
Network layer
•path selection •addressing conventions
•RIP, OSPF, BGP •datagram format
•packet handling conventions
Link layer
physical layer
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-56
Internet Routing Protocol
Intra-AS: administrator responsible for choice of
routing algorithm within network
Also known as Interior Gateway Protocols (IGP)
Most common Intra-AS routing protocols:
RIP: Routing Information Protocol (RFCs1058,2453)
– It is a distance vector protocol.
– Routing updates are exchanged between neighbors app. Every 30sec.
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-57
IP Addressing: Introduction
223.1.1.1
IP address: 32-bit
identifier for host, 223.1.2.1
223.1.1.2
router interface 223.1.1.4 223.1.2.9
interface: connection 223.1.2.2
between host/router 223.1.1.3 223.1.3.27
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-58
IP Addressing
223.1.1.1
IP address:
network part (high 223.1.2.1
223.1.1.2
order bits) 223.1.1.4 223.1.2.9
host part (low order
bits) 223.1.2.2
223.1.1.3 223.1.3.27
What’s a network ?
LAN
(from IP address
perspective) 223.1.3.1 223.1.3.2
device interfaces with
same network part of
IP address
can physically reach
network consisting of 3 IP networks
each other without
intervening router
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-59
223.1.1.2
IP Addressing
How to find the 223.1.1.1 223.1.1.4
networks?
223.1.1.3
Detach each
interface from 223.1.9.2 223.1.7.0
router, host
create “islands of
isolated networks 223.1.9.1 223.1.7.1
223.1.8.1 223.1.8.0
223.1.2.6 223.1.3.27
Interconnected
system consisting 223.1.2.1 223.1.2.2 223.1.3.1 223.1.3.2
of six networks.
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-60
Getting a datagram from source to dest.
forwarding table in A
Dest. Net. Next Router Nhops
223.1.1 1
IP datagram: 223.1.2 223.1.1.4 2
223.1.3 223.1.1.4 2
misc source dest
data
fields IP addr IP addr
A 223.1.1.1
223.1.3.1 223.1.3.2
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-61
Getting a datagram from source to dest.
forwarding table in A
misc Dest. Net. Next Router Nhops
data
fields 223.1.1.1 223.1.1.3
223.1.1 1
223.1.2 223.1.1.4 2
Starting at A, send IP
223.1.3 223.1.1.4 2
datagram addressed to B:
look up net. address of B in
A 223.1.1.1
forwarding table
223.1.2.1
find B is on same net. as A 223.1.1.2
223.1.1.4 223.1.2.9
link layer will send datagram
directly to B inside link-layer B
frame 223.1.3.27 223.1.2.2 E
223.1.1.3
B and A are directly
223.1.3.1 223.1.3.2
connected
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-62
Getting a datagram from source to dest.
forwarding table in A
misc Dest. Net. Next Router Nhops
data
fields 223.1.1.1 223.1.2.3
223.1.1 1
223.1.2 223.1.1.4 2
Starting at A, dest. E:
223.1.3 223.1.1.4 2
look up network address of E
in forwarding table
A 223.1.1.1
E on different network
223.1.2.1
A, E not directly attached 223.1.1.2
223.1.1.4 223.1.2.9
routing table: next hop
router to E is 223.1.1.4 B
223.1.3.27 223.1.2.2 E
link layer sends datagram to
223.1.1.3
router 223.1.1.4 inside link-
223.1.3.1 223.1.3.2
layer frame
datagram arrives at 223.1.1.4
continued…..
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-63
Getting a datagram from source to dest.
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-65
IP Addresses: Class-
Class-full
given notion of “network”, let’s re-examine IP addresses:
“class-full” addressing:
Class D and E
12.5%
Class C
12.5% Class A
50%
Class B
25%
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-67
Address depletion
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-68
Creative IP address allocation
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-69
Private IP Addresses
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-70
Special Purpose IP Addresses
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-71
Special Purpose Addresses-
Addresses-List
Address Block Present Use Reference
0.0.0.0/8 "This" Network [RFC1700, page 4]
10.0.0.0/8 Private-Use Networks [RFC1918]
14.0.0.0/8 Public-Data Networks [RFC1700, page 181]
24.0.0.0/8 Cable Television Networks
39.0.0.0/8 Reserved, subject to allocation [RFC1797]
127.0.0.0/8 Loop back [RFC1700, page 5]
128.0.0.0/16 Reserved but subject to allocation
169.254.0.0/16 Link Local –
172.16.0.0/12 Private-Use Networks [RFC1918]
191.255.0.0/16 Reserved but subject to allocation –
192.0.0.0/24 Reserved but subject to allocation –
192.0.2.0/24 Test-Net
192.88.99.0/24 6to4 Relay Anycast [RFC3068]
192.168.0.0/16 Private-Use Networks [RFC1918]
198.18.0.0/15 Network Interconnect Device Benchmark Testing [RFC2544]
223.255.255.0/24 Reserved but subject to allocation –
224.0.0.0/4 Multicast [RFC3171]
240.0.0.0/4 Reserved for Future Use [RFC1700]
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-72
Class Inter Domain Routing
(CIDR)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-73
IP addressing: CIDR
Classful addressing:
inefficient use of address space, address space exhaustion
e.g., class B net allocated enough addresses for 65K hosts,
even if only 2K hosts in that network
CIDR: Classless Inter Domain Routing (RFC1519)
network portion of address of arbitrary length
address format: a.b.c.d/x, where x is # bits in network
portion of address
network host
part part
11001000 00010111 00010000 00000000
200.23.16.0/23
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-74
Bit Masks and Subnet Masks
/30 yields two usable hosts and is used for WAN connections
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-75
Prefix Equivalents
Network Prefix Equivalent Number of Class Addresses Number of Hosts
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-76
Protocols
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-77
Examples
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-78
IP addresses: how to get one?
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-79
Subnetting (Extended Network Prefix)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-80
Hierarchical addressing: route aggregation
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-81
Hierarchical addressing: more specific routes
ISP2 has a more specific route to Organization 1
The routers in Internet use a longest prefix matching rule, and route
toward ISP2, as it advertises the longest (more specific) address prefix
that matches the destination address.
Organization 0
200.23.16.0/23
“Send me anything
with addresses
beginning
Organization 2 200.23.16.0 /20”
200.23.20.0/23 . ISP1 20 bits
.
. .
. Internet
Organization 7 .
200.23.30.0/23
“Send me anything
ISP2
Organization 1 with addresses
beginning 199.31.0.0/16
200.23.18.0/23 or 200.23.18.0 /23”
23 bits
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-82
Subnet Mask-
Mask-1
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-83
Subnet Mask-
Mask-2
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-84
IP addressing: ICANN
manages DNS
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-85
CIDR: Subneting Example
100 computers
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-86
CIDR: Subneting Example
(Questions)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-87
0 0
255 255
0 0
255 255
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-88
0 0
200.32.108.0
200.32. 110.0
200.32.108.0 /23
0
300 hosts 255
0
255
200.32. 109.0
200.32. 111.0
255 255
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-89
0 0 128
200.32.110.128 /25
200.32.110.0 /25
100 hosts
100 hosts
200.32.108.0 200.32. 110.0
200.32.108.0 /23
0
300 hosts 255
0
127 255
200.32. 109.0
200.32. 111.0
255 255
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-90
0 0 128
200.32.110.128 /25
200.32.110.0 /25
100 hosts
100 hosts
200.32.108.0 200.32. 110.0
200.32.108.0 /23
300 hosts 255
0
127 255
0 128
200.32.111.0 /25
100 hosts
200.32. 109.0 200.32. 111.0
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-91
0 0 128
200.32.110.128 /25
200.32.110.0 /25
100 hosts
100 hosts
200.32.108.0 200.32. 110.0
200.32.108.0 /23
300 hosts 255
0
127 255
0 128
200.32.111.0 /25
100 hosts
191
200.32. 109.0 192 224 200.32. 111.0
239
240 248
243 251 WAN links
244 252 /30
255 127 223 247 255
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-92
CIDR: Subneting Example
(Results)
Given the CIDR address 200.32.108.0 /22
200.32.111.0 /25
1/2 Class C
100 computers
200.32.111.240 /30
200.32.111.248 /30
200.32.111.244 /30
300 computers
100 computers
200.32.108.0 /23 100 computers
2 Class C’s 200.32.110.128 /25
200.32.110.0 /25 1/2 Class C
1/2 Class C
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-93
Supernetting Example-
Example-1
Company XYZ needs to address 400 hosts.
Its ISP gives them two contiguous Class C addresses:
207.21.54.0/24
207.21.55.0/24
Company XYZ can use a prefix of 207.21.54.0 /23 to supernet these two
contiguous networks. (Yielding 510 hosts)
207.21.54.0 /23
207.21.54.0/24
207.21.55.0/24
23 bits in common
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-94
Supernetting Example-
Example-2
addressing authority of ISP,include XYZ,
be advertized to Internet as a single supernt
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-95
CIDR and the Provider
example of route aggregation
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-96
IP datagram format
IP protocol version 32 bits
Number[4bits]
total datagram
header length head. “type” of
ver length length (bytes)
(bytes)[4bits] len service
fragment fragmentation/
“type” of data: Priority [3bits] 16-bit identifier flags
Delay[1bit]
offset Reassembly/
time to upper Checksum: 1’s add of
Throughput[1bit] DF, MF Flags
Reliability[1bit] live layer 16bits words in header
upper layer
32 bit source IP address
max number protocol
remaining hops 32 bit destination IP address to deliver
(decremented at payload to
each router) Options (if any) (rfc 1700)
1 :ICMP
data 6 :TCP
how much overhead (variable length, 17 :UDP
with TCP?
typically a TCP
20 bytes of TCP e.g. timestamp,
or UDP segment)
20 bytes of IP record route
= 40 bytes + app
taken, specify
A packet is unique in Internet by: list of routers
layer overhead Id + S. IP Add + D. IP Add + Upper L. to visit.
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-97
IP Fragmentation & Reassembly
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-98
IP Fragmentation and Reassembly
data
20 Byte 0……….3979
length ID fragflag offset
Example =4000 =x =0 =0
4000 Bytes
4000 byte
datagram
0……….1479
MTU = 1500 bytes
length ID fragflag offset
=1500 =x =1 =0
1480…2959
One large datagram becomes length ID fragflag offset
3 smaller datagrams. =1500 =x =1 =1480
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-99
ICMP:: Internet Control Message Protocol
ICMP
Network managers or users identify network problems.
One of the most frequently used debugging tools invokes the
ICMP echo request and echo reply messages.
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-100
ICMP (Cont.)
Any machine that receives an echo request formulates an
echo reply and returns it to the original sender. The request
contains an optional data area; the reply contains a copy of
the data sent in the request. The echo request and
associated reply can be used to test whether a destination is
reachable and responding. Because both the request and
reply travel in IP datagrams, successful receipt of a reply
verifies that major pieces of the transport system work.
First, IP software on the source computer must route
the datagram.
Second, intermediate routers between the source and
destination must be operating and must route the
datagram correctly.
Third, the destination machine must be running (at least
it must respond to interrupts), and both ICMP and IP
software must be working.
Finally, all routers along the return path must have
correct routes.
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-101
ICMP (Cont.)
The Internet Control Message Protocol allows routers to send error or
control messages to other routers or hosts; ICMP provides
communication between the Internet Protocol software on one machine
and the Internet Protocol software on another.
When a datagram causes an error, ICMP can only report the error
condition back to the original source of the datagram; the source must
relate the error to an individual application program or take other
action to correct the problem.
Each ICMP message has its own format. They all begin with the same
three fields:
an 8-bit TYPE field that identifies the message,
OPTIONAL DATA is a variable length field that contains data to be returned to the
sender. An echo reply always returns exactly the same data as was received in the
request. IDENTIFIER and SEQUENCE NUMBER are used by the sender to match
replies to requests. The value of the TYPE field specifies whether the message is a
request (8) or a reply (0).
DHCP
server
223.1.2.1
A 223.1.1.1
223.1.1.2
223.1.1.4 223.1.2.9
B
223.1.3.27 223.1.2.2 arriving DHCP
223.1.1.3 E client needs
address in this
223.1.3.1 223.1.3.2
network
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-106
DHCP client-
client-server scenario
arriving
DHCP server: 223.1.2.5 client
DHCP discover
src : 0.0.0.0, 68
dest.: 255.255.255.255,67
yiaddr: 0.0.0.0
transaction ID: 654
DHCP offer
src: 223.1.2.5, 67
dest: 255.255.255.255, 68
yiaddrr: 223.1.2.4
transaction ID: 654
Lifetime: 3600 secs
DHCP request
src: 0.0.0.0, 68
dest:: 255.255.255.255, 67
yiaddrr: 223.1.2.4
transaction ID: 655
Lifetime: 3600 secs
DHCP ACK
src: 223.1.2.5, 67
dest: 255.255.255.255, 68
yiaddrr: 223.1.2.4
time transaction ID: 655
Lifetime: 3600 secs
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-107
NAT: Network Address Translation
10.0.0.4
10.0.0.2
138.76.29.7
10.0.0.3
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-108
NAT: Network Address Translation
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-109
NAT: Network Address Translation
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-111
NAT: Network Address Translation
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-112
Chapter 4 Outline
Two-level routing:
Intra-AS: administrator responsible for choice of routing
algorithm within network
Inter-AS: unique standard for inter-AS routing:
BGP(RFC1771)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-114
Internet AS Hierarchy
C.b
B.a
C A.a
b A.c c
a
a
b
a
A d B
c
b
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-116
RIP ( Routing Information Protocol)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-117
RIP: Example
z
w x y
A D B
C
Destination Network Next Router Num. of hops to dest.
w A 2
y B 2
z B 7
x -- 1
…. …. ....
Routing table in D
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-118
RIP: Example
Dest Next hops
w - - Advertisement
x - - from A to D
z C 4
…. … ...
z
w x y
A D B
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-120
RIP Table processing
Transprt Transprt
(UDP) (UDP)
network forwarding forwarding network
(IP) table table (IP)
link link
physical physical
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-121
RIP Table example (continued)
Router: giroflee.eurocom.fr
Destination Gateway Flags Ref Use Interface
-------------------- -------------------- ----- ----- ------ ---------
127.0.0.1 127.0.0.1 UH 0 26492 lo0
192.168.2. 192.168.2.5 U 2 13 fa0
193.55.114. 193.55.114.6 U 3 58503 le0
192.168.3. 192.168.3.5 U 2 25 qaa0
224.0.0.0 193.55.114.6 U 3 0 le0
default 193.55.114.129 UG 0 143454
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-123
OSPF “advanced” features (not in RIP)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-125
Hierarchical OSPF
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-126
Inter--AS routing in the Internet: BGP
Inter
R4
R5 BGP
R3 AS3
(OSPF intra-AS
AS1 AS2 routing)
(RIP intra-AS routing) (OSPF
BGP intra-AS
routing)
R1 R2
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-127
Internet inter-
inter-AS routing: BGP
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-129
BGP: controlling who routes to you
B provider
legend:
X network
W A
customer
C network
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-130
BGP: controlling who routes to you
B provider
legend:
X network
W A
customer
C network
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-132
BGP messages
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-133
Why different Intra-
Intra- and Inter-
Inter-AS routing ?
Policy:
Inter-AS: admin wants control over how its traffic
routed, who routes through its net.
Intra-AS: single admin, so no policy decisions needed
Scale:
hierarchical routing saves table size, reduced update
traffic
Performance:
Intra-AS: can focus on performance
Inter-AS: policy may dominate over performance
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-134
Chapter 4 Outline
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-135
Router Architecture Overview
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-136
Input Port Functions
Physical layer:
bit-level reception
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-137
Input Port Queuing
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-138
Three Types of Switching Fabrics
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-139
Switching Via Memory
First generation routers:
packet copied by system’s (single) CPU
speed limited by memory bandwidth (2 bus
crossings per datagram)
Input Memory Output
Port Port
System Bus
Modern routers:
input port processor performs lookup, copy into
memory
Cisco Catalyst 8500
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network Layer
Network Layer 4-140
Switching Via a Bus
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-141
Switching Via An Interconnection Network
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-142
Output Ports
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-143
Output port queuing
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-145
IPv6
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-146
IPv6 Header (Cont)
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-147
Other Changes from IPv4
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-148
Transition From IPv4 To IPv6
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-149
Dual Stack Approach
A B C D E F
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-150
Tunneling--Analogy
Tunneling
A B E F
Logical view: tunnel
Analogy:
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-151
Tunneling--Physical View
Tunneling
A B E F
Logical view: tunnel
A B C D E F
Physical view:
IPv6 IPv6 IPv4 IPv4 IPv6 IPv6
data data
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-155
Multicast: one sender to many receivers
Network multicast
Router actively
participate in multicast,
making copies of packets
as needed and
forwarding towards
Multicast
routers (red) duplicate and
multicast receivers
forward multicast datagrams
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-157
Multicast: one sender to many receivers
Application-layer
multicast
end systems involved in
multicast copy and
forward unicast
datagrams among
themselves
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-158
Internet Multicast Service Model
128.59.16.12
128.119.40.186
multicast 128.34.108.63
group
226.17.30.197
128.34.108.60
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-160
Joining a multicast group: two-
two-step process
IGMP
IGMP
wide-area
multicast
routing
analoui@iust.ac.ir
IGMP
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-161
IGMP: Internet Group Management Protocol
query report
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-162
IGMP
IGMP version 1 IGMP v2: additions
router: Host include
Membership Query group-specific Query
msg broadcast on LAN Leave Group msg
to all hosts last host replying to Query
host: Host can send explicit Leave
Membership Report Group msg
msg to indicate group router performs group-
specific query to see if any
membership
hosts left in group
randomized delay
RFC 2236
before responding
implicit leave via no IGMP v3: under development
reply to Query as Internet draft
RFC 1112
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-163
Multicast Routing: Problem Statement
Approaches:
source-based tree: one tree per source
shortest path trees
reverse path forwarding
group-shared tree: group uses one tree
minimal spanning (Steiner)
center-based trees
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-165
Shortest Path Tree
S: source LEGEND
R1 2
1 R4 router with attached
group member
R2 5
router with no attached
3 4
R5 group member
R3 6 i link used for forwarding,
R6 R7 i indicates order link
added by algorithm
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-166
Reverse Path Forwarding
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-167
Reverse Path Forwarding: example
S: source
LEGEND
R1
R4 router with attached
group member
R2
router with no attached
R5 group member
R3 datagram will be
R6 R7 forwarded
datagram will not be
forwarded
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-168
Reverse Path Forwarding: pruning
S: source LEGEND
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-169
Shared--Tree: Steiner Tree
Shared
LEGEND
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-172
Internet Multicasting Routing: DVMRP
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-174
Tunneling
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-175
PIM: Protocol Independent Multicast
Dense: Sparse:
group members # networks with group
densely packed, in members small wrt #
“close” proximity. interconnected networks
bandwidth more group members “widely
plentiful dispersed”
bandwidth not plentiful
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-176
Consequences of Sparse-
Sparse-Dense Dichotomy:
Dense Sparse:
group membership by no membership until
routers assumed until routers explicitly join
routers explicitly prune receiver- driven
data-driven construction construction of mcast
on mcast tree (e.g., RPF) tree (e.g., center-based)
bandwidth and non- bandwidth and non-group-
group-router processing router processing
profligate conservative
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-177
PIM-- Dense Mode
PIM
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-178
PIM - Sparse Mode
center-based approach
router sends join msg
to rendezvous point R1
R4
(RP) join
intermediate routers R2
join
update state and
forward join R5
join
after joining via RP, R3 R7
router can switch to R6
sender(s):
unicast data to RP,
which distributes down R1
R4
RP-rooted tree join
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-180
Chapter 4 roadmap
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-181
What is mobility?
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-182
Mobility: Vocabulary
wide area
network
Permanent address:
address in home
network, can always be
used to reach mobile
e.g., 128.119.40.186 correspondent
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-183
Mobility: more vocabulary
Care-of-address: address
in visited network.
(e.g., 79,129.13.2)
wide area
network
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-185
Mobility: approaches
no changes to end-systems
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-186
Mobility: approaches
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-187
Mobility: registration
visited network
home network
1
2
wide area
network
mobile contacts
foreign agent contacts home foreign agent on
agent home: “this mobile is entering visited
resident in my network” network
End result:
Foreign agent knows about mobile
Home agent knows location of mobile
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-188
Mobility via Indirect Routing
foreign agent
receives packets,
home agent intercepts forwards to mobile
packets, forwards to visited
foreign agent network
home
network
3
wide area
network
2
1
correspondent 4
addresses packets
mobile replies
using home address
directly to
of mobile
correspondent
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-189
Indirect Routing: comments
correspondent, mobile
are in same network
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-190
Forwarding datagrams to remote mobile
foreign-agent-to-mobile packet
packet sent by home agent to foreign dest: 128.119.40.186
agent: a packet within a packet
Permanent address:
128.119.40.186
Care-of address:
79.129.13.2
dest: 128.119.40.186
packet sent by
correspondent
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-191
Indirect Routing: moving between networks
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-192
Mobility via Direct Routing
foreign agent
receives packets,
correspondent forwards forwards to mobile
to foreign agent visited
network
home
network 4
wide area
2 network
3
correspondent 1 4
requests, receives
mobile replies
foreign address of
directly to
mobile
correspondent
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-193
Mobility via Direct Routing: comments
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-194
Mobile IP
RFC 3220
has many features we’ve seen:
home agents, foreign agents, foreign-agent
registration, care-of-addresses, encapsulation
(packet-within-a-packet)
three components to standard:
agent discovery
registration with home agent
indirect routing of datagrams
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-195
Mobile IP: agent discovery
R bit: registration
required type = 16 length sequence #
RBHFMGV
registration lifetime reserved
bits mobility agent
advertisement
0 or more care-of- extension
addresses
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-196
Mobile IP: registration example
registration req.
registration req.
COA: 79.129.13.2
COA: 79.129.13.2 HA: 128.119.40.7
HA: 128.119.40.7 MA: 128.119.40.186
MA: 128.119.40.186 Lifetime: 9999
Lifetime: 9999 identification:714
identification: 714 ….
encapsulation format
….
registration reply
time HA: 128.119.40.7
registration reply
MA: 128.119.40.186
Lifetime: 4999 HA: 128.119.40.7
Identification: 714 MA: 128.119.40.18 6
encapsulation format Lifetime: 4999
…. Identification: 714
….
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-197
Network Layer: summary
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-198
HW4
3, 4a, 4f, 5, 9
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-199
Home Work4
ز از
رم ب
.
راComputer Networking 3edition
21, 22a, 22f, 23, 26
ار"لjamali@iust.ac.ir "! درا درس#
, Subject: HW4 ”Student ID Number”.
., دي
اه6 %&'( )
در *ر
. * power point "! د را#
analoui@iust.ac.ir
Jamali@iust.ac.ir IUST-Network
Network LayerLayer 4-200