Unit 2
Unit 2
The major components of the network are the ISP’s equipment (routers connected by
transmission lines), shown inside the shaded oval, and the customers’ equipment, shown
outside the oval. Host H1 is directly connected to one of the ISP’s routers, A, perhaps as a home
computer that is plugged into a DSL modem. In contrast, H2 is on a LAN, which might be an
office Ethernet, with a router, F, owned and operated by the customer. This router has a leased
line to the ISP’s equipment. We have shown F as being outside the oval because it does not
belong to the ISP.
A host with a packet to send transmits it to the nearest router, either on its own LAN or over a
point-to-point link to the ISP. The packet is stored there until it has fully arrived and the link
has finished its processing by verifying the checksum. Then it is forwarded to the next router
along the path until it reaches the destination host, where it is delivered. This mechanism is
store-and-forward packet switching.
2. Services Provided to the Transport Layer
The network layer provides services to the transport layer at the network layer/transport layer
interface. An important question is precisely what kind of services the network layer provides
to the transport layer. The services need to be carefully designed with the following goals in
mind:
1. The services should be independent of the router technology.
2. The transport layer should be shielded from the number, type, and topology of the routers
present.
3. The network addresses made available to the transport layer should use a uniform numbering
plan, even across LANs and WANs.
1) One camp (represented by the Internet community) argues:
the routers’ job is moving packets around and nothing else. Therefore, the hosts should
accept this fact and do error control (i.e., error detection and correction) and flow control
themselves. The network service should be connectionless, with primitives SEND
PACKET and RECEIVE PACKET and little else. In particular, no packet ordering and
flow control should be done, because the hosts are going to do that anyway. each packet
must carry the full destination address, because each packet sent is carried independently
of its predecessors, if any.
2) The other camp (represented by the telephone companies) argues:
the network should provide a reliable, connection-oriented service. In this view, quality of
service is the dominant factor, and without connections in the network, quality of service
is very difficult to achieve, especially for real-time traffic such as voice and video.
and had their checksums verified. Then each packet is forwarded according to A’s table, onto
the outgoing link to C within a new frame. Packet 1 is then forwarded to E and then to F. When
it gets to F, it is sent within a frame over the LAN to H2. Packets 2 and 3 follow the same route.
However, something different happens to packet 4. When it gets to A it is sent to router B, even
though it is also destined for F. For some reason, A decided to send packet 4 via a different
route than that of the first three packets. Perhaps it has learned of a traffic jam somewhere along
the ACE path and updated its routing table, as shown under the label ‘‘later.’’ The algorithm
that manages the tables and makes the routing decisions is called the routing algorithm. IP
(Internet Protocol), which is the basis for the entire Internet, is the dominant example of a
connectionless network service. Each packet carries a destination IP address that routers use to
individually forward each packet.
As an example, consider the situation shown in Fig. 5-3. Here, host H1 has established
connection 1 with host H2. This connection is remembered as the first entry in each of the
routing tables. The first line of A’s table says that if a packet bearing connection identifier 1
comes in from H1, it is to be sent to router C and given connection identifier 1. Similarly, the
first entry at C routes the packet to E, also with connection identifier 1.
Now let us consider what happens if H3 also wants to establish a connection to H2. It chooses
connection identifier 1 (because it is initiating the connection and this is its only connection)
and tells the network to establish the virtual circuit. This leads to the second row in the tables.
Note that we have a conflict here because although A can easily distinguish connection 1
packets from H1 from connection 1 packets from H3, C cannot do this. For this reason, A
assigns a different connection identifier to the outgoing traffic for the second connection.
Avoiding conflicts of this kind is why routers need the ability to replace connection identifiers
in outgoing packets.
In some contexts, this process is called label switching.
The ability of the router to replace connection identifiers in outgoing packets is called
label switching.