SlideShare uma empresa Scribd logo
1 de 83
Chapter 22 Network Layer: Delivery, Forwarding,  and Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
22-1  DELIVERY The network layer supervises the handling of the packets by the underlying physical networks. We define this handling as the delivery of a packet. Direct Versus Indirect Delivery Topics discussed in this section:
Figure 22.1  Direct and indirect delivery
22-2  FORWARDING Forwarding means to place the packet in its route to its destination. Forwarding requires a host or a router to have a routing table. When a host has a packet to send or when a router has received a packet to be forwarded, it looks at this table to find the route to the final destination.  Forwarding Techniques Forwarding Process Routing Table Topics discussed in this section:
Figure 22.2  Route method versus next-hop method
Figure 22.3  Host-specific versus network-specific method
Figure 22.4  Default method
Figure 22.5  Simplified forwarding module in classless address
In classless addressing, we need at least four columns in a routing table. Note
Make a routing table for router R1, using the configuration in Figure 22.6. Example 22.1 Solution Table 22.1 shows the corresponding table.
Figure 22.6  Configuration for Example 22.1
Table 22.1  Routing table for router R1 in Figure 22.6
Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address 180.70.65.140. Example 22.2 Solution The router performs the following steps: 1 . The first mask (/26) is applied to the destination address.   The result is 180.70.65.128, which does not match the   corresponding network address. 2.  The second mask (/25) is applied to the destination   address. The result is 180.70.65.128, which matches the   corresponding network address. The next-hop address   and the interface number m0 are passed to ARP for   further processing.
Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address 201.4.22.35. Example 22.3 Solution The router performs the following steps: 1.  The first mask (/26) is applied to the destination address. The result is 201.4.22.0, which does not match the corresponding network address. 2.  The second mask (/25) is applied to the destination address. The result is 201.4.22.0, which does not match the corresponding network address (row 2).
Example 22.3 (continued) 3.  The third mask (/24) is applied to the destination   address. The result is 201.4.22.0, which matches the   corresponding network address. The destination   address of the packet and the interface number m3 are   passed to ARP.
Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address 18.24.32.78. Example 22.4 Solution This time all masks are applied, one by one, to the destination address, but no matching network address is found. When it reaches the end of the table, the module gives the next-hop address 180.70.65.200 and interface number m2 to ARP. This is probably an outgoing package that needs to be sent, via the default router, to someplace else in the Internet.
Figure 22.7  Address aggregation
Figure 22.8  Longest mask matching
As an example of hierarchical routing, let us consider Figure 22.9. A regional ISP is granted 16,384 addresses starting from 120.14.64.0. The regional ISP has decided to divide this block into four subblocks, each with 4096 addresses. Three of these subblocks are assigned to three local ISPs; the second subblock is reserved for future use. Note that the mask for each block is /20 because the original block with mask /18 is divided into 4 blocks. Example 22.5 The first local ISP has divided its assigned subblock into 8 smaller blocks and assigned each to a small ISP. Each small ISP provides services to 128 households, each using four addresses.
The second local ISP has divided its block into 4 blocks and has assigned the addresses to four large organizations. Example 22.5 (continued) There is a sense of hierarchy in this configuration. All routers in the Internet send a packet with destination address 120.14.64.0 to 120.14.127.255 to the regional ISP. The third local ISP has divided its block into 16 blocks and assigned each block to a small organization. Each small organization has 256 addresses, and the mask is /24.
Figure 22.9  Hierarchical routing with ISPs
Figure 22.10  Common fields in a routing table
One utility that can be used to find the contents of a routing table for a host or router is  netstat  in UNIX or LINUX. The next slide shows the list of the contents of a default server. We have used two options, r and n. The option r indicates that we are interested in the routing table, and the option  n  indicates that we are looking for numeric addresses. Note that this is a routing table for a host, not a router. Although we discussed the routing table for a router throughout the chapter, a host also needs a routing table. Example 22.6
Example 22.6 (continued) The destination column here defines the network address. The term gateway used by UNIX is synonymous with router. This column actually defines the address of the next hop. The value 0.0.0.0 shows that the delivery is direct. The last entry has a flag of G, which means that the destination can be reached through a router (default router). The Iface defines the interface.
Example 22.6 (continued) More information about the IP address and physical address of the server can be found by using the  ifconfig  command on the given interface (eth0).
Figure 22.11  Configuration of the server for Example 22.6
22-3  UNICAST ROUTING PROTOCOLS A routing table can be either static or dynamic. A static table is one with manual entries. A dynamic table is one that is updated automatically when there is a change somewhere in the Internet. A routing protocol is a combination of rules and procedures that lets routers in the Internet inform each other of changes.  Optimization Intra- and Interdomain Routing Distance Vector Routing and RIP Link State Routing and OSPF Path Vector Routing and BGP Topics discussed in this section:
Figure 22.12  Autonomous systems
Figure 22.13  Popular routing protocols
Figure 22.14  Distance vector routing tables
Figure 22.15  Initialization of tables in distance vector routing
In distance vector routing, each node shares its routing table with its immediate neighbors periodically and when there is a change. Note
Figure 22.16  Updating in distance vector routing
Figure 22.17  Two-node instability
Figure 22.18  Three-node instability
Figure 22.19  Example of a domain using RIP
Figure 22.20  Concept of link state routing
Figure 22.21  Link state knowledge
Figure 22.22  Dijkstra algorithm
Figure 22.23  Example of formation of shortest path tree
Table 22.2  Routing table for node A
Figure 22.24  Areas in an autonomous system
Figure 22.25  Types of links
Figure 22.26  Point-to-point link
Figure 22.27  Transient link
Figure 22.28  Stub link
Figure 22.29  Example of an AS and its graphical representation in OSPF
Figure 22.30  Initial routing tables in path vector routing
Figure 22.31  Stabilized tables for three autonomous systems
Figure 22.32  Internal and external BGP sessions
22-4  MULTICAST ROUTING PROTOCOLS In this section, we discuss multicasting and multicast routing protocols.  Unicast, Multicast, and Broadcast Applications Multicast Routing Routing Protocols Topics discussed in this section:
Figure 22.33  Unicasting
In unicasting, the router forwards the received packet through only one of its interfaces. Note
Figure 22.34  Multicasting
In multicasting, the router may  forward the received packet through several of its interfaces. Note
Figure 22.35  Multicasting versus multiple unicasting
Emulation of multicasting through multiple unicasting is not efficient and may create long delays,  particularly with a large group. Note
In unicast routing, each router in the domain has a table that defines a shortest path tree to possible destinations. Note
Figure 22.36  Shortest path tree in unicast routing
In multicast routing, each involved router needs to construct a shortest path tree for each group. Note
Figure 22.37  Source-based tree approach
In the source-based tree approach, each router needs to have one shortest path tree for each group. Note
Figure 22.38  Group-shared tree approach
In the group-shared tree approach, only the core router, which has a shortest path tree for each group, is involved in multicasting. Note
Figure 22.39  Taxonomy of common multicast protocols
Multicast link state routing uses the source-based tree approach. Note
Flooding broadcasts packets, but creates loops in the systems. Note
RPF eliminates the loop in the  flooding process. Note
Figure 22.40  Reverse path forwarding (RPF)
Figure 22.41  Problem with RPF
Figure 22.42  RPF Versus RPB
RPB creates a shortest path broadcast tree from the source to each destination. It guarantees that each destination receives one and only one copy  of the packet. Note
Figure 22.43  RPF, RPB, and RPM
RPM adds pruning and grafting to RPB to create a multicast shortest path tree that supports dynamic membership changes. Note
Figure 22.44  Group-shared tree with rendezvous router
Figure 22.45  Sending a multicast packet to the rendezvous router
In CBT, the source sends the multicast packet (encapsulated in a unicast packet) to the core router. The core router decapsulates the packet and forwards it to all interested interfaces. Note
PIM-DM is used in a dense multicast environment, such as a LAN. Note
PIM-DM uses RPF and pruning and grafting strategies to handle multicasting. However, it is independent of the underlying unicast protocol. Note
PIM-SM is used in a sparse multicast environment such as a WAN. Note
PIM-SM is similar to CBT but uses a simpler procedure. Note
Figure 22.46  Logical tunneling
Figure 22.47  MBONE

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Ch21
Ch21Ch21
Ch21
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
IP addressing
IP addressingIP addressing
IP addressing
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Subnetting supernetting
Subnetting supernettingSubnetting supernetting
Subnetting supernetting
 
Chapter 32
Chapter 32Chapter 32
Chapter 32
 
IPv4
IPv4IPv4
IPv4
 
IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)IP Addressing (Subnetting, VLSM, Supernetting)
IP Addressing (Subnetting, VLSM, Supernetting)
 
Ch22
Ch22Ch22
Ch22
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Logical addressing
Logical  addressingLogical  addressing
Logical addressing
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
Ch24
Ch24Ch24
Ch24
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
WLAN
WLANWLAN
WLAN
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
Classless addressing
Classless addressingClassless addressing
Classless addressing
 

Destaque (20)

Lecture 44
Lecture 44Lecture 44
Lecture 44
 
Linux – routing and firewall for beginners v 1.0
Linux – routing and firewall for beginners v 1.0Linux – routing and firewall for beginners v 1.0
Linux – routing and firewall for beginners v 1.0
 
Lession3 Routing
Lession3 RoutingLession3 Routing
Lession3 Routing
 
Chapter 28
Chapter 28Chapter 28
Chapter 28
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
 
Chapter 17
Chapter 17Chapter 17
Chapter 17
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 29
Chapter 29Chapter 29
Chapter 29
 
Chapter 31
Chapter 31Chapter 31
Chapter 31
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
 
IP routing in linux
IP routing in linuxIP routing in linux
IP routing in linux
 
Lecture 36 laws of prob
Lecture 36 laws of probLecture 36 laws of prob
Lecture 36 laws of prob
 
Lecture 26
Lecture 26Lecture 26
Lecture 26
 
Chapter 24
Chapter 24Chapter 24
Chapter 24
 
Lecture 20 combinatorics o
Lecture 20 combinatorics oLecture 20 combinatorics o
Lecture 20 combinatorics o
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
Chapter 30
Chapter 30Chapter 30
Chapter 30
 
Centos
CentosCentos
Centos
 
Lecture 37 cond prob
Lecture 37 cond probLecture 37 cond prob
Lecture 37 cond prob
 

Semelhante a Chapter 22

22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_RoutingAhmar Hashmi
 
module 5 ch22_networking_routing.pdf
module 5 ch22_networking_routing.pdfmodule 5 ch22_networking_routing.pdf
module 5 ch22_networking_routing.pdfprashant554034
 
Concept of Network Routing Layer
Concept of Network Routing LayerConcept of Network Routing Layer
Concept of Network Routing LayerPawan Singh
 
routing protocol.pptx
routing protocol.pptxrouting protocol.pptx
routing protocol.pptxAyush616831
 
Cisco discovery drs ent module 6 - v.4 in english.
Cisco discovery   drs ent module 6 - v.4 in english.Cisco discovery   drs ent module 6 - v.4 in english.
Cisco discovery drs ent module 6 - v.4 in english.igede tirtanata
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsNoctorous Jamal
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routingHamzahMohammed4
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_MulticastingAhmar Hashmi
 
Lecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdfLecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdfbeetlejuice6
 
Introducing ATM Technology unicast.ppt
Introducing ATM Technology   unicast.pptIntroducing ATM Technology   unicast.ppt
Introducing ATM Technology unicast.pptgopi5692
 
Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-junkut3
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork LayerZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...ZahouAmel1
 

Semelhante a Chapter 22 (20)

22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
 
ch22.ppt
ch22.pptch22.ppt
ch22.ppt
 
module 5 ch22_networking_routing.pdf
module 5 ch22_networking_routing.pdfmodule 5 ch22_networking_routing.pdf
module 5 ch22_networking_routing.pdf
 
4d routing
4d routing4d routing
4d routing
 
Unit 4
Unit  4Unit  4
Unit 4
 
Concept of Network Routing Layer
Concept of Network Routing LayerConcept of Network Routing Layer
Concept of Network Routing Layer
 
routing protocol.pptx
routing protocol.pptxrouting protocol.pptx
routing protocol.pptx
 
Cisco discovery drs ent module 6 - v.4 in english.
Cisco discovery   drs ent module 6 - v.4 in english.Cisco discovery   drs ent module 6 - v.4 in english.
Cisco discovery drs ent module 6 - v.4 in english.
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Network layer
Network layerNetwork layer
Network layer
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routing
 
rip, ospf 13-14
rip, ospf 13-14rip, ospf 13-14
rip, ospf 13-14
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
 
Lecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdfLecture 1-Networl Layer Services (1).pdf
Lecture 1-Networl Layer Services (1).pdf
 
Introducing ATM Technology unicast.ppt
Introducing ATM Technology   unicast.pptIntroducing ATM Technology   unicast.ppt
Introducing ATM Technology unicast.ppt
 
Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-Ccna 3-discovery-4-0-module-6-100-
Ccna 3-discovery-4-0-module-6-100-
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 

Mais de Faisal Mehmood (20)

Indoor Comfort Index Monitoring System using KNN algorithm
Indoor Comfort Index Monitoring System using KNN algorithmIndoor Comfort Index Monitoring System using KNN algorithm
Indoor Comfort Index Monitoring System using KNN algorithm
 
Raspberry pi and Google Cloud
Raspberry pi and Google CloudRaspberry pi and Google Cloud
Raspberry pi and Google Cloud
 
Raspberry pi and Azure
Raspberry pi and AzureRaspberry pi and Azure
Raspberry pi and Azure
 
Raspberry pi and AWS
Raspberry pi and AWSRaspberry pi and AWS
Raspberry pi and AWS
 
Raspbian Noobs
Raspbian NoobsRaspbian Noobs
Raspbian Noobs
 
Lecture 36
Lecture 36 Lecture 36
Lecture 36
 
Lecture 35 prob
Lecture 35 probLecture 35 prob
Lecture 35 prob
 
Lecture 27
Lecture 27Lecture 27
Lecture 27
 
Lecture 25
Lecture 25Lecture 25
Lecture 25
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Lecture 19 counting
Lecture 19 countingLecture 19 counting
Lecture 19 counting
 
Lecture 18 recursion
Lecture 18 recursionLecture 18 recursion
Lecture 18 recursion
 
Lecture 17 induction
Lecture 17 inductionLecture 17 induction
Lecture 17 induction
 
Lecture 16 SERIES
Lecture 16  SERIESLecture 16  SERIES
Lecture 16 SERIES
 
Lecture 15 sequences
Lecture 15 sequencesLecture 15 sequences
Lecture 15 sequences
 
Lecture 14(d)
Lecture 14(d)Lecture 14(d)
Lecture 14(d)
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 

Último

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 

Último (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 

Chapter 22

  • 1. Chapter 22 Network Layer: Delivery, Forwarding, and Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 22-1 DELIVERY The network layer supervises the handling of the packets by the underlying physical networks. We define this handling as the delivery of a packet. Direct Versus Indirect Delivery Topics discussed in this section:
  • 3. Figure 22.1 Direct and indirect delivery
  • 4. 22-2 FORWARDING Forwarding means to place the packet in its route to its destination. Forwarding requires a host or a router to have a routing table. When a host has a packet to send or when a router has received a packet to be forwarded, it looks at this table to find the route to the final destination. Forwarding Techniques Forwarding Process Routing Table Topics discussed in this section:
  • 5. Figure 22.2 Route method versus next-hop method
  • 6. Figure 22.3 Host-specific versus network-specific method
  • 7. Figure 22.4 Default method
  • 8. Figure 22.5 Simplified forwarding module in classless address
  • 9. In classless addressing, we need at least four columns in a routing table. Note
  • 10. Make a routing table for router R1, using the configuration in Figure 22.6. Example 22.1 Solution Table 22.1 shows the corresponding table.
  • 11. Figure 22.6 Configuration for Example 22.1
  • 12. Table 22.1 Routing table for router R1 in Figure 22.6
  • 13. Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address 180.70.65.140. Example 22.2 Solution The router performs the following steps: 1 . The first mask (/26) is applied to the destination address. The result is 180.70.65.128, which does not match the corresponding network address. 2. The second mask (/25) is applied to the destination address. The result is 180.70.65.128, which matches the corresponding network address. The next-hop address and the interface number m0 are passed to ARP for further processing.
  • 14. Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address 201.4.22.35. Example 22.3 Solution The router performs the following steps: 1. The first mask (/26) is applied to the destination address. The result is 201.4.22.0, which does not match the corresponding network address. 2. The second mask (/25) is applied to the destination address. The result is 201.4.22.0, which does not match the corresponding network address (row 2).
  • 15. Example 22.3 (continued) 3. The third mask (/24) is applied to the destination address. The result is 201.4.22.0, which matches the corresponding network address. The destination address of the packet and the interface number m3 are passed to ARP.
  • 16. Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address 18.24.32.78. Example 22.4 Solution This time all masks are applied, one by one, to the destination address, but no matching network address is found. When it reaches the end of the table, the module gives the next-hop address 180.70.65.200 and interface number m2 to ARP. This is probably an outgoing package that needs to be sent, via the default router, to someplace else in the Internet.
  • 17. Figure 22.7 Address aggregation
  • 18. Figure 22.8 Longest mask matching
  • 19. As an example of hierarchical routing, let us consider Figure 22.9. A regional ISP is granted 16,384 addresses starting from 120.14.64.0. The regional ISP has decided to divide this block into four subblocks, each with 4096 addresses. Three of these subblocks are assigned to three local ISPs; the second subblock is reserved for future use. Note that the mask for each block is /20 because the original block with mask /18 is divided into 4 blocks. Example 22.5 The first local ISP has divided its assigned subblock into 8 smaller blocks and assigned each to a small ISP. Each small ISP provides services to 128 households, each using four addresses.
  • 20. The second local ISP has divided its block into 4 blocks and has assigned the addresses to four large organizations. Example 22.5 (continued) There is a sense of hierarchy in this configuration. All routers in the Internet send a packet with destination address 120.14.64.0 to 120.14.127.255 to the regional ISP. The third local ISP has divided its block into 16 blocks and assigned each block to a small organization. Each small organization has 256 addresses, and the mask is /24.
  • 21. Figure 22.9 Hierarchical routing with ISPs
  • 22. Figure 22.10 Common fields in a routing table
  • 23. One utility that can be used to find the contents of a routing table for a host or router is netstat in UNIX or LINUX. The next slide shows the list of the contents of a default server. We have used two options, r and n. The option r indicates that we are interested in the routing table, and the option n indicates that we are looking for numeric addresses. Note that this is a routing table for a host, not a router. Although we discussed the routing table for a router throughout the chapter, a host also needs a routing table. Example 22.6
  • 24. Example 22.6 (continued) The destination column here defines the network address. The term gateway used by UNIX is synonymous with router. This column actually defines the address of the next hop. The value 0.0.0.0 shows that the delivery is direct. The last entry has a flag of G, which means that the destination can be reached through a router (default router). The Iface defines the interface.
  • 25. Example 22.6 (continued) More information about the IP address and physical address of the server can be found by using the ifconfig command on the given interface (eth0).
  • 26. Figure 22.11 Configuration of the server for Example 22.6
  • 27. 22-3 UNICAST ROUTING PROTOCOLS A routing table can be either static or dynamic. A static table is one with manual entries. A dynamic table is one that is updated automatically when there is a change somewhere in the Internet. A routing protocol is a combination of rules and procedures that lets routers in the Internet inform each other of changes. Optimization Intra- and Interdomain Routing Distance Vector Routing and RIP Link State Routing and OSPF Path Vector Routing and BGP Topics discussed in this section:
  • 28. Figure 22.12 Autonomous systems
  • 29. Figure 22.13 Popular routing protocols
  • 30. Figure 22.14 Distance vector routing tables
  • 31. Figure 22.15 Initialization of tables in distance vector routing
  • 32. In distance vector routing, each node shares its routing table with its immediate neighbors periodically and when there is a change. Note
  • 33. Figure 22.16 Updating in distance vector routing
  • 34. Figure 22.17 Two-node instability
  • 35. Figure 22.18 Three-node instability
  • 36. Figure 22.19 Example of a domain using RIP
  • 37. Figure 22.20 Concept of link state routing
  • 38. Figure 22.21 Link state knowledge
  • 39. Figure 22.22 Dijkstra algorithm
  • 40. Figure 22.23 Example of formation of shortest path tree
  • 41. Table 22.2 Routing table for node A
  • 42. Figure 22.24 Areas in an autonomous system
  • 43. Figure 22.25 Types of links
  • 44. Figure 22.26 Point-to-point link
  • 45. Figure 22.27 Transient link
  • 46. Figure 22.28 Stub link
  • 47. Figure 22.29 Example of an AS and its graphical representation in OSPF
  • 48. Figure 22.30 Initial routing tables in path vector routing
  • 49. Figure 22.31 Stabilized tables for three autonomous systems
  • 50. Figure 22.32 Internal and external BGP sessions
  • 51. 22-4 MULTICAST ROUTING PROTOCOLS In this section, we discuss multicasting and multicast routing protocols. Unicast, Multicast, and Broadcast Applications Multicast Routing Routing Protocols Topics discussed in this section:
  • 52. Figure 22.33 Unicasting
  • 53. In unicasting, the router forwards the received packet through only one of its interfaces. Note
  • 54. Figure 22.34 Multicasting
  • 55. In multicasting, the router may forward the received packet through several of its interfaces. Note
  • 56. Figure 22.35 Multicasting versus multiple unicasting
  • 57. Emulation of multicasting through multiple unicasting is not efficient and may create long delays, particularly with a large group. Note
  • 58. In unicast routing, each router in the domain has a table that defines a shortest path tree to possible destinations. Note
  • 59. Figure 22.36 Shortest path tree in unicast routing
  • 60. In multicast routing, each involved router needs to construct a shortest path tree for each group. Note
  • 61. Figure 22.37 Source-based tree approach
  • 62. In the source-based tree approach, each router needs to have one shortest path tree for each group. Note
  • 63. Figure 22.38 Group-shared tree approach
  • 64. In the group-shared tree approach, only the core router, which has a shortest path tree for each group, is involved in multicasting. Note
  • 65. Figure 22.39 Taxonomy of common multicast protocols
  • 66. Multicast link state routing uses the source-based tree approach. Note
  • 67. Flooding broadcasts packets, but creates loops in the systems. Note
  • 68. RPF eliminates the loop in the flooding process. Note
  • 69. Figure 22.40 Reverse path forwarding (RPF)
  • 70. Figure 22.41 Problem with RPF
  • 71. Figure 22.42 RPF Versus RPB
  • 72. RPB creates a shortest path broadcast tree from the source to each destination. It guarantees that each destination receives one and only one copy of the packet. Note
  • 73. Figure 22.43 RPF, RPB, and RPM
  • 74. RPM adds pruning and grafting to RPB to create a multicast shortest path tree that supports dynamic membership changes. Note
  • 75. Figure 22.44 Group-shared tree with rendezvous router
  • 76. Figure 22.45 Sending a multicast packet to the rendezvous router
  • 77. In CBT, the source sends the multicast packet (encapsulated in a unicast packet) to the core router. The core router decapsulates the packet and forwards it to all interested interfaces. Note
  • 78. PIM-DM is used in a dense multicast environment, such as a LAN. Note
  • 79. PIM-DM uses RPF and pruning and grafting strategies to handle multicasting. However, it is independent of the underlying unicast protocol. Note
  • 80. PIM-SM is used in a sparse multicast environment such as a WAN. Note
  • 81. PIM-SM is similar to CBT but uses a simpler procedure. Note
  • 82. Figure 22.46 Logical tunneling
  • 83. Figure 22.47 MBONE