Unit II Network Layer - 2
Unit II Network Layer - 2
• The settling of routes to best paths across the network is called convergence.
• Distance vector routing is useful as a simple technique by which routers can
collectively compute shortest paths, but it has a serious drawback in practice:
• Although it converges to the correct answer, it may do so slowly. In particular, it reacts
rapidly to good news, but leisurely to bad news.
The Count-to-Infinity Problem
• Now let us consider the situation in which all the links and routers
are initially up.
• Routers B, C, D, and E have distances to A of 1, 2, 3, and4 hops,
respectively.
• Suddenly, either A goes down or the link between A and B is cut
Link State Routing
• Distance vector routing was used in the ARPANET until 1979,
when it was replaced by link state routing.
• The primary problem that caused its demise was that the
algorithm often took too long to converge after the network
topology changed (due to the count-to-infinity problem).
• Consequently, it was replaced by an entirely new algorithm, now
called link state routing.
• Variants of link state routing called IS-IS and OSPF are the routing
algorithms that are most widely used inside large networks and
the Internet today.
Link State Routing
• The idea behind link state routing is fairly simple and
can be stated as five parts.
• Each router must do the following things to make it
work:
1. Discover its neighbors and learn their network addresses.
2. Set the distance or cost metric to each of its neighbors.
3. Construct a packet telling all it has just learned.
4. Send this packet to and receive packets from all other routers.
5. Compute the shortest path to every other router.
Hierarchical Routing
• Too many packets present in (a part of) the network causes packet delay and
loss that degrades performance. This situation is called congestion.
• The network and transport layers share the responsibility for handling
congestion.
• Since congestion occurs within the network, it is the network layer that
directly experiences it and must ultimately determine what to do with the
excess packets.
• However, the most effective way to control congestion is to reduce the load
that the transport layer is placing on the network.
• This requires the network and transport layers to work together.
Approaches to Congestion Control
• Traffic-aware Routing
• Admission Control
• Traffic Throttling
• Load Shedding
Traffic-Aware Routing
Admission Control
• One technique that is widely used in virtual-circuit networks to keep congestion at bay
is admission control.
• The idea is simple: do not set up a new virtual circuit unless the network can carry the
added traffic without becoming congested.
• Thus, attempts to set up a virtual circuit may fail. This is better than the alternative, as
letting more people in when the network is busy just makes matters worse.
Traffic Throttling
• Let us now look at some approaches to throttling traffic that can be used in
both datagram networks and virtual-circuit networks.
• Each approach must solve two problems.
• First, routers must determine when congestion is approaching, ideally before
it has arrived.
• To do so, each router can continuously monitor the resources it is using.
• Three possibilities are :
• the utilization of the output links,
• the buffering of queued packets inside the router,
• and the number of packets that are lost due to insufficient buffering.
• Of these possibilities, the second one is the most useful.
• The second problem is that routers must deliver timely feedback to the
senders that are causing the congestion.
• Congestion is experienced in the network, but relieving congestion requires
action on behalf of the senders that are using the network.
• To deliver feedback, the router must identify the appropriate senders. It must then warn
them carefully, without sending many more packets into the already congested network.
• Different schemes use different feedback mechanisms
• Choke Packets: The most direct way to notify a sender of congestion is to tell it directly.
• In this approach, the router selects a congested packet and sends a choke packet back to the source host, giving
it the destination found in the packet.
• The original packet may be tagged (a header bit is turned on) so that it will not generate any more choke packets
farther along the path and then forwarded in the usual way.
• To avoid increasing load on the network during a time of congestion, the router may only send choke packets at a
low rate.
• Explicit Congestion Notification
• Instead of generating additional packets to warn of congestion, a router can tag any packet it forwards to signal
that it is experiencing congestion.
• When the network delivers the packet, the destination can note that there is congestion and inform the sender
when it sends a reply packet.
• Hop-by-Hop Backpressure
Load Shedding
• When none of the above methods make the congestion
disappear, routers can bring out the heavy artillery: load
shedding.
• Load shedding is a fancy way of saying that when routers are
being inundated by packets that they cannot handle, they just
throw them away
• Priority Queuing
• Fair Queueing
• Assured Forwarding
INTERNETWORKING
• How Networks Differ
INTERNETWORKING
• How Networks Can Be Connected
• There are two basic choices for connecting different networks: we can build
devices that translate or convert packets from each kind of network into packets
for each other network
• Fragments
• Transparent fragmentation
• Non-transparent fragmentation
Packet Fragmentation