Компјутерски мрежи скрипта II кол. (КНИА)
Компјутерски мрежи скрипта II кол. (КНИА)
Компјутерски мрежи скрипта II кол. (КНИА)
1. When the 802.3 Ethernet was developed it became very popular. But the need for it to
be faster was increasing very fast. The IEEE reconvened the 802.3 committee in 1992
with instructions to come up with a faster LAN. One proposal was to keep 802.3 exactly
as it was, but make it go faster. Another proposal was to redo it totally and give it lost of
new features, such as real-time traffic and digitized voice, but keep the old name. They
went with the first idea, which flopped miserably. The 802.3u also known as fast
Ethernet is not a new standard, but an addendum to the existing 802.3 standard. Both
are used for backbone networks. And the idea was to keep it simple. 802.3 committee
decides to keep the protocol and just make it faster. This is where the 802.3u aka fast
Ethernet was developed. The idea was to keep the backward compatibility. A new
protocol may have unforeseen problems. It was faster compared to technology change.
Two different groups propose 2 new optical ring LANs:
- FDDI (Fiber Distributed Data Interface)
- Fiber Channel
The old frame format, interfaces and rules are kept. The bit time is reduced from
100nsec to 10nsec. All fast Ethernet systems use hubs and switches. The supported
cabling was:
- Category 3 twisted pair which cant transmit 200 megabaud signals (100 Mbps
with Manchester) on 100m.
- Category 5 twisted pair
- Fiber optics
- All three alternatives are allowed.
The Category 3 UTP scheme, called 100Base-T4, used a signaling speed of 25 MHz, only 25% faster than
standard Ethernets 20 MHz. (Remember that Manchester encoding, discussed in Sec. 2.5, requires two
clock periods for each of the 10 million bits sent each second.) However, to achieve the necessary bit
rate, 100Base-T4 requires four twisted pairs. Of the four pairs, one is always to the hub, one is always
from the hub, and the other two are switchable to the current transmission direction. To get 100 Mbps
out of the three twisted pairs in the transmission direction, a fairly involved scheme is used on each
twisted pair. It involves sending ternary digits with three different voltage levels. This scheme is not
likely to win any prizes for elegance, and we will skip the details. However, since standard telephone
1
wiring for decades has had four twisted pairs per cable, most offices are able to use the existing wiring
plant. Of course, it means giving up your office telephone, but that is surely a small price to pay for
faster email. 100Base-T4 fell by the wayside as many office buildings were rewired with Category 5 UTP
for 100Base-TX Ethernet, which came to dominate the market. This design is simpler because the wires
can handle clock rates of 125 MHz. Only two twisted pairs per station are used, one to the hub and one
from it. Neither straight binary coding (i.e., NRZ) nor Manchester coding is used. Instead, the 4B/5B
encoding we described in Sec 2.5 is used. 4 data bits are encoded as 5 signal bits and sent at 125 MHz to
provide 100 Mbps. This scheme is simple but has sufficient transitions for synchronization and uses the
bandwidth of the wire relatively well. The 100Base-TX system is full duplex; stations can transmit at 100
Mbps on one twisted pair and receive at 100 Mbps on another twisted pair at the same time. The last
option, 100Base-FX, uses two strands of multimode fiber, one for each direction, so it, too, can run full
duplex with 100 Mbps in each direction. In this setup, the distance between a station and the switch can
be up to 2 km. Fast Ethernet allows interconnection by either hubs or switches. To ensure that the
CSMA/CD algorithm continues to work, the relationship between the minimum frame size and
maximum cable length must be maintained as the network speed goes up from 10 Mbps to 100 Mbps.
So, either the minimum frame size of 64 bytes must go up or the maximum cable length of 2500 m must
come down, proportionally. The easy choice was for the maximum distance between any two stations to
come down by a factor of 10, since a hub with 100-m cables falls within this new maximum already.
However, 2-km 100Base-FX cables are SEC. 4.3 ETHERNET 293 too long to permit a 100-Mbps hub with
the normal Ethernet collision algorithm. These cables must instead be connected to a switch and
operate in a full-duplex mode so that there are no collisions. Users quickly started to deploy fast
Ethernet, but they were not about to throw away 10-Mbps Ethernet cards on older computers. As a
consequence, virtually all fast Ethernet switches can handle a mix of 10-Mbps and 100-Mbps stations. To
make upgrading easy, the standard itself provides a mechanism called auto negotiation that lets two
stations automatically negotiate the optimum speed (10 or 100 Mbps) and duplexity (half or full). It
works well most of the time but is known to lead to duplex mismatch problems when one end of the link
auto negotiates but the other end does not and is set to full-duplex mode (Shalunov and Carlson, 2005).
Most Ethernet products use this feature to configure themselves.
Gigabit Ethernet
1. After the fast Ethernet, the 802 committee began working on a yet faster Ethernet aka
gigabit Ethernet. The goals were to: increase performance tenfold while maintaining
compatibility with all existing Ethernet standards. Gigabit Ethernet had to offer
unacknowledged datagram service with both unicast and broadcast, use the same 48-bit
addressing scheme already in use, and maintain the same frame format, including the
minimum and maximum frame sizes. The final standard met all these goals. Like the fast
Ethernet, the gigabit Ethernet used point-to-point links. It supports full duplex and half
duplex mode. The normal mode is full duplex. There are always 2 pairs of wires in the
UDP cable used to connect the station to a switch or hub. Ethernet is characterized with
CSMA/CD MAC protocol when it works in half duplex. For full duplex CSMA/CD is not
used, especially in gigabit Ethernet since it mostly works in this mode.
Min frame size
- Smaller network?
o 512bits @ 1Gb/s =512ns
o 512ns*1.8*10^8 = 92meters => too little!!
- Larger min frame size!
o Gigabit Ethernet uses collision extension for small frames and
compatibility issues
Max frame
- 1500 bytes do not encompass the network
- jumbo frames (9000 bytes) are defined for higher efficiency
2. Frame size A carrier extension was added in which the normal frame is padded up to
512B and 9% efficiency (46B are sent as 512). And frame bursting which includes
concatenating frames. The cabling that is used is:
Lecture 6: Bridge
Bridges are used for interactions between different networks and for interconnection of
geographically distributed LANs. Like multiple buildings each with its own LAN. Bridges operate
in the Data link layer, so they examine the data link layer addresses to forward frames. Routers
examine the addresses in packets and route based on them, so they work only with protocols
that they were designed to handle.
1. 802.x <->802.y Bridge
The bridge that connects k different LANs will have k different MAC sublayers
and k different physical layers, one per each type.
The problem occurs when having to convert from different formats, from 802.3
to 802.11 to 802.16 and vice versa.
3. STP disables the creation of loops STPs goals is to avoid and eliminate loops by
discerning loop-free paths via the root bridge. STP locates the loop and blocks the
redundant links. STP makes sure that there will be only one path between any pair of
devices. STP executes the Spanning Tree Algorithm: STA chooses a referent point
known as a root bridge and determines the paths to it. If multiple paths exist STA
chooses the best one and blocks the rest. STA uses 3 simple steps in order to converge
into a tree topology:
STP convergence
Step 1 Choose one Root bridge
The switches choose one root bridge among themselves. The switch with the lowest MAC
address wins.
Step 2 Mark ports
Upon choosing the root, the switches mark the Root ports. Root port of a bridge is the port
closest to the Root. Prices are used to determine the distance. Each non-Root bridge will mark
one Root port. Bridges propagate the Root Path Cost cumulative price of the path to the Root.
Step 3 Mark Designated ports
In this step, after marking the designated ports, the STP loop protection is enabled. Designated
port is one port that is allowed to send and receive traffic to-from the network segment and
the Root. Each network segment has one Designated port, chosen based on the cumulative Root
Path Cost to the Root bridge.
Lecture 7: Switching
1. Circuit switching
The telecommunication networks in the beginning were designed for voice
transmission. The network resources were dedicated to one call in one moment of time.
When we use this kind switching for data transmission, the link will be unused most of
the time. The link provides constant data rate. The stations must have equal data rate.
2. Packet switching
Data is sent in small packets, mostly 1000 octets. Long messages are divided in a
sequence of packets. Each packet holds user data + control information. The control
information is needed to route the packet in the network. In each node of the network,
the packet is received, stored and processed, then forwarded towards the next node.
The pros of this kind of switching is that the line usage is better. One node-node link can
be shared for transferring multiple packets with different sources and destination pairs.
The packets wait in queues and are transmitted as fast as possible. Data rate
conversion. Two stations with different data rates can exchange packets while each
connects to its node with its own data rate. Two nodes store the packets if data rate
equalization is needed. Packets are accepted even in loaded networks. The delivery
time rises and priorities can be used.
3. Transmission techniques
The sender divides the message into multiple packets. One packet per time unit is sent.
Packets are managed in two ways:
Datagram
Each packet is treated independently from the rest that have been sent before.
All packets that have the same destination can travel via different routes.
Packets can be received out of order. Some packets may be lost. The receiver is
tasked to reorder the packets and handle the lost packets.
Virtual circuit
Before packets are sent, a circuit to the destination is established. Control
packets are used for the circuit establishment. Each packet has its own identifier
(circuit number) instead of destination address. No need for routing decisions.
The clear request control packet is used to drop the virtual circuit. The route is
not dedicated.
In the virtual circuit: There is ordered delivery and error control. Fast packet forwarding, no
routing decisions in the nodes. It is less reliable; node failure will cause all virtual circuits that
pass through that node to drop.
In the datagram: No circuit establishment phase, better for smaller number of packets. More
flexible, using routing the congested part of the network can be avoided. Dividing the frames
into packets is ok, but you have to know how many packets to divided it to for it to be efficient.
Because over dividing is not an efficient solution.
4. Circuit switching vs. packet switching
Performances: Propagation delay, Transmission time, Node latency.
10
I.
II.
Addressing
Encapsulation
Routing
Decapsulation
Addressing
a. IP Destination Address 32-bit binary value that represents the packet
destination Network layer host address.
b. IP Source Address 32-bit binary value that represents the packet source
Network layer host address.
Routing the router checks the destination addresses on Layer 3 in order to decide on
forwarding the packets. It performs look up in his routing table. It forwards the packet
to the next hop (router) or destination host in case when LAN network is directly
attached to the router.
The Internet Protocol (IPv4 & IPv6) is the most widely used Layer 3 protocol.
Layer 3 (IP) speed vs reliability. It is unreliable because it has no ability to dead with or
recover from lost or damaged packets. That is the job of the TCP at the end users.
Responsibility of the OSI Data Link layer to take an IP packet and prepare it for
transmission over the communications medium. Transport of IP packets is not limited to
any particular medium. In some cases, a router will need to split up a packet when
forwarding it from one media to a media with a smaller MTU. Framing the packet or
fragmentation.
11
When a packet is first generated, the value is entered into the TTL field. TTL is set to a specific
value which is then decremented by each router (UNIX:255, LINUX:64 or 255, MICROSOFT
WINDOWS 95: 32, MICROSOFT VISTA: 128). If the router decrements the TTL field to 0, it drops
the packet. In this way the IP packet cant travel endlessly from router to router.
Protocol Type field enables the Network layer to pass the data to the
appropriate upper-layer protocol 01 ICMP, 06 TCP, 17 UDP.
ToS Type of Service field is used to determine the priority of each
packet. Enables Quality-of-Service (QoS) mechanism for high priority
traffic such as: VoIP (Voice over Internet Protocol) and Streaming video.
For ToS to me used hosts set ToS field (can be intermediary device such
as a switch). Routers must be configured to examine ToS.
Version Contains the IP version number (4)
Header Length (IHL) Specifies the size of the packet header.
Packet Length This field gives the entire packet size including header
and data, in bytes.
Identification This field is primarily used for uniquely identifying
fragments of an original IP packet.
Header Checksum The checksum field is used for error checking the
packet header.
Options for additional fields in the IPv4 header in order to provide
other services but these are rarely used.
IPV4 ADDRESSING
IPV4 addresses are 32 bits. Dot notation (or dot-decimal notation) is used in order to
represent the values of each IP address byte into the decimal numbering system. The IP
address has two parts:
1. Network part
2. Host part
Classful IP addressing: The value of the first octets (bytes) determines the network part. Used
with the classful routing protocols like RIPv1. The IP routing tables are still structured according
to the classful routing in order to gain speed while processing.
Subnet mask used to determine the Network part and Host part. 32 bits. Continuous
string of 1s after a continuous string of 0s follows. Network part=1, Host part=0. Is
expressed using a decimal dot and slash notation (prefix length)
Address types: Network Address, Broadcast Address, Host Address
Network address part of the address used by the router for path determination.
12
CIDR was introduced as a result to: No available class B networks from the IP address
space. The routing tables in the routers have grown so much big that the hardware,
software and human resources could not deal with them, A shortage of free IP
addresses. CIDR is a methodology that defines a new way of assigning IP addresses and
forwarding IP packets.
CIDR helps reduce the routing tables usng route summarization (aggregation). It enables
abandoning the limits of the classful division.
VLSM = Variable Length Subnet Mask Enables flexible definition of the network size.
The routing protocol now has info about the subnet mask length, which can be variable
and is defined according to needs.
packets destination. Using a routing table to make routing decisions is like using a
signpost and deciding which direction to go. If there is no sign for your direction, you
may be LOST! For all other networks there is an interface to take and get more
instructions. If there is no route to the destination the router will DROP the packet!
Directly connected networks are automatically added to the routing table. Static routes
can be added using the route command. Default gateways can be added using the route
command. Dynamic routing services that use routing protocols like RIP and OSPF can
add additional routes to the routing table. Destination shows the networks that a route
exists for. The 0.0.0.0 network is used for the default route. Gateway specifies the nexthop router or uses 0.0.0.0 for local directory-connected interfaces. Genmask is the
mask applied to incoming destination IP addresses to determine if a route exists. These
are stored by longest (best match) to shortest prefix. Note the genmask of 0.0.0.0 is
used for default route. Applying this mask to any address will always result in a match.
Possible flags include: U(route is up), H(target is a host), G(use gateway). Metric the
distance to the target (usually counted in hops). It is not used by recent kernels, but may
be needed by routing daemons. Iface interface to which packets for this route will be
sent.
Path Determination
A router determines the path of a packet from one data link to another, using two basic
functions:
o A path determination function
o A switching function is the internal process used by a router to accept a packet
on one interface and forward it to a second interface on the same router. A key
responsibility of switching function of the router is to encapsulate packets in the
appropriate frame type for the next data link.
14
Packet Forwarding
Host X has a packet to send to host Y. A router generally relays a packet from one data
link to another, using two basic functions:
1. A path determination function ROUTING
2. A switch function PACKET FORWARDING
Host X begins by encapsulating the IP packet into a data link frame (in this case
Ethernet) with RTAs Ethernet 0 interfaces MAC address as the data link destination
address. Because the IP Source and IP Destinations addresses are on different networks
Host X knows to forward the packet to RTA and not directly to Host Y. By checking the
ARP Table for Default Gateway IP Addresses and associated MAC addresses, host X
knows or gets the RTAs Ethernet address. If there is not an entery in the ARP Table,
host X sends an ARP Request and RTA sends an ARP Reply.
RTA
1. RTA examines Destination MAC address, which matches the E0 MAC address, so it
copies in the frame.
2. RTA sees the Type field is 0x800, IP packet in the data field, a packet which needs to
be routed.
3. RTA strips off the Ethernet frame.
RTA looks up the Destination IP Address in its routing table.
192.168.4.0/24 has next-hop-ip address of 192.168.2.2 and an exit interface e1. Since
the exit interface is on an Ethernet network, RTA must resolve the next-hop-ip address
with a destination MAC address.
4. RTA looks up the next-hop-ip address of 192.168.2.2 in its ARP cache.
If the entry was not in the ARP cache, the RTA would need to send an ARP request out e.
RTB would send back an ARP reply, so RTA can update its ARP cache with an entery for
192.168.2.2
15
RTB
1. RTB examines Destination MAC address, which matches the E0 MAC address, and copies
in the frame.
2. RTB sees Type field, 0x800, IP Packet in the data field, a packet which needs to be
routed.
3. RTB strips off the Ethernet frame.
RTB looks up the Destination IP Address in its routing table.
16
RTC
1. RTC copies in the datalink (serial, PPP) frame.
2. RTC sees the Type field is 0x800, IP packet in the data field, a packet which needs to be
routed.
3. RTC strips off the data link, serial, frame.
RTC looks up the Destination IP Address in its routing table.
RTC realizes that this Destination IP Address is on the same network as one of its
interfaces and it can send the packet directly to the destination and not another router.
Since the exit interface is on a directly connected Ethernet network, RTC must resolve
the destination ip address with a destination MAC address.
4. RTC looks up the destination ip address of 192.168.4.10 in its ARP cache. If the entery
was not in the ARP cache, the RTC would need to send an ARP request out e0. Host Y
would send back an ARP reply, so RTC can update its ARP cache with an entry for
192.168.4.10.
5. Packet is encapsulated into a new data link (Ethernet) frame and send out the interface.
Host Y
Layer2: Data link Frame
1. Host Y examines Destination MAC address, which matches its Ethernet interface MAC
address, and copies in the frame.
2. Host Y sees the Type field is 0x800, IP packet in the data field, which needs to be sent to
its IP process.
3. Host Y strips off the data link, Ethernet, frame and sends it to its IP process.
17
Layer 3: IP Packet
4. Host Ys IP process examines the Destination IP Address to make sure it matches its own
IP Address If it doesnt, the packet will be dropped.
5. The packets protocol field is examined to see where to send the data portion of this IP
packet: TCP, UDP or other. (which is for Layer 4)
Two Subnets
Routed Networks
Two subnets
Several collision domains one per switch port.
Communication between subnets
Two different broadcast domains, since the router doesnt forward L2 broadcasts such
as ARP requests.
VLAN Tagging is used when the link needs to carry traffic for more than one VLAN.
Trunk link as the frames from the hosts are coming, a unique VLAN identifier is added
to each header. This information in the header defines the VLAN membership for each
frame. The frames are sent through all trunk lines.
Upon reaching the other Switch, the VLAN ID is removed from the frame and it is
forwarded to the destination device.
There are two methods for frame tagging
o Cisco proprietary Inter-Switch Link (ISL)
o IEEE 802.1Q 802.1Q inserts 4 bytes in the Ethernet frame. The 802.1Q tag is
inserted by the switch before the frame starts to travel via the trunk line. The
switch removes the 802.1Q tag before it is sent via an ordinary link.
19
Dynamic uses a route that a routing protocol adjusts automatically for topology or traffic
changes.
21
Routing table updates occur when the topology changes. As with the network discovery
process, topology change updates proceed step-by-step from router to router. With some
routing protocols routing tables updates happen on a periodic basis. Distance-vector routing
protocols do not allow router to know the topology of the network, as they only know how far
a network is (distance: hops) and which way to forward the packet (vector: exit interface).
(Link-state routing protocols allow routers to see the exact network topology later.)
Distances (hops) are cumulative from one router to the next.
Problem: Routing Loops Distance vector routing protocols are simple in their implementation
and configuration, but this comes at a price. Pure distance vector routing protocols suffer from
possible routing loops. Routing loops can cause major network problems, form packets getting
lost (blackholed) in your network, to bringing down your entire network. Several remedies have
been added to distance-vector algorithms to help prevent routing loops including: split horizon,
hold-down timers and defining a maximum metric.
Problem: Counting to infinity The routing loop creates another problem known as Counting
to Infinity. This condition, loops packet continuously around the network in spite of the
fundamental fact that the destination network, Network 1, is down. While the routers are
counting to infinity, the invalid information allows a routing loop to exist. Without
countermeasures to stop the process, the distance vector (metric) of hop count increments
each time the packet passes through another router. These packets loop through the network
because of wrong information in the routing tables.
22
Simple Split Horizon Avoiding Routing Loop Routers RTA and RTB have their initial routing
tables and are ready to exchange routing information via a distance-vector routing protocol like
RIP.
Simple Split Horizon disabled If split horizon were disables the routing updates would
include all of the networks in their routing tables including their directly connected networks
and any networks learned from any interface
Simple Split Horizon Rule The effect of split horizon is that a router will send out different
routing messages on different interfaces. A router never sends out information on an interface
that it learned from that interface.
Simple Split Horizon with Poison Reverse Many vendor implementations of distance vector
routing protocols apply a special kind of split horizon, called split horizon with poison reverse.
Split horizon with poison reverse means that, instead of not advertising routes to the source,
routes are advertised back to the source with a metric of 16, which will make the source router
ignore the route. It is perceived that explicitly telling a router to ignore a route is better than
not telling it about the route in the first place. One drawback is that routing update packet sizes
will be increased when using Poison Reverse, since they now include these routes.
Link-State Theory The network is viewed as a graph, showing the complete topology of the
network. This is how the routers build this topology:
Flooding of link-state information The first thing that happens is that each node, ruter
on the network, announces its own piece of link-state information to all other routers
on the network: who their neighboring routers are and the cost of the link between
them. Each router sends these announcements to all of the routers in the network.
Building a Topological Database Each router collects all of this link-state information
from other routers and puts it into a topical database.
Shortest-Path First (SPF), Dijkstras Algorithm Using this information, the routers can
recreate a topology graph of the network.
Shortest Path First Tree This algorithm creates an SPF tree, with the router making
itself the root of the tree and the other routers and links to those routers, the various
branches.
Routing Table Using this information, the router creates a routing table.
23
NAT turns private IP addresses into public IP addresses. The public-private IP address pairs are
kept in a table. The incoming traffic is directed towards the private IP address that initiated it,
according to the table entries.
PAT or NAT Overload is very similar to NAT. PAT enables 2 or more computers to share one
public IP address. Ex. Using Pat and one public IP address one can enable Internet access to all
employees in one company, or all ADSL subscribers. PAT assigns the outgoing packets a public
IP address and a unique port number. In the Pat table both values are recorded: public IP
address, port number. The incoming traffic routing is done using the unique port number.
Dynamic PAT NAT Overload Hides the whole set of private IP addresses into one (or
several) public IP addresses.
NAT
PROS: Savings on the legally registered address scheme. Increased flexibility on the links to the
public network. Provides consistency of the internal address scheme. Provides network
security.
CONS: Performance degradation. End-to-end functionality disruption. Tracking end-to-end IP
connections disruption. Setting up TCP connection is more difficult. The existing architectures
need to be adapted to deal with the changes.
24
IPv6 characteristics
Larger address space, NAT elimination, Broadcast addresses elimination, Simpler header for
higher routing efficiency, Mobility and security support, Transmission richness
2. Larger address space
IPv4 32 bits or 4 bytes
IPv6 128 bits or 16 bytes
- Address assignment: using DHCP or Stateless Autoconfiguration.
- Built-in mobility support
- Route aggregation, summarization: easier Internet address blocks summarization
=> more efficient routing
- No need for NAT/PAT: NAT creates problems on the application layer. By
removing NAT/PAT more efficient routing can be achieved.
- No broadcast: IPV6 doesnt use broadcast addresses on later 3, uses multicast
instead.
- Transition mechanisms: a large number of mechanisms are proposed for
transitioning from IPv4 to IPv6.
IPv3 header: 12 basic header fields + options & padding | data (transport segment).
Fixed size = 20 octets + options
IPv6 header: 8 fields = 40 octets. 1 new (Flow label), 7 similar to IPv4, 7 removed.
Extension headers.
25
3. Address representation
128 bit IPv6 addresses = 8 16 bit segments. Each segment is written in its hexadecimal form
(0x0000 0xFFFF). All segments are separated using colons :
Ex. 3ffe:1944:0100:000a:0000:00bc:2500:0d0b
4. Network prefix
IPv4, network prefix network part of the address is identified using the subnet mask
in dot decimal form or using bitcount
255.255.255.0 or /24
IPv6 network prefix is always identified using bitcount. All addresses are followed by a
slash notation.
CIDR notation or prefix notation
3ffe:1944:100:a::/64
16
32
48 64 bits
Dual stack
Tunneling : 6to4 tunnel. ISATAP tunnel. Teredo tunnel. Etc
a) Dual stack Two protocol stacks for IPv4 and IPv6 implemented in the hosts. The
implementations are independent or hybrid. With Ipv4 the host communicates using the
IPv4 protocol. With IPv6 the host communicates using the IPv6 protocol.
b) Tunneling Tunnels connect isolated IPv6 hosts over IPv4 infrastructure. IPv6 packets
are packed into IPv4 packets. IPv4 protocol is used as a data layer protocol for the IPv6
protocol.
26
27
Addressing
Connection establishment
Connection release
Flow control & buffering
Multiplexing
Both data link layer and transport layer protocols implement flow and error control, that is way
they have protocols. We need two very similar protocols because there is a huge difference in
the medium over which the protocols communicate. Data link layer protocols communicate
directly over the medium, while transport layer protocols over a network of nodes they may
unpredictably delay, drop or duplicate packets.
1. Addressing
You have opened a couple of Gmail messages in different browser tabs. The Gmail server
decides to which of the tabs to send which message content through the transport layer which
includes addressing. Each browser tab has its own transport address and using that address
creates a connection to the Gmail server. TCP/IP address = port. In ATM = AAL SAP.
2. Connection establishment
The simplest case:
- Send CONNECTION REQUEST
- Wait CONNECTION ACCEPTED
Packets can be delayed, lost, or worst of all duplicated. The problem of delayed duplicates is
not solved for 100% of the cases. For solving the problem of delayed duplicates:
a) Use new transport layer address for each connection.
b) Assign a connection IP to each connection (sequence number that is incremented
with each packet)
c) Setup a mechanism for killing the old packets using: Special loopless network design.
Setting a hop count in the packets. Setting a timestamp in each packet (needs
synchronization)
3. Flow control and buffering.
Similar to data link layer flow control => sliding window. Differences: routers have multiple
interfaces, hosts have a large number of connections => hard to implement the data link layer
strategies. The sender must buffer the messages that need to be sent in case they need to be
resent. The receiver, may, but doesnt have to, buffer the messages temporarily.
28
4. Multiplexing
a) Upward multiplexing (one network address for all connections)
b) Downward multiplexing (one connection uses multiple network addresses for increasing
sending speed)
UDP + RTP
1. UDP header | User Datagram Protocol (UDP) | UDP Protocol | UDP Services
Connectionless (No session establishment): UDP doesnt establish a connection between the
hosts before data can be send and received.
Unreliable Delivery (Any segments lost are not resent): UDP doesnt guarantee delivery of data,
data can be lost on the way, lost data is not retransmitted by the source.
29
Internet radio
Internet telephony
On-demand music
Videoconference
Each application re-invented the same stuff. Thus, the need for a generic real-time transport
protocol had arisen. RTP is positioned in the application layer, it is executed in the OS user
space. Packet nesting.
Multimedia applications have multiple streams: audio, video, text, etc. Streams are sent to the
RTP library, that works in the OS user space together with the multimedia application. The
library multiplexes the streams and forms RTP packets. These packets are sent using a socket.
The OS core creates UDP segments that are picked into IP packets, packed into Ethernet
frames. RTP multiplexes multiple real-time streams into one UDP stream. No delivery guarantee
or jitter guarantee. Each RTP packet has a sequence number:
30
RTP has no flow control, error control, acknowledgments, and re-transmissions. RTP time
stamps the packets. This enables jitter reduction and synchronization of multiple strams.
Payload type what coding algorithm is being used in the segment (MP3)
Sequence number to identify lost packet
Timestamp time the first packet is made (for synchronization and jitter regulation)
TCP
31
32
Step 3:
TCP client answers with a segment that contains the ACK as a response to the SYN sent by the
server. Acknowledgment number = sequence number form the server +1. The client can start
sending data.
Silly window syndrome:
The buffer at the receiver is
full. The application at the
receiver will read one byte.
The TCP layer at the receiver
will send a message to the TCP
layer at the sender that there
is free space for one byte. The
sender will send one byte. The
communication is byte-bybyte as in a stop & wait
scenario. Clarks solution is to
force the sender to wait until
there is a significant amount
of free space in the buffer.
Nagles algorithm:
If we have data to send, but the open window is smaller than the max segment size, we might
wait with the transmission. If we wait too long, interactive applications like telnet suffer. If it is
too soon, we risk to send small packets and enter the silly window syndrome. Solution: set a
timer and send when it expires. We can segment every 100 ms, for an example Nagle presented
a more elegant solution. The key ideas were as long as TCP has unacknowledged data, the
receiver will eventually get an ACK. This ACK can be used as a trigger event to send new data.
Half of the window or max segment size has been reached.
Slow start:
The sender is limited by two windows. One window is flow control. The other is congestion
control. The amount of information that the sender can send at once is the min of the two
windows. Example on setting the size of the congestion window: Sender sends a segment and
33
waits for ACK; Then sends 2 segments and waits for ACK; Then sends 4 segments and waits for
ACK; As long as an ACK is received, the number of segments that can be sent doubles.
Internet congestion control algorithm:
There is one more parameter: threshold. If the unACK segments timers expire, the threshold is
set to the half of the congestion window. The congestion window is reset to 1. The slow start
algorithm is activated as long as the congestion window is smaller than the threshold. Above
the threshold, the congestion window increases linearly.
Well Known Ports (Numbers 0 to 1023) Reserved for common services and
applications. Client: TCP destination port ;
Server: TCP source port.
Registered Ports (Numbers 1024 to 49151) Assigned to user processes or applications.
Non-common applications: Client: TCP destination port
;
Server: TCP source
port. May also be used as dynamic or private port.
Dynamic or Private Ports (Numbers 49152 to 65535) Also known as Ephemeral Ports.
Usually assigned dynamically to client applications when initiating a connection: Client:
TCP source port
;
Server: TCP destination port. May also include the range of
Registered Ports (Numbers 1024 to 49151).
The thing that makes each connection unique is the connection defined by the pair of numbers:
Source IP address, Source port (From Client to Server)
; Destination IP address, Destination
port (From Server to Client). Different connections can use the same destination port on server
host as long as the source ports or source IPs are different.
Sockets
Combining the transport layer port number and the network layer IP address uniquely identifies
a particular application process running on an individual host device. This combination is called
a socket. A socket pair, consisting of the source and destination IP addresses and port numbers,
is also unique and identifies the specific conversation between the two hosts. A client socket
might look like this, representing the source IP address and source port number:
192.168.1.101:49888. The socket on a web server might be, representing the destination IP
address and destination port number: 192.133.219.25:80. Together, these two sockets combine
to form a socket pair: 192.168.1.101:49888, 192.133.219.25:80.
34
35
5. HTTP Request message There are two types of HTTP messages: request and response
a. HTTP request message ASCII (human-readable format) general format:
36
6. Web caches (proxy server) The goal is to satisfy client request without involving origin
server. User sets browser: Web access via cache. Browser sends all HTTP request to
cache:
- Object in cache: cache returns object
- Else cache requests object from origin server, then returns object to client.
Cache acts as both client and server. Typically, cache is installed by ISP. Web caching is used to
reduce response time for client request. Reduce traffic on an institutions access link.
Assumptions Average object size = 1 000 000 bits. Average request rate from institutions
browsers to origin servers = 15sec. Delay from institutional router to any origin server and back
to router = 2 sec.
Consequences Utilization on LAN = 15%. Utilization on access link = 100%. Total delay =
Internet delay + access delay + LAN delay = 2 sec + minutes (congested) + milliseconds.
Possible solution Increase bandwidth of access link to, say, 100 Mbps
Consequence Utilization on LAN = 15%. Utilization of access link = 15%. Total delay = Internet
delay + access delay + LAN delay = 2 sec + msecs + msecs. But often a costly upgrade.
Possible solution: install cache Suppose hit rate is 0.4
Consequence 40% requests will be satisfied almost immediately. 60% requests satisfied by
origin server. Utilization of access link reduces to 60%, resulting in negligible delays (say 10
msec). Total average delay = Internet delay + access delay + LAN delay = 0.6*(2.01)sec +
0.4*milliseconds <1.4 secs.
Caching Conditional GET The goal is to dont send object if cache has up-to-date cached
version. Cache: specify date of cached copy in HTTP request if-modified-since:<date>. Sever:
response contains no object if cached copy is up-to-date: HTTP/1.0 304 Not Modified.
7. FTP: File Transfer Protocol Transfer file to/from remote host. Client/Server model
(Client: side that initiates transfer either to/from remote |
Server: remote host).
ftp: RFC 959. ftp server: port 21.
8. FTP: Separate control, data connections
FTP client contact FTP server at port 21, TCP is transport protocol. Client authorized over
control connection. Client browses remote directory by sending commands over control
connection. When serer receives file transfer command, server opens 2nd TCP connection (for
file) to client. After transferring one file, server closes data connection. Server opens another
TCP data connection to transfer another file. Control connection is out of band (http has inband). FTP server maintains state: current directory, earlier authentication.
37
38
DHCP server formulates DHCP, ACK containing clients IP address, IP address of first-hop router
for client, name & IP address of DNS server. Encapsulation at DHCP server, frame forwarded
(switch learning) through LAN, demultiplexing at client. DHCP client receives DHCP ACK reply.
Client now has IP address, knows name & address of DNS server, IP address of its first-hop
router. Before sending HTTP request need IP address of www.google.com: DNS
- DNS query created, encapsulated in UDP, encapsulated in IP, encapsulated in Ethernet.
In order to send frame to router, need MAC address of router interface: ARP.
- ARP query broadcast, received by router, which replies with ARP reply giving MAC
address of router interface.
- Client now knows MAC address of first hop router, so can now send frame containing
DNS query.
- IP datagram containing DNS query forwarded via LAN switch from client to 1 st hop
router.
- IP datagram forwarded from campus network into Comcast network, routed (tables
created by RIP, OSPF, IS-IS and/or BGP routing protocols) to DNS server.
- Demuxed to DNS server
- DNS server replies to client with IP address of www.google.com
- To send HTTP request, client first opens TCP socket to web server.
- TCP SYN segment (step 1 in 3-way handshake) inter-domain routed to web server.
- Web server responds with TCP SYNACK (step 2 in 3-way handshake)
- TCP connection established!
WEB PAGE FINALLY DISPLAYED
-
39
If an IP packet is sent
outside of the local
network.
When A wants to
send a packet outside
the network it sends
an ARP to the router.
In As ARP CACHE the
IP address of the
router and the MAC
address are written,
and the packet is
sent. When the
packet reaches the
router, the router will
forward the frame
based on a route in
its table.
40
1. Message types in ARP there are 4 message types in ARP protocol. They are identified
by 4 values in the operation field in the ARP message.
ARP request
ARP reply
RARP request
RARP reply
The ARP message format has: 16bits for HARDWARE TYPE, 16bits for PROTOCOL TYPE. 8bits
HARDWARE ADDRESS LENGTH, 8bits PROTOCOL ADDRESS LENGTH, 16bits OPERATION, 32bits
SENDER HARDWARE ADDRESS, 16bits SENDER HARDWARE ADDRESS, 16bits SENDER IP
ADDRESS, 16bits SENDER IP ADDRESS, 16bits TARGET HARDWARE ADDRESS, 32bits TARGET
HARDWARE ADDRESS, 32bits TARGE IP ADDRESS.
41
42
- Network address determination from IP address and subnet mask. Logical AND of the address
and the subnet mask
Left part (k bits) marked by the 1-s of the subnet mask (remains the same)
Right part (32 k bits) is replaces by 0-s
Left part (k bits) marked by the 1s of the subnet mask (remains the same)
Right part (32 k bits) of the address are set to 1s
4. IP addressing
IP address has 32 bits identifier for host, router interface. An interface is a connection between
host, router and physical link. Routers typically have multiple interfaces. Host may have
multiple interfaces. IP addresses associated with interface, not host, router. To find the
networks we detach each interface from router, host and create islands of isolated networks.
43
5. Subnet Addressing External routers need to store entries only for the network ID.
Internal routers and hosts use subnet mask to identify subnet ID and route packets
between subnets within the network
6. How to get an IP address:
Hosts hard-coded by system admin in a file. DHCP (Dynamic Host Configuration
Protocol) dynamically get address: plug-and-play. Host broadcasts DHCP
discover msg. DHCP server responds with DHCP offer msg. Host requests IP
address: DHCP request msg. DHCP server sends address: DHCP ack msg.
ISP gets block of addresses with ICANN (Internet Corporation for Assigned
Names and Numbers) allocates addresses, manages DNS, assigns domain
names, resolves disputes.
7. Local network output
Default Gateway network output port One IP address from the local address
space is defined to be an output. All packets addressed outside of the local
network will be sent to the output port.
44
Link layer will send datagram directly to B inside link-layer frame. A and B are
directly connected.
Starting at A, destination E looking up network address of E. E is on a different
network. A and E are not directly attached. Routing table: next hop router to E is
223.1.1.4 link layer sends datagram to router 223.1.1.4 inside link-layer frame.
Datagram arrives at 223.1.1.4, destination is 223.1.2.2. Look up network address
of E, E on the same network as routers interface. Router and E are directly
attached. Link layer sends datagram to 223.1.2.2 inside link-layer frame via
interface 223.1.2.9 datagram arrives at E.
9. IP Features
Provides:
Connectionless service
Addressing
Data forwarding
Fragmentation and reassembly
Supports variable size datagrams
Best-effort delivery
Provides only Send and Delivery services. Error and control messages
generated by Internet Control Message Protocol (ICMP)
Doesnt provide
End-to-end data reliability and flow control (done by TCP or application layer
protocols)
Sequencing of packets (like TCP)
Error detection in payload (TCP, UDP or other transport layers)
Error reporting
(ICMP)
Setting up route
tables (RIP, OSPF,
BGP etc)
Connection setup
Address/Name
resolution (ARP,
RARP, DNS)
Configuration
(BOOTP, DHCP)
Multicast
45
46
(packet creation) Internet Control Message Protocol (ICMP) creates an echo request payload.
ICMP hands that payload to Internet Protocol (IP), which then creates a packet. At a minimum,
this packet contains an
o IP source address
o IP destination address
o Protocol field with 01h
All of that tells the receiving host whom it should hand the payload to when the destination I
reached in this example ICMP. Once the packet is created, IP determines whether the
destination IP address is on the local network or a remote one. Since IP determines that this is a
remote request, the packet needs to be sent to the default gateway so the packet can be
routed to the remote network. The Registry in Windows is parsed to find the configured default
gateway.
(resolve interface) The default gateway of host 172.16.10.2 (HostA) is configured to
172.16.10.1. For this packet to be sent to the default gateway, the hardware address of the
routers interface Ethernet 0 (configured with the IP address of 172.16.10.1) must be known. So
the packet can be handed down to the Data Link layer, framed, and sent to the routers
interface thats connected to the 172.16.10.0 network. Because hosts only communicate via
hardware address on the local LAN, its important to recognize that for HostA to communicate
to HostB, it has to send packets to the Media Access Control (MAC) address of the default
gateway on the local network. MAC addresses are always local on the LAN never go through
and past a router.
(ARP in action) Next, the Address Resolution Protocol (ARP) cache of the host is checked to see
if the IP address of the default gateway has already been resolved to a hardware address. If it
has, the packet is then free to be handed to the Data Link layer for framing. If the hardware
address isnt already in the ARP cache of the host and ARP broadcast is sent out onto the local
47
network to search for the hardware address of 172.16.10.1. The router responds to the request
and provides the hardware address of Ethernet 0, and the host caches this address.
(frame creation) Once the packet and destination hardware address are handed to the Data
Link layer, the LAN driver is used to provide media access via the type of LAN being used (in this
example Ethernet). A frame is then generated, encapsulating the packet with control
information. Within that frame are the hardware destination and source addresses plus, in this
case, an Ether-Type field that describes the Network layer protocol that handed the packet to
the Data Link layer in this instance, IP. At the end of the frame is something called a Frame
Check Sequence (FCS) field that houses the result of the cyclic redundancy check (CRC). It
contains HostAs hardware (MAC) address and the destination hardware address of the default
gateway. It doesnt include the remote hosts MAC address remember that!
Once the frame is completed, its handed down to the Physical layer to be put on the physical
medium one bit at a time. Every device in the collision domain receives these bits and builds
the frame. They each run a CRC and check the answer in the FCS field. If the answers dont
match, the frame is discarded. If the CRC matches, then the hardware destination address is
checked to see if it matches too. If its a match, then the Ether-Type field is checked to find the
protocol used at the Network layer. The packet is pulled from the frame, and what is left of the
frame is discarded. The packet is handed to the protocol listed in the Ether-Type field Its
given to IP. IP receives the packet and checks the IP destination address. Since the packets
destination address doesnt match any of the addresses configured on the receiving router
itself, the router will look up the destination IP network address in its routing table. The routing
table must have an entry for the network 172.16.20.0 or the packet will be discarded
immediately and an ICMP message will be sent back to the originating device with a destination
network unreachable message. If the router does find an entry for the destination network in
its table, the packet is switched to the exit interface in this example, interface Ethernet 1. The
router packet-switches the packet to the Ethernet 1 buffer. The Ethernet 1 buffer need to know
the hardware address of the destination host and first checks the ARP cache. If the hardware
address of HostB has already been resolved and is in the routers ARP cache, then the packet
and the hardware address are handed down to the Data Link layer to be framed. If the
hardware address has not already been resolved, the router sends an ARP request out E1
looking for the hardware address 172.16.20.2. HostB responds with its hardware address, and
the packet and destination hardware address are both sent to the Data Link layer for framing.
The Data Link layer creates a frame with the destination and source hardware address, EtherType field and FCS field at the end. The frame is handed to the Physical layer to be sent out on
the physical medium one bit at a time. HostB receives the frame and immediately runs a CRC. If
the result matches whats in the FCS field, the hardware destination address is checked. If the
48
host finds a match, the Ether-Type field is then checked to determine the protocol that the
packet should be handed to at the Network layer IP in this example. At the Network layer, IP
receives the packet and checks the IP destination address. Since theres finally a match made,
the Protocol field is checked to find out whom the payload should be given to. The payload is
handed to ICMP, which understands that this is an echo request. ICMP responds to this my
immediately discarding the packet and generating a new payload as an echo reply. A packet is
then created including the source and destination addresses, Protocol field and payload. The
destination device is now HostA.
(packet sending) IP then checks to see whether the destination IP address is a device on the
local LAN or on a remote network. Since the destination device is on a remote network, the
packet needs to be sent to the default gateway. The default gateway IP address is gound in the
Registry of the Windows device, and the ARP cache is checked to see if the hardware address
has already been resolved from IP address. Once the hardware address of the default gateway
is found, the packed and destination hardware addresses are handed down to the Data Link
layer form framing.
(frame sending) The Data Link layer frames the packet of information and includes the following
in the header:
o The destination and source hardware addresses
o The Ether-Type field with 0x0800 (IP) in it
o The FCS field with the CRC result in tow
The frame is now handed down to the Physical layer to be sent out over the network medium
one bit at a time. The routers Ethernet 1 interface receives the bits and builds a frame. The CRC
is run, and the FCS field is checked to make sure the answers match. Once the CRC is found to
be okay, the hardware destination address is checked. Since the routers interface is a match,
the packet is pulled from the frame and the Ether-Type field is checked to see what protocol at
the Network layer the packet should be delivered to.
(packet routing) The protocol is determined to be IP, so it gets the packet IP runs a CRC check
on the IP header first and then checks the destination IP address. (IP doesnt run a complete
CRC as the Data Link layer does it only checks the header of errors). In this case, the router
does know how to get to network 172.16.10.0 the exit interface is Ethernet 0 so the packet
is switched to interface Ethernet 0. The router checks the ARP cache to determine whether the
hardware address for 172.16.10.2 has already been resolved. Since the hardware address to
172.16.10.2 is already cached from the originating trip to HostB, the hardware address and
packet are handed to the Data Link layer. The Data Link layer builds a frame with the
destination hardware address and source hardware address and then puts IP in the Ether-Type
field. A CRC is run on the frame and the result is placed in the FCS field. The frame is then
handed to the Physical layer to be sent out onto the local network one bit at a time. The
49
destination host receives the frame, runs a CRC, checks the destination hardware address, and
looks in the Ether-Type field to find out whom to hand the packet to.
(Receive ICMP response) IP is the designated receiver, and after the packet is handed to IP at
the Network layer, it checks the protocols field for further direction. IP finds instructions to give
payload to ICMP, and ICMP determines the packet to be an ICMP echo reply. ICMP
acknowledges that it has received the reply by sending an exclamation point (!) to the user
interface. ICMP then attempts to send four more echo requests to the destination host.
IP routing example 1
HostA sends data to the HTTP server:
- The destination address of a frame, from
HostA, will be the MAC address of the F0/0
interface of the RouterA router.
- The destination address of a packet will be
the IP address of the network interface card
(NIC) of the HTTP server.
- The destination port number is the segment
header will have a value of 80.
IP routing example 2
HostA sends data to the HTTPS server:
-The destination address of a frame, from
HostA, will be the MAC address of the F0/0
interface of the RouterA router.
-The destination address of a packet will be
IP address of the network interface card (NIC)
of the HTTPS server.
-The destination port number in the
segment header will have a value of 443.
-Switches arent used as either a default
gateway of another destination, because
they have nothing to do with routing.
IP routing example 3
Host 4 communicated with the Sales server.
Host 4 sends ARP request. Host 4 receives ARP
reply, then creates package and frame. The
router Lab_A receives the package and forwards
it through the interface F0/0 towards the
server.
50
3. Routing
The goal of the routing protocols is to find good (the minimal cost) route (sequence of
routers) through the network from source to destination. Graph abstraction for routing
algorithms: nodes are router. Links are the physical connections. Link price: delay, price or
congestion level.
4. Classification of routing algorithms
Global: All routers know the whole network topology and link costs. Link state algorithms
Decentralized: Routers know only about the physically connected neighbors and the link costs
to them. Interactive process of calculation, exchange of partial information with neighbors.
Distance vector: algorithms.
Static: Routers change slowly in time. Manually entered routers. Stable
51
Dynamic: Routers learned by routing protocols. Routers change much faster. Periodic updates.
Depending on the link costs changes.
5. Static routing Used at hosts or very small networks. For each network prefix the
routers are manually entered.
Distance table Separate for each router. Row for each possible destination. Column for each
directly connected neighbor of the node. For example: in node X, for destination Y through
neighbor Z.
52
10. Routing Information Protocol (RIP) RIP distributed in BSD UNIX in 1982. Uses the
distance-vector algorithm. Metric: number of hops (max 15). Suitable for small
networks. Distance vectors: exchanged at every 30 seconds using Response Message
(called advertisements). Each advertisement has at maximum 25 routes. Classful
protocol, doesnt support VLSM. RIPv2 supports VLSM.
53
11. RIP Operation Router sends update message to neighbors every 30 seconds. A router
expects to receive an update message from each of its neighbors within 180 seconds in
the worst case. If router doesnt receive update message from neighbor X within this
limit, it assumes the link to X has failed and sets the corresponding minimum cost to 16
(infinity).
- The routes through the neighbor are invalid.
- New advertisement is sent to the other neighbors.
- The neighbors send new advertisements (if there is change in their routing table)
Uses split horizon with poisoned reverse. Convergence speeded up by trigged updates.
Neighbors notified immediately of changes in distance vector table. Routing tables in RIP are
managed by an application process named route-d (daemon). Advertisements are sent in UDP
packets, which are periodically repeated.
54
13. RIPv2
Provides:
-
VLSM support
Authentication
Multicasting
Tags to support EGP/BGP routes
Uses reserved fields in RIPv1 header. First route entry replaced by authentication info.
56
Creation of the states of the links by each node, called the link state packet or LSP.
Dissemination of LSPs to every other router, called flooding, in efficient and reliable
way.
Formation of a shortest path tree for each mode
Calculation of a routing table based on the shortest path tree
Flooding of LSPs The creating node sends a copy of LSP out of each interface. A node that
receives an LSP compares it with the copy it may already have.
Sequence number of the copy > sequence number of the arrived LSP = discard the arrived LSP
Otherwise, Discard the old LSP and keeps the new one. Send a copy of it out of each interface
except the one from which the packet arrived.
2. RFC 2328 (v2). Fixes some of the deficiencies in RIP. Enables each router to learn
complete network topology. Each router monitors the link state to each neighbor and
floods the link-state information to other routers. Each router builds an identical linkstate database. Allows router to build shortest path tree with router as root. OSPF
typically converges faster than RIP when there is a failure in the network.
Three tables:
Neighbor
Topology (no gossiping)
Routing
3. OSPF Logic
I. Each router discovers its neighbors on each interface. The list of neighbors is kept in a
neighbor table.
II.
Each router uses a reliable protocol to exchange topology information with its
neighbors.
III.
Each router places the learned topology information in its topology database.
IV. Each router runs SPF algorithm against its own topology database to calculate the best
routes to each subnet in the database.
V. Each router places the best route to each subnet in the IP routing table.
57
RID Router ID, the name of the router. The highest physical IP address. Virtual IP address beat
physical IP addresses. Router ID command.
OSPF terminology:
-
OSPF Features:
- Multiple routes to a given destination, one per type of service
- Support for variable-length subnetting by including the subnet mask in the routing
message
- Distribution of traffic over multiple paths of equal cost
- Authentication to ensure routers exchange information with trusted neighbors
- Uses notion of area to partition sites into subsets
- Designated router to minimize table maintenance ovverhead
At steady state All routers have same LS database. Know how many routers in network.
Interfaces & links between routers. Cost of each link (1-65.535) (CISCO -> 10^8 / bandwidth).
Occasional Hello messages (10 sec) & LS updates sent (30 min).
Metric OSPF protocol allows the administrator to assign a cost called the metric, to each
route. Base on a type of service (minimum delay, maximum throughput, and so on).
OSPF Network
- To improve scalability, AS may be partitioned into areas
o Area is identified by 32-bit Area ID
o Router in area only knows complete topology inside area & limits the flooding of
link-state information to area.
o Area border routers summarize information to areas
Each area must be connected to backbone area (area 0)
o Distributes routing info between areas
- Internal router (IR) has all links to nets within the same area
- Area border router (ABR) has links to more than one area
- Backbone router (BR) has links connected to the backbone
- Autonomous system boundary (ASB) router has links to another autonomous system
58
59
7.
8.
-
OSPF Issues
Processor intensive
Flooding traffic
Complexity: Five messages (Hello, exchange, request, update and ack). A lot of code
Open shortest path first
Suited for large networks
High CPU and memory demands
OSPF Concepts
o Link, Link-state, Area, Cost, Adjacencies database, Topological database,
Designated router (Router election with router ID), Backup designated router
60
61
62