4a Network Layer
4a Network Layer
Network Layer
5-26
2) Allow new Virtual Circuits but carefully route all new virtual circuits around
problem areas.
24
Choke Packets
If no choke packets arrive during the listening period, the host
may increase the flow again.
An example of a choke packet is the ICMP Source Quench
Packet.
• Hosts reduces traffic by adjusting their policy parameters.
• Over long distances or at high speeds choke packets are not very
effective.
• A more efficient method is to send to choke packets hop-by-hop.
• This requires each hop to reduce its transmission even before the
choke packet arrive at the source.
• The net effect of this hop-by-hop scheme is to provide quick
relief at the congestion at the price of using up more buffers
upstream.
26
Hop-by-Hop
Choke Packets
5-43
A connectionless internet.
Tunneling
Tunneling is a protocol that allows for the secure movement of
data from one network to another.
A technique of internetworking called Tunneling is used when
source and destination networks of same type are connected
through a network of different type.
For example let us consider an Ethernet to be connected to
another Ethernet through a WAN.
Tunneling works by encapsulating packets: Wrapping packets
inside of other packets.
Tunneling
Packet1
Packet1.0 Packet1.1