Unit 2
Unit 2
Delivery,
examp
note
info
le
Forwarding,
and Routing
DELIVER
Y The network layer supervises the handling of
the packets by the underlying physical
networks. We define this handling as the
examp
delivery of a packet.
note
info
le
info
le
Forwarding Techniques
Forwarding Process
Routing Table
examp
note
info
le
note
info
le
note
info
le
note
info
le
Default method
Please note it down...
examp
note
info
le
note
info
In classless addressing, we need at least four
le
examp
note
info
le
Please note it down...
Make a routing table for
router R1, using the
configuration following.
examp
note
info
le
Routing table for router R1
examp
address.
note
info
The result is 180.70.65.128, which does not match
le
the
corresponding network address.
2. The second mask (/25) is applied to the destination
address. The result is 180.70.65.128, which
matches the
corresponding network address. The next-hop
address
and the interface number m0 are passed toPlease
ARP note
for it down...
Show the forwarding process if a packet arrives at R1
in Figure with the destination address 201.4.22.35.
examp
Solution
note
info
The router performs the following steps:
le
1. The first mask (/26) is applied to the destination
address. The result is 201.4.22.0, which does not
match the corresponding network address.
2. The second mask (/25) is applied to the
destination address. The result is 201.4.22.0,
which does not match the corresponding network
address (row 2).
Please note it down...
Show the forwarding process if a packet arrives at R1
in Figure with the destination address 201.4.22.35.
3. The third mask (/24) is applied to the destination
address. The result is 201.4.22.0, which matches
examp
Solution
the
note
info
Thecorresponding
router performs the following
network address.steps:
The destination
le
1. The first mask
address of the(/26) is applied
packet and thetointerface
the destination
number
m3address.
are The result is 201.4.22.0, which does not
match
passedthe to corresponding
ARP. network address.
2. The second mask (/25) is applied to the
destination address. The result is 201.4.22.0,
which does not match the corresponding network
address (row 2).
Please note it down...
As an example of hierarchical routing, let us consider
Figure. A regional ISP is granted 16,384 addresses
starting from 120.14.64.0. The regional ISP has
decided to divide this block into four subblocks, each
with 4096 addresses. Three of these subblocks are
examp
assigned to three
note
info
local ISPs; the second subblock is reserved for future
le
use. Note that the mask for each block is /20
because the original block with mask /18 is divided
into 4 blocks.
The first local ISP has divided its assigned subblock
into 8 smaller blocks and assigned each to a small
ISP. Each small ISP provides services to 128
households, each using four addresses.
Please note it down...
As an example of hierarchical routing, let us consider
The second
Figure. local ISP
A regional ISP has divided16,384
is granted its block into 4
addresses
blocks
startingand has assigned
from 120.14.64.0. the addresses
The regionalto four
ISPlarge
has
organizations.
decided to divide this block into four subblocks, each
with 4096 addresses. Three of these subblocks are
examp
The third to
assigned local
threeISP has divided its block into 16
note
info
blocks andtheassigned
local ISPs; each block
second subblock to a
is reserved for small
future
le
organization.
use. Note that Eachthe small
mask organization
for each block has is 256
/20
addresses,
because the andoriginal
the mask is /24.
block with mask /18 is divided
into 4 blocks.
There is a sense of hierarchy in this configuration. All
The first local ISP has divided its assigned subblock
routers in the Internet send a packet with destination
into 8 smaller blocks and assigned each to a small
address 120.14.64.0 to 120.14.127.255 to the
ISP. Each small ISP provides services to 128
regional ISP.
households, each using four addresses.
Please note it down...
examp
note
info
le
Hierarchical routing with ISPs
Please note it down...
examp
note
info
le
Common fields in a routing table
examp
a default server. We have used two options, r and n.
note
info
The option r indicates that we are interested in the
le
routing table, and the option n indicates that we are
looking for numeric addresses. Note that this is a
routing table for a host, not a router. Although we
discussed the routing table for a router throughout the
chapter, a host also needs a routing table.
note
routing table for a host, not a router. Although we
info
discussed the routing table for a router throughout
the chapter, a host also needs a routing table.
examp
note
info
The destination column here defines the network
le
address. The term gateway used by UNIX is
synonymous with router. This column actually defines
the address of the next hop. The value 0.0.0.0 shows
that the delivery is direct. The last entry has a flag of
G, which means that the destination can be reached
through a router (default router). The Iface defines the
interface.
Please note it down...
More information about the IP address and physical
address of the server can be found by using the
ifconfig command on the given interface (eth0).
note
info
Please note it down...
UNICAST
ROUTING
PROTOCOLS A routing table can be either static or dynamic.
A static table is one with manual entries. A
dynamic table is one that is updated
automatically when there is a change
examp
somewhere in the Internet. A routing protocol is
note
info
a combination of rules and procedures that lets
le
routers in the Internet inform each other of
changes.
Optimization
Intra-
Configuration of and
theInterdomain
server forRouting
Example
Distance Vector Routing and RIP
Link State Routing and OSPF
Path Vector Routing and BGP
examp
note
info
le
Autonomous systems
Please note it down...
examp
note
info
le
note
info
le
note
info
le
note
info
routing table with its
le
note
info
le
note
info
le
Two-node instability
note
info
le
Three-node instability
note
info
le
note
info
le
note
info
le
note
info
le
Dijkstra algorithm
Please note it down...
examp
note
info
le
note
info
le
https://meet.google.com/tsc-vvcn-ien
note
info
le
note
info
le
Types of links
note
info
le
Point-to-point link
note
info
le
Transient link
note
info
le
Stub link
note
info
le
note
info
le
note
info
le
note
info
le
note
info
le
note
info
le
Unicasting
note
info
le
packet through
only one of its interfaces.
note
info
le
Multicasting
Please note it down...
examp
note
In multicasting, the router may
info
le
note
info
le
note
info
unicasting is not efficient
le
note
info
a table that defines
le
note
info
le
note
info
to construct
le
note
info
le
note
In the source-based tree approach, each router
info
le
note
info
le
note
info
le
note
info
le
note
info
Multicast link state routing uses the source-
le
note
info
Flooding broadcasts packets, but creates loops in
le
the systems.
note
info
RPF eliminates the loop in the
le
flooding process.
note
info
le
note
info
le
note
info
le
note
info
the source to each destination.
le
note
info
le
note
info
multicast shortest
le
note
info
le
note
info
le
note
info
(encapsulated in a unicast packet) to the core
le
note
info
le
note
strategies to handle multicasting.
info
le
note
info
PIM-SM is used in a sparse multicast environment
le
such as a WAN.
note
info
PIM-SM is similar to CBT but uses a simpler
le
procedure.
note
info
le
Logical tunneling
Please note it down...
examp
note
info
le
MBONE