Computer Network - 278481 - Lecture 1
Computer Network - 278481 - Lecture 1
Coordinator /Lecturer:
Dr. Subarmaniam Kannan
1
McGraw-Hill © The McGraw-Hill Companies, Inc., 2000
1.2
1.3
Coursework Marks
Assessment Percentage
Assignment 10%
1.4
Learning Objectives COURSE Domain
LEARNING Level
OUTCOMES
LO1
Discuss basic networking concepts including
network layers, network devices and network Affective 2
topologies
LO2
Explain the operation of the TCP/IP networks,
including network protocols and routing algorithms Cognitive 5
LO3
Describe various networking technologies including
Local Area Networks (LANs) and Wide Area Cognitive 5
Networks (WANs)
LO4
Construct basic network topologies for LANs and
Psychomotor 4
WANs
1.5
Midterm Exam Tentative Schedule
TCN2141 Midterm
Date:
Time: x.00 pm - x.00 pm
Lecturer Name: Dr. Subarmaniam
Subject Code: TCN2141
Subject Name: Computer Networks
1.6
WEEK DATE TOPICS Activities (Hours) REMARKS
E-Learning Lecture Tutorial Lab (Class
Replacement/
Public Holiday)
1.8
References
James F Kurose, (2017). Computer Networking, A top-
down approach featuring internet, 7th Edition, Prentice
Hall. ISBN-13: 978-0133594140
Behrouz Forouzan, (2012). Data Communications and
Networking, 5th Edition. McGraw-Hill
Tanenbaum, Andrew S., (2010). Computer Networks,
5th Ed., New Jersey, Prentice Hall. ISBN: 0-13-038488-7.
Dougles E. Comer, (2015) Computer Networks and
Internets, 6th Edition, Prentice.
1.9
Lecture 1
Chapter 18
Introduction to
Network Layer
.
Chapter 18: Outline
1.14
Interaction between layers in the OSI Model
15
OSI model and TCP/IP Model
Comput
er Routing a
Network Switching
s
Data
Communicatio
n
LAN, WAN – Updated
1.16 TCP/IP High Speed
1-4 TCP/IP PROTOCOL SUITE
18
1-5 ADDRESSING
20
Figure 1.18 Relationship of layers and addresses in TCP/IP
21
18-1 NETWORK-LAYER SERVICES
1.22
Figure 18.1: Communication at the network layer
1.23
18.1.1 Packetizing
1.24
1.25
Other duties of the network layer, which are as important as
the first, are routing and forwarding, which are directly related
to each other.
1.26
Intermediary devices that connect the networks are called
routers. The role of the router is to select paths for and direct
packets toward their destination. This process is known as
routing.
1.27
Classifying Routing Protocols
Routing update:
My 30 seconds are up. 172.16.0.0
I’m sending an update
to my RIP neighbor(s).
29
Forwarding Send the packet
value out of interface 2
B Data B Data
1.30
18.1.3 Other Services
1.31
18-2 PACKET SWITCHING
1.32
Types of Switching
Message
Packet switching
Circuit switching
switching is a network
involves
involves switching
setting
splitting up atechnique
information series in
of
into data
which data
intermediate
packets, is nodes,
routed in
transmitted its entirety
order
separatelyto by from
propagatethe source node
the sending
intermediate nodes
to
and the
node's destination
data to thewhen
reassembled node,
theyone
receiving node.
reach hope at aarecipient.
In such
the final time. During
situation, the
message
communicationrouting,lineevery
can intermediate
be likened toswitch in the
a dedicated
network stores the
communication whole message.
pipe.
Switching
The idea was that the network layer is only responsible for
delivery of packets from the source to the destination.
1.34
Figure 18.3: A connectionless packet-switched network
1.35
Figure 18.4: Forwarding process in a router when used in a
connectionless network
SA DA Data SA DA Data
1.36
18.2.2 Virtual-Circuit Approach
1.37
Figure 18.5: A virtual-circuit packet-switched network
1.38
Figure 18.6: Forwarding process in a router when used in a virtual
circuit network
Incoming Outgoing
label label
1.39
Three Way Handshake
1.40
Figure 18.7: Sending request packet in a virtual-circuit network
A to B
A to B
A to B A to B
1.41
Figure 18.8: Sending acknowledgments in a virtual-circuit network
1.42
Figure 18.9: Flow of one packet in an established virtual circuit
1.43
18-3 NETWORK-LAYER PERFORMANCE
1.44
18.3.1 Delay
• Let us first discuss each of these delay types and then show
how to calculate a packet delay from the source to the
destination..
1.45
Transmission Delay
Propagation delay is the time it takes for a bit to travel from point A to point
B in the transmission media. The propagation delay for a packet-switched
network depends on the propagation delay of each network (LAN or
WAN). The propagation delay depends on the propagation speed of the
media, which is 3x108 meters/second in a vacuum and normally much less
in a wired medium; it also depends on the distance of the link. In other
words, propagation delay is
The processing delay is the time required for a router or a destination host to receive a
packet from its input port, remove the header, perform an error detection procedure,
and deliver the packet to the output port (in the case of a router) or deliver the packet
to the upper-layer protocol (in the case of the destination host). The processing delay
1.48
Queuing Delay
Queuing delay can normally happen in a router. As we discuss in the next section, a router
has an input queue connected to each of its input ports to store packets waiting to be
processed; the router also has an output queue connected to each of its output ports to
store packets waiting to be transmitted. The queuing delay for a packet in a router is
measured as the time a packet waits in the input queue and output queue of a router. We
can compare the situation with a busy airport. Some planes may need to wait to get the
landing band (input delay); some planes may need to wait to get the departure band
(output delay).
Assuming equal delays for the sender, routers, and receiver, the total delay (source-to-
1.51
Figure 18.10: Throughput in a path with three links in a series
We can conclude that the average data rate for this path is 100 kbps, the
minimum of the three different data rates. The figure also shows that we can
simulate the behavior of each link with pipes of different sizes; the average
throughput is determined by the bottleneck, the pipe with the smallest diameter.
Actual situation in the Internet is that the data normally passes through two access networks and the Internet
backbone
The Internet backbone has a very high transmission rate, in the range of gigabits per second. This means that the
throughput is normally defined as the minimum trans- mission rate of the two access links that connect the source and
Figure 18.11 shows this situation, in which the throughput is the minimum of TR and TR .
1 2
For example, if a server connects to the Internet via a Fast Ethernet LAN with the data rate of 100 Mbps, but a user who
wants to download a file connects to the Internet via a dial-up telephone line with the data rate of 40 kbps, the throughput
• A router may collect the flow from several sources or distribute the flow
between several sources.
• In this case the transmission rate of the link between the two routers is
actually shared between the flows and this should be considered when
we calculate the throughput.
• For example, in Figure 18.12 the transmission rate of the main link in
the calculation of the throughput is only 200 kbps because the link is
shared between three paths.
1.54
18.3.3 Packet Loss
1.55
18.3.4 Congestion Control
1.56
Figure 18.13. Packet delay and throughput as functions of load
• When the load is below the capacity of the network, the throughput increases proportionally with
the load.
• We expect the throughput to remain constant after the load reaches the capacity, but instead the
• The reason is the dis- carding of packets by the routers. When the load exceeds the capacity, the
queue become full and the routers have to discard some packets.
• Discarding packets does not reduce the number of packets in the network because the sources
retransmit the packets, using time-out mechanisms, when the packets do not reach the
destinations.
• When the load is much less than the capacity of the network, the delay is at a
minimum.
• This minimum delay is composed of propagation delay and processing delay, both
• However, when the load reaches the network capacity, the delay increases sharply
because we now need to add the queuing delay to the total delay.
1.57 • Note that the delay becomes infinite when the load is greater than the capacity.
Congestion Control
1.58
Open-loop congestion control (prevention)
Retransmission Policy
If the sender feels that a sent packet is lost or corrupted, the packet needs to be retransmitted.
Retransmission in general may increase congestion in the network. However, a good retransmission
policy can prevent congestion. The retransmission policy and the retransmission timers must be
Window Policy The type of window at the sender may also affect congestion. The Selective Repeat
window is better than the Go-Back-N window for congestion control. In the Go-Back-N window,
when the timer for a packet times out, several packets may be resent, although some may have
arrived safe and sound at the receiver. This duplication may make the congestion worse. The
Selective Repeat window, on the other hand, tries to send the specific packets that have been lost or
corrupted.
Acknowledgment Policy The acknowledgment policy imposed by the receiver may also affect
1.59
Discarding Policy
A good discarding policy by the routers may prevent congestion and at the same time may not
harm the integrity of the transmission. For example, in audio transmission, if the policy is to
discard less sensitive packets when congestion is likely to happen, the quality of sound is still
prevent congestion in virtual-circuit networks. Switches in a flow first check the resource
requirement of a flow before admitting it to the network. A router can deny establishing a
future congestion.
1.60
Closed-loop congestion control (removal)
Techniques
congested node stops receiving data from the immediate upstream node or nodes. This may
cause the upstream node or nodes to become congested, and they, in turn, reject data from
their upstream node or nodes, and so on. Backpressure is a node- to-node congestion control
that starts with a node and propagates, in the opposite direction of data flow, to the source.
The backpressure technique can be applied only to virtual circuit networks, in which each
node knows the upstream node from which a flow of data is coming.
1.61
Figure 4.15: Choke packet
In the choke-packet method, the warning is from the router, which has
encountered congestion, directly to the source station. The
intermediate nodes through which the packet has traveled are not
warned. Use Internet Control Message Protocol (ICMP) mechanism
1.62
Implicit signaling
In implicit signaling, there is no communication between the congested node or nodes and the source.
The source guesses that there is congestion somewhere in the network from other symptoms. For
example, when a source sends several packets and there is no acknowledgment for a while, one
assumption is that the network is congested. The delay in receiving an acknowledgment is interpreted
Explicit Signaling The node that experiences congestion can explicitly send a signal to the source or
destination. The explicit-signaling method, however, is different from the choke-packet method. In
the choke-packet method, a separate packet is used for this purpose; in the explicit-signaling method,
the signal is included in the packets that carry data (Piggybacking). Explicit signaling can occur in
1.63
18-4 IPv4 ADDRESSES
1.66
Figure 18.17: Hierarchy in addressing
1.67
18.4.2 Classful Addressing
1.69
18.4.3 Classless Addressing
With the growth of the Internet, it was clear that a larger
address space was needed as a long-term solution.
1.70
Subnetting and Supernetting
To alleviate address depletion, two strategies were proposed and, to some extent,
implemented:
In subnetting,subnetting andclass
a class A or supernetting.
B block is divided into several subnets. Each
While subnetting was devised to divide a large block into smaller ones,
supernetting was devised to combine several class C blocks into a larger block
1.71
Figure 18.19: Variable-length blocks in classless addressing
1.72
Figure 18.20: Slash notation (CIDR)
1.73
Figure 18.21: Information extraction in classless addressing
Set all
suffix bits
to 0s
Set all
suffix bits
to 1s
1.74
Example 18.1
A classless address is given as 167.199.170.82/27. We can
find the above three pieces of information as follows. The
number of addresses in the network is 232− n = 25 = 32
addresses. The first address can be found by keeping the
first 27 bits and changing the rest of the bits to 0s.
75
Example 18.2
We repeat Example 18.1 using the mask. The mask in
dotted-decimal notation is 256.256.256.224 The AND, OR,
and NOT operations can be applied to individual bytes using
calculators and applets at the book website.
76
Example 18.3
In classless addressing, an address cannot per se define the
block the address belongs to. For example, the address
230.8.24.56 can belong to many blocks. Some of them are
shown below with the value of the prefix associated with
that block.
77
Figure 18.22: Network address
1.78
Example 18.4
An ISP has requested a block of 1000 addresses. Since 1000
is not a power of 2, 1024 addresses are granted. The prefix
length is calculated as n = 32 − log21024 = 22. An available
block, 18.14.12.0/22, is granted to the ISP. It can be seen
that the first address in decimal is 302,910,464, which is
divisible by 1024.
79
Example 18.5
An organization is granted a block of addresses with the
beginning address 14.24.74.0/24. The organization needs to
have 3 subblocks of addresses to use in its three subnets:
one subblock of 10 addresses, one subblock of 60 addresses,
and one subblock of 120 addresses. Design the subblocks.
Solution
There are 232– 24 = 256 addresses in this block. The first
address is 14.24.74.0/24; the last address is 14.24.74.255/24.
To satisfy the third requirement, we assign addresses to
subblocks, starting with the largest and ending with the
smallest one.
80
Example 18.5 (continued)
a. The number of addresses in the largest subblock, which
requires 120 addresses, is not a power of 2. We allocate 128
addresses. The subnet mask for this subnet can be found as
n1 = 32 − log2 128 = 25. The first address in this block is
14.24.74.0/25; the last address is 14.24.74.127/25.
81
Example 18.5 (continued)
c. The number of addresses in the largest subblock, which
requires 120 addresses, is not a power of 2. We allocate 128
addresses. The subnet mask for this subnet can be found as
n1 = 32 − log2 128 = 25. The first address in this block is
14.24.74.0/25; the last address is 14.24.74.127/25.
1.83
Example 18.6
Figure 18.24 shows how four small blocks of addresses are
assigned to four organizations by an ISP. The ISP combines
these four blocks into one single block and advertises the
larger block to the rest of the world. Any packet destined for
this larger block should be sent to this ISP. It is the
responsibility of the ISP to forward the packet to the
appropriate organization. This is similar to routing we can
find in a postal network. All packages coming from outside
a country are sent first to the capital and then distributed to
the corresponding destination.
84
Figure 18.24: Example of address aggregation
1.85
18.4.4 DHCP
After a block of addresses are assigned to an
organization, the network administration can manually
assign addresses to the individual hosts or routers.
However, address assignment in an organization can be
done automatically using the Dynamic Host Configuration
Protocol (DHCP).
1.86
Figure 18.25: DHCP message format
1.87
• The 64-byte option field has a dual purpose. It can carry
either additional information or some specific vendor
information.
• The server uses a number, called a magic cookie, in the
format of an IP address with the value of 99.130.83.99.
• When the client finishes reading the message, it looks for
this magic cookie.
• If present, the next 60 bytes are options.
• An option is composed of three fields: a 1-byte tag field, a
1-byte length field, and a variable-length value field.
• There are several tag fields that are mostly used by
• vendors.
• If the tag field is 53, the value field defines one of the 8
message types shown in Figure 18.26. We show how
these message types are used by DHCP.
1.88
Figure 18.26: Option format
1.89
Figure 18.27: Operation of DHCP
1.90
18.4.5 NAT
1.91
Figure 18.29: NAT
1.92
Figure 18.30: Address translation
1.94
Table 18.1: Five-column translation table
1.96
18.5.1 Destination Address Forwarding
• Two Functions:
• Path Determination
• Switching
CCNA2-98 Chapter 1
Path Determination
CCNA2-99 Chapter 1
Path Determination
CCNA2- Chapter 1
Path Determination
• Remote Network:
• R1 receives a packet from PC1 whose ultimate
destination is PC2.
• R1 looks in the routing table and determines that the path
to the destination network is via its WAN port.
• The packet is forwarded to another router. Remote
networks can only be reached by forwarding packets to
another router.
CCNA2- Chapter 1
Path Determination
• No Route Determined:
• R1 receives a packet from PC1 whose ultimate
destination is PC2.
• R1 looks in the routing table and cannot find a path to a
directly connected network or remote network.
• If the router does not have a default route, the packet is
discarded. The router sends an Internet Control Message
Protocol (ICMP) Unreachable message to the source IP
address of the packet.
CCNA2- Chapter 1
Switching Function
CCNA2- Chapter 1
Switching Function
Layer 2 Layer 2 Layer 3 Layer 3
Destination Source Destination Source
How
How
does
does
HostHOST
X know
X obtain
to forward
Router
the packet
A’s Layer
to Router
2 address?
A and not
directly to Host Y?
CCNA2- Chapter 1
Switching Function
Layer 2 Layer 2 Layer 3 Layer 3
Destination Source Destination Source
CCNA2- Chapter 1
Switching Function
Layer 2 Layer 2 Layer 3 Layer 3
Destination Source Destination Source
B111
A111 A222
H111 192.168.4.10
192.168.4.10 192.168.1.10
192.168.1.10
CCNA2- Chapter 1
Switching Function
Layer 2 Layer 2 Layer 3 Layer 3
Destination Source Destination Source
CCNA2- Chapter 1
Switching Function
Layer 2 Layer 2 Layer 3 Layer 3
Destination Source Destination Source
CCNA2- Chapter 1
Switching Function
Layer 2 Layer 2 Layer 3 Layer 3
Destination Source Destination Source
CCNA2- Chapter 1
Switching Function
Layer 2 Layer 2 Layer 3 Layer 3
Destination Source Destination Source
FFFF
B111 B222
A222 192.168.4.10
192.168.4.10 192.168.1.10
192.168.1.10
CCNA2- Chapter 1
Switching Function
Layer 2 Layer 2 Layer 3 Layer 3
Destination Source Destination Source
CCNA2- Chapter 1
Switching Function
Layer 2 Layer 2 Layer 3 Layer 3
Destination Source Destination Source
H222
FFFF C222
B222 192.168.4.10
192.168.4.10 192.168.1.10
192.168.1.10
CCNA2- Chapter 1
Figure 18.32: Simplified forwarding module in classless address
1.118
Figure 18.33: Configuration for Example 4.7
1.119
Example 18.7
Make a forwarding table for router R1 using the
configuration in Figure 18.33.
Solution
Table 18.2 shows the corresponding table.
120
Example 18.8
Instead of Table 18.2, we can use Table 18.3, in which the
network address/mask is given in bits.
Table 18.3: Forwarding table for router R1 using prefix bits
Solution
The router performs the following steps:
1. The first mask (/26) is applied to the destination address.
The result is 180.70.65.128, which does not match the
corresponding network address.
2. The second mask (/25) is applied to the destination
address. The result is 180.70.65.128, which matches the
corresponding network address. The next-hop address
and the interface number m0 are extracted for
forwarding the packet (see Chapter 5).
122
Longest Match: Level 1 Network Routes
CCNA2- Chapter 8
Figure 18.34: Address aggregation
1.125
Figure 18.35: Longest mask matching
1.126
Example 18.10
As an example of hierarchical routing, let us consider Figure
18.36. A regional ISP is granted 16,384 addresses starting
from 120.14.64.0. The regional ISP has decided to divide
this block into 4 subblocks, each with 4096 addresses. Three
of these subblocks are assigned to three local ISPs, the
second subblock is reserved for future use. Note that the
mask for each block is /20 because the original block with
mask /18 is divided into 4 blocks.
The figure also shows how local and small ISPs have
assigned addresses.
127
Figure 18.35: Hierarchical routing with ISPs
1.128
18.5.2 Forwarding Based on Label
1.129
Example 18.11
Figure 18.37 shows a simple example of searching in a
forwarding table using the longest mask algorithm.
Although there are some more efficient algorithms today,
the principle is the same.
130
Figure 18.37: Example 18.11: Forwarding based on destination address
1.131
Example 18.12
Figure 18.38 shows a simple example of using a label to
access a switching table. Since the labels are used as the
index to the table, finding the information in the table is
immediate.
132
Figure 18.38: Example 18.12: Forwarding based on label
1.133
Figure 18.39: MPLS header added to an IP packet
1.134
Figure 18.40: MPLS header made of a stack of labels
1.135
18.5.3 Routers as Packet Switches
1.136
MELAKA MMU
CISCO LOCAL NETWORKING
ACADEMY
CCNA 1 – Briefing
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 137