This document contains slides summarizing key concepts about network layer control planes from the textbook "Computer Networking: A Top Down Approach". The slides cover traditional routing algorithms like link state (e.g. Dijkstra's algorithm) and distance vector (e.g. Bellman-Ford), as well as software defined networking control planes. Specific routing protocols discussed include OSPF, BGP, OpenFlow and SDN controllers. The document also mentions ICMP and network management using SNMP.
This document provides an overview and outline of topics to be covered in Chapter 4 of the textbook "Computer Networking: A Top Down Approach". The chapter will cover the network layer data plane, including how routers work, IP as an internet protocol, and generalized forwarding. It outlines key concepts like forwarding, routing, and the difference between the data and control planes. It also summarizes the internal components and functions of a router, like lookup and switching fabrics.
The document describes a set of PowerPoint slides for a networking textbook. It provides instructions for using and modifying the slides, with the only requests being to mention the source and copyright if used for teaching or posted online.
This document provides an overview and outline of topics to be covered in a chapter about the link layer and local area networks (LANs). It discusses the goals of understanding link layer services like error detection and correction as well as sharing bandwidth on a broadcast channel. It also outlines the key sections to be covered, including multiple access protocols, LAN addressing, Ethernet, switches, and virtual LANs. Sample slides are provided on topics like link layer services, error detection techniques, and multiple access protocols. The document is intended for educational use and asks that the source be cited if used for teaching.
The document provides an overview of slides for a chapter on transport layer networking. It states that the slides can be freely used and modified with attribution given to the authors and copyright noted. It also provides brief descriptions of the goals and outline of the chapter, which covers transport layer services, multiplexing, UDP, TCP, and congestion control.
This document discusses protocols for real-time multimedia applications such as voice over IP. It introduces the Real-Time Protocol (RTP) which specifies packet structures for carrying audio and video data. RTP runs on top of UDP, providing functions like payload type identification, sequence numbering, and time stamping. It allows for interoperability between multimedia applications that both implement RTP. The document also discusses the Session Initiation Protocol (SIP) which is used to initialize multimedia sessions and exchange session description and control messages.
The document discusses the key aspects of Chapter 7 in a computer networking textbook. It provides an outline of the chapter topics, which cover wireless links and characteristics such as CDMA, IEEE 802.11 wireless LANs, cellular networks and standards, and principles of mobility including Mobile IP and handling mobility in cellular networks. It also includes slides on specific elements and functioning of wireless networks, 802.11 protocols, and capabilities such as rate adaptation.
HDLC is a bit-oriented protocol that defines rules for transmitting data between network nodes. It supports full-duplex communication and organizes data into frames sent from a source to a destination. HDLC defines three station types - primary stations control data flow, secondary stations operate under primary control, and combined stations act as both. HDLC uses different frame types and operates in modes like normal response for point-to-point links and asynchronous balanced for communication between combined stations.
1. The document discusses routing algorithms for wireless sensor networks, focusing on RPL (IPv6 Routing Protocol for Low Power and Lossy Networks).
2. It provides an example to illustrate how RPL constructs a Destination Oriented Directed Acyclic Graph (DODAG) routing structure based on link metrics like distance and expected transmissions.
3. Nodes broadcast DODAG Information Object (DIO) messages to advertise their ranks and select preferred parents, building the DODAG over multiple rounds as nodes adjust their ranks and parents.
The document discusses authentication protocols to securely prove identity between two parties communicating over a network. Protocol ap5.0 uses public key cryptography and a nonce (random number) to authenticate, but it is vulnerable to a man-in-the-middle attack where an attacker can pose as both parties to intercept and alter communications. The document explores several authentication protocols and their vulnerabilities to illustrate challenges in securely authenticating identities over an open network.
This document discusses internet layer protocols and IP addressing. It covers the OSI reference model and protocols of the internet layer like IP, ICMP, ARP, and RARP. It also explains IP address classes A, B and C and the ranges they cover. Finally, it discusses private IP addresses and their use on private networks.
The document discusses the OSI physical layer. It describes the physical layer's purpose of creating electrical, optical, or microwave signals to represent bits in frames. It discusses different physical layer protocols and services, signaling and encoding methods used on different network media like copper, fiber, and wireless. It also covers physical layer standards bodies, functions of transmitting data, encoding it onto media, and signaling methods. Physical characteristics of different media types are explained as well as common physical layer protocols for wireless networking.
Link-state routing protocols use Dijkstra's algorithm to calculate the shortest path to all destinations based on a link-state database containing the full network topology. Each router runs the same algorithm locally to determine the optimal path. Key aspects include link-state advertisements to share connectivity information, the topological database to store network maps, and shortest path first calculations to derive routes. Common link-state protocols are OSPF and IS-IS. They provide fast convergence and scalability but require more resources than distance-vector protocols.
This document discusses ARP and RARP protocols. ARP is used to map IP addresses to MAC addresses on local networks. It works by broadcasting ARP requests and unicasting replies. RARP is used in the opposite direction, to map a device's MAC address to its IP address. Examples are given of how an ARP cache works, including entries for pending, resolved, and free states. RARP has been replaced by BOOTP and DHCP for providing additional configuration info like subnet masks.
ARP is a protocol that maps IP addresses to MAC addresses. It works by broadcasting an ARP request packet to all devices on the local network segment. The device with the matching IP address responds with its MAC address, allowing the requesting device to send packets directly to the destination MAC address on the local network.
Encapsulation refers to the process of adding headers and trailers to data as it passes from higher to lower layers in a networking model. At each layer, additional headers are added containing information for that layer, and the data plus added headers are passed to the next lower layer. Decapsulation is the reverse process of removing these headers at each layer as data moves from lower to upper layers.
This document discusses several internet protocols, including ARP and RARP. ARP is used to convert IP addresses to physical addresses like Ethernet addresses. It operates below the network layer to interface between OSI layers. A host broadcasts an ARP request to obtain another device's physical address. RARP is used to resolve an IP address from a given hardware address. It has been replaced by newer protocols but was used by clients to request IP addresses from a network.
This document provides information about IP addresses and Internet Protocol versions 4 and 6. It defines an IP address as a unique identifier for devices on a TCP/IP network. IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses to allow for many more available addresses. The document also describes how IP addresses are structured and assigned, either statically or dynamically through DHCP. It notes that IPv6 deployment is increasing to address IPv4 address exhaustion issues.
This document provides an overview of key concepts in network layer design, including:
- Store-and-forward packet switching and the services provided to the transport layer.
- Implementation of connectionless and connection-oriented services, and comparison of virtual circuits and datagrams.
- Routing algorithms like shortest path, flooding, distance vector, link state, and hierarchical routing.
- Quality of service techniques including integrated services, differentiated services, and MPLS.
- Internetworking issues such as connecting different networks, concatenated virtual circuits, tunneling, and fragmentation.
- An overview of the network layer in the Internet including IP, addressing, routing protocols like OSPF and BGP, and
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
1) DHCP dynamically assigns IP addresses to clients on a network and is composed of four packet types during the lease process.
2) DHCP clients attempt to renew their leases at specific intervals before the lease expires.
3) DHCP servers must be authorized in Active Directory to lease addresses to clients if Active Directory is present.
Computer network network edge and networkrjnavallasca
This document discusses an application layer chapter that covers key concepts like the client-server and peer-to-peer paradigms, application layer protocols, and transport layer services. It specifically focuses on HTTP as the main application layer protocol for the web, describing its request and response message formats, use of TCP for reliable data transfer, and differences between non-persistent and persistent connections.
The document discusses the File Transfer Protocol (FTP). FTP uses two channels - a control channel over port 21 to send commands and a data channel over port 20 to transfer files. It describes common FTP commands to connect, navigate directories, set transfer properties, transfer files, and end sessions. The document also covers FTP status codes, transport bindings using active/passive modes, proxy transfers, and security issues like cleartext data transfers that FTP has addressed with TLS encryption.
The document discusses IP addresses and the differences between IPv4 and IPv6. It defines what an IP address is and explains the classes of IPv4 addresses including Class A, B, C, D and E. It also defines IPv6, noting it uses 128-bit addresses represented by 8 groups of hexadecimal digits separated by colons. The key differences between IPv4 and IPv6 are that IPv4 uses 32-bit addresses in dot-decimal notation while IPv6 uses 128-bit addresses in hexadecimal colon-separated notation and has a much larger address space.
This document provides steps to connect multiple networks in Cisco Packet Tracer using a router:
1. Set up networks and configure IP addresses on end devices and switches.
2. Connect switches to the router using cables and configure the router interface for each network with matching IP addresses.
3. Set the default gateway on all end devices to the router IP so devices on different networks can communicate.
The document discusses network layering models and TCP/IP fundamentals. It describes:
1. Networking problems are divided into layers for easier understanding and standardization, with the two main models being OSI and TCP/IP.
2. The TCP/IP model has four or five layers - process, host-to-host transport, internet, network access, and sometimes physical.
3. Packets are encapsulated as they leave a machine and decapsulated on the receiving host, with each layer adding headers.
The document discusses TCP/IP networking fundamentals including:
- The TCP/IP protocol suite model with layers for internet, transport, and applications.
- Key protocols like IP, TCP, UDP that operate at each layer.
- IP addressing and routing protocols like RIP and OSPF.
- Network applications that use TCP/IP like HTTP, FTP, SMTP, and DNS.
- Networking services like DHCP, NAT, and firewalls.
- Emerging technologies like IPv6 that expand addressing and add new features.
The document discusses authentication protocols to securely prove identity between two parties communicating over a network. Protocol ap5.0 uses public key cryptography and a nonce (random number) to authenticate, but it is vulnerable to a man-in-the-middle attack where an attacker can pose as both parties to intercept and alter communications. The document explores several authentication protocols and their vulnerabilities to illustrate challenges in securely authenticating identities over an open network.
This document discusses internet layer protocols and IP addressing. It covers the OSI reference model and protocols of the internet layer like IP, ICMP, ARP, and RARP. It also explains IP address classes A, B and C and the ranges they cover. Finally, it discusses private IP addresses and their use on private networks.
The document discusses the OSI physical layer. It describes the physical layer's purpose of creating electrical, optical, or microwave signals to represent bits in frames. It discusses different physical layer protocols and services, signaling and encoding methods used on different network media like copper, fiber, and wireless. It also covers physical layer standards bodies, functions of transmitting data, encoding it onto media, and signaling methods. Physical characteristics of different media types are explained as well as common physical layer protocols for wireless networking.
Link-state routing protocols use Dijkstra's algorithm to calculate the shortest path to all destinations based on a link-state database containing the full network topology. Each router runs the same algorithm locally to determine the optimal path. Key aspects include link-state advertisements to share connectivity information, the topological database to store network maps, and shortest path first calculations to derive routes. Common link-state protocols are OSPF and IS-IS. They provide fast convergence and scalability but require more resources than distance-vector protocols.
This document discusses ARP and RARP protocols. ARP is used to map IP addresses to MAC addresses on local networks. It works by broadcasting ARP requests and unicasting replies. RARP is used in the opposite direction, to map a device's MAC address to its IP address. Examples are given of how an ARP cache works, including entries for pending, resolved, and free states. RARP has been replaced by BOOTP and DHCP for providing additional configuration info like subnet masks.
ARP is a protocol that maps IP addresses to MAC addresses. It works by broadcasting an ARP request packet to all devices on the local network segment. The device with the matching IP address responds with its MAC address, allowing the requesting device to send packets directly to the destination MAC address on the local network.
Encapsulation refers to the process of adding headers and trailers to data as it passes from higher to lower layers in a networking model. At each layer, additional headers are added containing information for that layer, and the data plus added headers are passed to the next lower layer. Decapsulation is the reverse process of removing these headers at each layer as data moves from lower to upper layers.
This document discusses several internet protocols, including ARP and RARP. ARP is used to convert IP addresses to physical addresses like Ethernet addresses. It operates below the network layer to interface between OSI layers. A host broadcasts an ARP request to obtain another device's physical address. RARP is used to resolve an IP address from a given hardware address. It has been replaced by newer protocols but was used by clients to request IP addresses from a network.
This document provides information about IP addresses and Internet Protocol versions 4 and 6. It defines an IP address as a unique identifier for devices on a TCP/IP network. IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses to allow for many more available addresses. The document also describes how IP addresses are structured and assigned, either statically or dynamically through DHCP. It notes that IPv6 deployment is increasing to address IPv4 address exhaustion issues.
This document provides an overview of key concepts in network layer design, including:
- Store-and-forward packet switching and the services provided to the transport layer.
- Implementation of connectionless and connection-oriented services, and comparison of virtual circuits and datagrams.
- Routing algorithms like shortest path, flooding, distance vector, link state, and hierarchical routing.
- Quality of service techniques including integrated services, differentiated services, and MPLS.
- Internetworking issues such as connecting different networks, concatenated virtual circuits, tunneling, and fragmentation.
- An overview of the network layer in the Internet including IP, addressing, routing protocols like OSPF and BGP, and
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
1) DHCP dynamically assigns IP addresses to clients on a network and is composed of four packet types during the lease process.
2) DHCP clients attempt to renew their leases at specific intervals before the lease expires.
3) DHCP servers must be authorized in Active Directory to lease addresses to clients if Active Directory is present.
Computer network network edge and networkrjnavallasca
This document discusses an application layer chapter that covers key concepts like the client-server and peer-to-peer paradigms, application layer protocols, and transport layer services. It specifically focuses on HTTP as the main application layer protocol for the web, describing its request and response message formats, use of TCP for reliable data transfer, and differences between non-persistent and persistent connections.
The document discusses the File Transfer Protocol (FTP). FTP uses two channels - a control channel over port 21 to send commands and a data channel over port 20 to transfer files. It describes common FTP commands to connect, navigate directories, set transfer properties, transfer files, and end sessions. The document also covers FTP status codes, transport bindings using active/passive modes, proxy transfers, and security issues like cleartext data transfers that FTP has addressed with TLS encryption.
The document discusses IP addresses and the differences between IPv4 and IPv6. It defines what an IP address is and explains the classes of IPv4 addresses including Class A, B, C, D and E. It also defines IPv6, noting it uses 128-bit addresses represented by 8 groups of hexadecimal digits separated by colons. The key differences between IPv4 and IPv6 are that IPv4 uses 32-bit addresses in dot-decimal notation while IPv6 uses 128-bit addresses in hexadecimal colon-separated notation and has a much larger address space.
This document provides steps to connect multiple networks in Cisco Packet Tracer using a router:
1. Set up networks and configure IP addresses on end devices and switches.
2. Connect switches to the router using cables and configure the router interface for each network with matching IP addresses.
3. Set the default gateway on all end devices to the router IP so devices on different networks can communicate.
The document discusses network layering models and TCP/IP fundamentals. It describes:
1. Networking problems are divided into layers for easier understanding and standardization, with the two main models being OSI and TCP/IP.
2. The TCP/IP model has four or five layers - process, host-to-host transport, internet, network access, and sometimes physical.
3. Packets are encapsulated as they leave a machine and decapsulated on the receiving host, with each layer adding headers.
The document discusses TCP/IP networking fundamentals including:
- The TCP/IP protocol suite model with layers for internet, transport, and applications.
- Key protocols like IP, TCP, UDP that operate at each layer.
- IP addressing and routing protocols like RIP and OSPF.
- Network applications that use TCP/IP like HTTP, FTP, SMTP, and DNS.
- Networking services like DHCP, NAT, and firewalls.
- Emerging technologies like IPv6 that expand addressing and add new features.
The network layer is responsible for transporting data segments from source to destination hosts. It encapsulates segments into datagrams and delivers them to the transport layer. Network layer protocols run on every host and router. Routers examine header fields to forward datagrams appropriately based on destination addresses. The network layer handles addressing, routing, and intermediate forwarding of datagrams between source and destination hosts.
The document discusses various layers and concepts in computer networks and internetworking. It covers the network layer and its responsibilities in delivering packets from source to destination. It then discusses services provided by the network layer to the transport layer, including connection-oriented and connectionless services. Various routing algorithms and concepts are covered such as distance vector routing, link state routing, hierarchical routing, flooding, shortest path algorithms, broadcast routing, and multicast routing.
This document provides an overview of key concepts in the network layer, including the architecture of routers, IPv6, routing algorithms like link state and distance vector, and routing protocols like RIP, OSPF, and BGP. It discusses router functions such as routing algorithms/protocols and packet forwarding. It also covers topics like switching fabrics, queuing, and hierarchical routing between autonomous systems.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
Computer Networking Michaelmas/Lent Term M/W/F 11:00-12:00 LT1 in Gates Buil...moaminmarey2001
understand principles behind network layer services:
network layer service models
forwarding versus routing (versus switching)
how a router works
routing (path selection)
IPv6
For the most part, the Internet is our example – again.
Routing is the process of selecting paths in a network along which to send network traffic. There are several key components involved in routing, including routing algorithms, routing tables, and routing protocols. Common routing algorithms include distance vector algorithms like RIP, which use periodic updates between routers to share routing information, and link state algorithms like OSPF, which flood link state information to all routers to enable shortest path calculations. The Internet uses a hierarchical routing model with intra-domain routing protocols like OSPF and inter-domain routing with BGP.
This document provides an overview of routing concepts and protocols. It discusses the basic components of routing including algorithms, databases, and protocols. It describes different routing algorithm types such as static, distance vector, and link state. Specific routing protocols covered include RIP, OSPF, and BGP. It also discusses routing within autonomous systems and between autonomous systems on the internet.
Routing and IP in Advance Computer Network,Vikram SnehiMR. VIKRAM SNEHI
This document provides an overview of routing in IP networks. It discusses different routing protocols and algorithms used by routers to determine the best path between networks. Distance-vector protocols like RIP use hop count as the routing metric and exchange full routing tables periodically. Link-state protocols like OSPF use link costs and flood link state information to all routers to build a topology map and calculate shortest paths using Dijkstra's algorithm. BGP is used as the exterior routing protocol between autonomous systems. Areas are used in large OSPF networks to reduce routing overhead.
This document discusses routing in IP networks. It begins by introducing routing and routing protocols. Routers use routing protocols to decide the best path between networks based on metrics like link costs and current congestion. It then provides an example of router and network configurations with link costs. The document discusses routing tables, which contain the next hop for each destination network. It also covers different types of routing like fixed, adaptive, flooding and random routing. Adaptive routing aims to dynamically change paths in response to failures or congestion but faces challenges. The document classifies adaptive routing strategies and algorithms like distance-vector, link-state, and path-vector routing. It concludes by explaining the Dijkstra's and Bellman-Ford least cost
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
El documento presenta los resultados de un examen final de CCNA Routing y Switching que el estudiante completó con éxito. El examen contenía 30 preguntas y el estudiante respondió todas correctamente. El documento muestra cada pregunta, la respuesta del estudiante y el resultado de si la respuesta fue correcta o no. El estudiante dedicó un total de 16 horas y 24 minutos al curso y necesitó dos intentos para aprobar el examen final.
Este documento establece las medidas criptográficas recomendadas para diferentes niveles de seguridad en el Esquema Nacional de Seguridad. Define los algoritmos criptográficos acreditados para cifrado simétrico y asimétrico, funciones resumen y protocolos de acuerdo de clave. Además, especifica medidas para la identificación, autenticación, protección de claves, confidencialidad, integridad y firma electrónica adaptadas a tres niveles de seguridad.
El documento habla sobre la instalación y uso del navegador Google Chrome. Explica cómo descargar e instalar Chrome desde su página web oficial, iniciar sesión con una cuenta de Google para sincronizar datos, y utilizar las diferentes funciones como la barra de direcciones y botones de navegación.
Internet es una red informática mundial formada por la conexión entre ordenadores. Las páginas web están definidas en lenguaje HTML y se navegan mediante programas llamados navegadores web. Un dominio es la dirección de una página web que puede ser genérico o territorial según su gestión. El comercio electrónico permite comprar a través de internet. Los servidores almacenan las páginas web y los protocolos TCP/IP permiten la comunicación de datos a través de internet. Google es un buscador de internet.
La informática estudia los métodos para almacenar, procesar y transmitir datos digitales. Internet es una red mundial formada por la conexión de computadoras mediante un protocolo especial. Los navegadores como Chrome y Firefox son las herramientas más populares para acceder a los servicios en Internet como la World Wide Web, correo electrónico y comercio electrónico. El modelo cliente-servidor distribuye la información en Internet, donde los servidores almacenan las páginas web y los clientes las solicitan y muestran.
1. La gestión de vulnerabilidades no es una funcionalidad propia de una herramienta de inteligencia de amenazas como MISP. Estas herramientas se enfocan en compartir información de amenazas entre organizaciones para mejorar la detección y prevención de incidentes de ciberseguridad.
El documento describe las tecnologías de virtualización y despliegue de servicios. Explica conceptos como virtualización de redes, computación en la nube, Docker y Kubernetes. La virtualización permite compartir y agregar recursos de forma lógica. Kubernetes es una herramienta para la orquestación de contenedores que administra infraestructura, redes y almacenamiento para cargas de trabajo. El documento concluye con un caso práctico de despliegue de un servidor de video usando Kubernetes.
Este documento describe los pasos para instalar WordPress de forma manual y automática. La instalación manual implica descargar los archivos de WordPress, subirlos al hosting a través de FTP, y completar un formulario para configurar la base de datos y los detalles del sitio. La instalación automática usa herramientas como Softaculous para instalar WordPress con un solo clic, evitando la necesidad de descargar y subir archivos manualmente.
Este documento describe el proceso de creación de un sitio web en wordpress.com. Explica los 6 pasos para crear un sitio, incluyendo elegir un tema, nombre de dominio, y plan. También describe el menú de usuario que ofrece acceso a gestionar el sitio, estadísticas, y perfil de usuario. Finalmente, explica Calypso, la nueva interfaz de gestión basada en API que reemplazará a la interfaz tradicional WP Admin.
Este documento proporciona una introducción a WordPress, explicando que originalmente fue creado como un sistema para blogs pero que ahora es considerado un sistema de gestión de contenidos más amplio. Resume la historia de WordPress desde su creación en 2003, destacando hitos como la introducción de temas personalizados en 2005 y la integración de WordPress MU en 2010. También distingue entre WordPress.com, el servicio en la nube, y WordPress.org, el software de código abierto que requiere instalación en un hosting.
Análisis e Implementación de una Red "SDN" usando controladores "Open Source"Andy Juan Sarango Veliz
Este documento presenta un análisis e implementación de una red definida por software (SDN) usando controladores de código abierto. Se propone tres topologías diferentes y se analizan parámetros como ancho de banda, jitter y delay para cada controlador (Ryu, OpenDayLight y Floodlight) en cada topología. Los resultados muestran que el rendimiento de los controladores varía según la topología y no se puede determinar cuál es mejor, sino que depende de los requerimientos de la red.
Este documento presenta una introducción a la modulación digital, incluyendo conceptos como constelación, componentes I y Q, modulador en cuadratura y filtro de transmisión. Explica que la constelación representa la amplitud y fase de las señales, y que los símbolos son números complejos representados por sus componentes I (in-phase) y Q (quadrature). También describe el procesamiento de señales en un modulador en cuadratura y cómo el filtro de transmisión suaviza la señal modulada para reducir la interferencia entre
Este documento describe la modulación y demodulación FM. La parte III explica la modulación FM, donde la frecuencia de la portadora varía de acuerdo con la señal de información. Se muestran simulaciones y demostraciones de transmisores y receptores FM. La parte IV cubre la demodulación no coherente FM, que extrae la señal original de la envolvente de la señal recibida sin requerir generar la portadora.
Este documento presenta los conceptos básicos de la modulación y demodulación AM. Explica la modulación AM DSB-TC y las demodulaciones no coherente y coherente. Incluye simulaciones y experimentos para ilustrar los conceptos, como la simulación de un transmisor y receptor AM DSB-TC con demodulación no coherente y el uso de PLL para lograr demodulación coherente.
El documento presenta una introducción a GNU Radio Companion (GRC), un software libre que permite el procesamiento digital de señales para radio definida por software (SDR). GRC provee una interfaz gráfica para diseñar flujogramas de procesamiento de señales usando bloques de funciones de procesamiento de señal. El documento explica cómo usar GRC para generar y manipular señales, procesar datos binarios y comunicarse con dispositivos SDR.
Este documento presenta una introducción a la radio definida por software (SDR). Resume las sesiones y metodología del curso. Explica que un SDR permite realizar comunicaciones configurando el software en lugar del hardware. Describe sus componentes como la antena, interfaz RF, ADC, DAC y unidad de procesamiento digital. Explica cómo se programan usando GNU Radio Companion y sus aplicaciones como implementar estándares, plataforma educativa y evaluar arquitecturas.
MAE-RAV-ROS Introducción a Ruteo Avanzado con MikroTik RouterOS v6.42.5.01Andy Juan Sarango Veliz
Este documento presenta una introducción al libro de estudio "MAE-RAV-ROS - Introducción a Ruteo Avanzado con MikroTik RouterOS". El libro cubre conceptos avanzados de ruteo como OSPF, BGP y MPLS usando el sistema operativo de red MikroTik RouterOS. Incluye capítulos sobre ruteo simple y dinámico, protocolos de enrutamiento OSPF y BGP, y la tecnología MPLS. El objetivo final es proveer conocimientos técnicos sobre redes avanzadas usando
Los cuatro desafíos de ciberseguridad más críticos de nuestra generaciónAndy Juan Sarango Veliz
El documento describe cuatro desafíos críticos de ciberseguridad para la próxima generación: 1) compartir información sobre amenazas en tiempo real entre organizaciones, 2) colaborar amplia y profundamente para combatir ciberdelincuentes, 3) crear una visión integrada de ciberseguridad a nivel global, y 4) promover plataformas tecnológicas donde la seguridad esté integrada en todos los dispositivos y sistemas desde el diseño inicial.
This document provides an overview of the ITIL Foundation publication. It introduces Axle Car Hire, a fictional company undergoing a digital transformation using ITIL best practices. The publication covers the key concepts of the ITIL service value system framework and management practices. It is intended to help readers understand ITIL 4 and support candidates studying for the ITIL Foundation exam.
Comprehensive Guide to Distribution Line DesignRadharaman48
The Comprehensive Guide to Distribution Line Design offers an in-depth overview of the key principles and best practices involved in designing electrical distribution lines. It covers essential aspects such as line routing, structural layout, pole placement, and coordination with terrain and infrastructure. The guide also explores the two main types of distribution systems Overhead and Underground distribution lines highlighting their construction methods, design considerations, and areas of application.
It provides a clear comparison between overhead and underground systems in terms of installation, maintenance, reliability, safety, and visual impact. Additionally, it discusses various types of cables used in distribution networks, including their classifications based on voltage levels, insulation, and usage in either overhead or underground settings.
Emphasizing safety, reliability, regulatory compliance, and environmental factors, this guide serves as a foundational resource for professionals and students looking to understand how distribution networks are designed to efficiently and securely deliver electricity from substations to consumers.
Ceramic Multichannel Membrane Structure with Tunable Properties by Sol-Gel Me...DanyalNaseer3
A novel asymmetric ceramic membrane structure for different applications of wastewater treatment. With optimized layers- from macroporous support to nanofiltration-this innovative synthesis approach enhances permeability and antifouling properties of the membranes, offering a durable and high-performance alternative to conventional membranes in challenging environments.
Department of Environment (DOE) Mix Design with Fly Ash.MdManikurRahman
Concrete Mix Design with Fly Ash by DOE Method. The Department of Environmental (DOE) approach to fly ash-based concrete mix design is covered in this study.
The Department of Environment (DOE) method of mix design is a British method originally developed in the UK in the 1970s. It is widely used for concrete mix design, including mixes that incorporate supplementary cementitious materials (SCMs) such as fly ash.
When using fly ash in concrete, the DOE method can be adapted to account for its properties and effects on workability, strength, and durability. Here's a step-by-step overview of how the DOE method is applied with fly ash.
Peak ground acceleration (PGA) is a critical parameter in ground-motion investigations, in particular in earthquake-prone areas such as Iran. In the current study, a new method based on particle swarm optimization (PSO) is developed to obtain an efficient attenuation relationship for the vertical PGA component within the northern Iranian plateau. The main purpose of this study is to propose suitable attenuation relationships for calculating the PGA for the Alborz, Tabriz and Kopet Dag faults in the vertical direction. To this aim, the available catalogs of the study area are investigated, and finally about 240 earthquake records (with a moment magnitude of 4.1 to 6.4) are chosen to develop the model. Afterward, the PSO algorithm is used to estimate model parameters, i.e., unknown coefficients of the model (attenuation relationship). Different statistical criteria showed the acceptable performance of the proposed relationships in the estimation of vertical PGA components in comparison to the previously developed relationships for the northern plateau of Iran. Developed attenuation relationships in the current study are independent of shear wave velocity. This issue is the advantage of proposed relationships for utilizing in the situations where there are not sufficient shear wave velocity data.
Chapter 5 - Computer Networking a top-down Approach 7th
1. Computer
Networking: A Top
Down Approach
A note on the use of these Powerpoint slides:
We’re making these slides freely available to all (faculty, students, readers).
They’re in PowerPoint form so you see the animations; and can add, modify,
and delete slides (including this one) and slide content to suit your needs.
They obviously represent a lot of work on our part. In return for use, we only
ask the following:
If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
If you post any slides on a www site, that you note that they are adapted
from (or perhaps identical to) our slides, and note our copyright of this
material.
Thanks and enjoy! JFK/KWR
All material copyright 1996-2016
J.F Kurose and K.W. Ross, All Rights Reserved
7th edition
Jim Kurose, Keith Ross
Pearson/Addison Wesley
April 2016
Chapter 5
Network Layer:
The Control
Plane
5-1Network Layer: Control Plane
2. Chapter 5: network layer control
plane
chapter goals: understand principles behind
network control plane
traditional routing algorithms
SDN controlllers
Internet Control Message Protocol
network management
and their instantiation, implementation in the
Internet:
OSPF, BGP, OpenFlow, ODL and ONOS
controllers, ICMP, SNMP
5-2Network Layer: Control Plane
3. 5.1 introduction
5.2 routing protocols
link state
distance vector
5.3 intra-AS routing in the
Internet: OSPF
5.4 routing among the
ISPs: BGP
5.5 The SDN control plane
5.6 ICMP: The Internet
Control Message
Protocol
5.7 Network management
and SNMP
Chapter 5: outline
5-3Network Layer: Control Plane
4. Network-layer functions
forwarding: move packets
from router’s input to
appropriate router output
data plane
control plane
Two approaches to structuring network control plane:
per-router control (traditional)
logically centralized control (software defined networking)
Recall: two network-layer
functions:
5-4Network Layer: Control Plane
routing: determine route
taken by packets from
source to destination
5. Per-router control plane
Routing
Algorithm
Individual routing algorithm components in each and every
router interact with each other in control plane to compute
forwarding tables
data
plane
control
plane
5-5Network Layer: Control Plane
6. data
plane
control
plane
Logically centralized control plane
A distinct (typically remote) controller interacts with local
control agents (CAs) in routers to compute forwarding tables
Remote Controller
CA
CA CA CA CA
5-6Network Layer: Control Plane
7. 5.1 introduction
5.2 routing protocols
link state
distance vector
5.3 intra-AS routing in the
Internet: OSPF
5.4 routing among the
ISPs: BGP
5.5 The SDN control plane
5.6 ICMP: The Internet
Control Message
Protocol
5.7 Network management
and SNMP
Chapter 5: outline
5-7Network Layer: Control Plane
8. Routing protocols
Routing protocol goal: determine “good”
paths (equivalently, routes), from sending
hosts to receiving host, through network of
routers
path: sequence of routers packets will
traverse in going from given initial source
host to given final destination host
“good”: least “cost”, “fastest”, “least
congested”
routing: a “top-10” networking challenge!
5-8Network Layer: Control Plane
9. u
yx
wv
z
2
2
1
3
1
1
2
5
3
5
graph: G = (N,E)
N = set of routers = { u, v, w, x, y, z }
E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) }
Graph abstraction of the network
aside: graph abstraction is useful in other network contexts, e.g.,
P2P, where N is set of peers and E is set of TCP connections
5-9Network Layer: Control Plane
10. Graph abstraction: costs
u
yx
wv
z
2
2
1
3
1
1
2
5
3
5
c(x,x’) = cost of link (x,x’)
e.g., c(w,z) = 5
cost could always be 1, or
inversely related to bandwidth,
or inversely related to
congestion
cost of path (x1, x2, x3,…, xp) = c(x1,x2) + c(x2,x3) + … + c(xp-1,xp)
key question: what is the least-cost path between u and z ?
routing algorithm: algorithm that finds that least cost path
5-10Network Layer: Control Plane
11. Routing algorithm classification
Q: global or decentralized
information?
global:
all routers have complete
topology, link cost info
“link state” algorithms
decentralized:
router knows physically-
connected neighbors, link
costs to neighbors
iterative process of
computation, exchange of
info with neighbors
“distance vector”
algorithms
Q: static or dynamic?
static:
routes change slowly
over time
dynamic:
routes change more
quickly
• periodic update
• in response to link
cost changes
5-11Network Layer: Control Plane
12. 5.1 introduction
5.2 routing protocols
link state
distance vector
5.3 intra-AS routing in the
Internet: OSPF
5.4 routing among the
ISPs: BGP
5.5 The SDN control plane
5.6 ICMP: The Internet
Control Message
Protocol
5.7 Network management
and SNMP
Chapter 5: outline
5-12Network Layer: Control Plane
13. A link-state routing algorithm
Dijkstra’s algorithm
net topology, link costs
known to all nodes
• accomplished via “link
state broadcast”
• all nodes have same info
computes least cost
paths from one node
(‘source”) to all other
nodes
• gives forwarding table for
that node
iterative: after k
iterations, know least
cost path to k dest.’s
notation:
c(x,y): link cost from
node x to y; = ∞ if not
direct neighbors
D(v): current value of
cost of path from source
to dest. v
p(v): predecessor node
along path from source
to v
N': set of nodes whose
least cost path
definitively known
5-13Network Layer: Control Plane
14. Dijsktra’s algorithm
1 Initialization:
2 N' = {u}
3 for all nodes v
4 if v adjacent to u
5 then D(v) = c(u,v)
6 else D(v) = ∞
7
8 Loop
9 find w not in N' such that D(w) is a minimum
10 add w to N'
11 update D(v) for all v adjacent to w and not in N' :
12 D(v) = min( D(v), D(w) + c(w,v) )
13 /* new cost to v is either old cost to v or known
14 shortest path cost to w plus cost from w to v */
15 until all nodes in N'
5-14Network Layer: Control Plane
15. w3
4
v
x
u
5
3
7 4
y
8
z
2
7
9
Dijkstra’s algorithm: example
Step N'
D(v)
p(v)
0
1
2
3
4
5
D(w)
p(w)
D(x)
p(x)
D(y)
p(y)
D(z)
p(z)
u ∞∞7,u 3,u 5,u
uw ∞11,w6,w 5,u
14,x11,w6,wuwx
uwxv 14,x10,v
uwxvy 12,y
notes:
construct shortest path tree
by tracing predecessor
nodes
ties can exist (can be broken
arbitrarily)
uwxvyz
5-15Network Layer: Control Plane
17. Dijkstra’s algorithm: example (2)
u
yx
wv
z
resulting shortest-path tree from u:
v
x
y
w
z
(u,v)
(u,x)
(u,x)
(u,x)
(u,x)
destination link
resulting forwarding table in u:
5-17Network Layer: Control Plane
18. Dijkstra’s algorithm, discussion
algorithm complexity: n nodes
each iteration: need to check all nodes, w, not in N
n(n+1)/2 comparisons: O(n2)
more efficient implementations possible: O(nlogn)
oscillations possible:
e.g., support link cost equals amount of carried
traffic:
A
D
C
B
1 1+e
e0
e
1 1
0 0
initially
A
D
C
B
given these costs,
find new routing….
resulting in new costs
2+e 0
00
1+e 1
A
D
C
B
given these costs,
find new routing….
resulting in new costs
0 2+e
1+e1
0 0
A
D
C
B
given these costs,
find new routing….
resulting in new costs
2+e 0
00
1+e 1
5-18Network Layer: Control Plane
19. 5.1 introduction
5.2 routing protocols
link state
distance vector
5.3 intra-AS routing in the
Internet: OSPF
5.4 routing among the
ISPs: BGP
5.5 The SDN control plane
5.6 ICMP: The Internet
Control Message
Protocol
5.7 Network management
and SNMP
Chapter 5: outline
5-19Network Layer: Control Plane
20. Distance vector algorithm
Bellman-Ford equation (dynamic programming)
let
dx(y) := cost of least-cost path from x to y
then
dx(y) = min {c(x,v) + dv(y) }v
cost to neighbor v
min taken over all neighbors v of x
cost from neighbor v to destination y
5-20Network Layer: Control Plane
21. Bellman-Ford example
u
yx
wv
z
2
2
1
3
1
1
2
5
3
5
clearly, dv(z) = 5, dx(z) = 3, dw(z) = 3
du(z) = min { c(u,v) + dv(z),
c(u,x) + dx(z),
c(u,w) + dw(z) }
= min {2 + 5,
1 + 3,
5 + 3} = 4
node achieving minimum is next
hop in shortest path, used in forwarding table
B-F equation says:
5-21Network Layer: Control Plane
22. Distance vector algorithm
Dx(y) = estimate of least cost from x to y
• x maintains distance vector Dx = [Dx(y): y є N ]
node x:
• knows cost to each neighbor v: c(x,v)
• maintains its neighbors’ distance vectors.
For each neighbor v, x maintains
Dv = [Dv(y): y є N ]
5-22Network Layer: Control Plane
23. key idea:
from time-to-time, each node sends its own
distance vector estimate to neighbors
when x receives new DV estimate from
neighbor, it updates its own DV using B-F
equation:
Dx(y) ← minv{c(x,v) + Dv(y)} for each node y ∊ N
under minor, natural conditions, the estimate
Dx(y) converge to the actual least cost dx(y)
Distance vector algorithm
5-23Network Layer: Control Plane
24. iterative,
asynchronous: each
local iteration caused
by:
local link cost change
DV update message
from neighbor
distributed:
each node notifies
neighbors only when its
DV changes
• neighbors then notify
their neighbors if
necessary
wait for (change in local link
cost or msg from neighbor)
recompute estimates
if DV to any dest has
changed, notify neighbors
each node:
Distance vector algorithm
5-24Network Layer: Control Plane
25. x y z
x
y
z
0 2 7
∞ ∞ ∞
∞ ∞ ∞
from
cost to
fromfrom
x y z
x
y
z
0
x y z
x
y
z
∞ ∞
∞ ∞ ∞
cost to
x y z
x
y
z
∞ ∞ ∞
7 1 0
cost to
∞
2 0 1
∞ ∞ ∞
2 0 1
7 1 0
time
x z
12
7
y
node x
table
Dx(y) = min{c(x,y) + Dy(y), c(x,z) + Dz(y)}
= min{2+0 , 7+1} = 2
Dx(z) = min{c(x,y) +
Dy(z), c(x,z) + Dz(z)}
= min{2+1 , 7+0} = 3
32
node y
table
node z
table
cost to
from
5-25Network Layer: Control Plane
26. x y z
x
y
z
0 2 3
from
cost to
x y z
x
y
z
0 2 7
from
cost to
x y z
x
y
z
0 2 3
from
cost to
x y z
x
y
z
0 2 3
from
cost to
x y z
x
y
z
0 2 7
from
cost to
2 0 1
7 1 0
2 0 1
3 1 0
2 0 1
3 1 0
2 0 1
3 1 0
2 0 1
3 1 0
time
x y z
x
y
z
0 2 7
∞ ∞ ∞
∞ ∞ ∞
from
cost to
fromfrom
x y z
x
y
z
0
x y z
x
y
z
∞ ∞
∞ ∞ ∞
cost to
x y z
x
y
z
∞ ∞ ∞
7 1 0
cost to
∞
2 0 1
∞ ∞ ∞
2 0 1
7 1 0
time
x z
12
7
y
node x
table
Dx(y) = min{c(x,y) + Dy(y), c(x,z) + Dz(y)}
= min{2+0 , 7+1} = 2
Dx(z) = min{c(x,y) +
Dy(z), c(x,z) + Dz(z)}
= min{2+1 , 7+0} = 3
32
node y
table
node z
table
cost to
from
5-26Network Layer: Control Plane
27. Distance vector: link cost changes
link cost changes:
node detects local link cost
change
updates routing info,
recalculates
distance vector
if DV changes, notify neighbors“good
news
travels
fast”
x z
14
50
y
1
t0 : y detects link-cost change, updates its DV, informs its
neighbors.
t1 : z receives update from y, updates its table, computes new
least cost to x , sends its neighbors its DV.
t2 : y receives z’s update, updates its distance table. y’s least costs
do not change, so y does not send a message to z.
5-27Network Layer: Control Plane
* Check out the online interactive exercises for more
examples: http://gaia.cs.umass.edu/kurose_ross/interactive/
28. Distance vector: link cost changes
link cost changes:
node detects local link cost
change
bad news travels slow - “count
to infinity” problem!
44 iterations before algorithm
stabilizes: see text
x z
14
50
y
60
poisoned reverse:
If Z routes through Y to get to X :
Z tells Y its (Z’s) distance to X is infinite (so Y won’t
route to X via Z)
will this completely solve count to infinity
problem?
5-28Network Layer: Control Plane
29. Comparison of LS and DV algorithms
message complexity
LS: with n nodes, E links,
O(nE) msgs sent
DV: exchange between
neighbors only
• convergence time varies
speed of convergence
LS: O(n2) algorithm requires
O(nE) msgs
• may have oscillations
DV: convergence time varies
• may be routing loops
• count-to-infinity problem
robustness: what happens if
router malfunctions?
LS:
• node can advertise
incorrect link cost
• each node computes only
its own table
DV:
• DV node can advertise
incorrect path cost
• each node’s table used by
others
• error propagate thru
network
5-29Network Layer: Control Plane
30. 5.1 introduction
5.2 routing protocols
link state
distance vector
5.3 intra-AS routing in the
Internet: OSPF
5.4 routing among the
ISPs: BGP
5.5 The SDN control plane
5.6 ICMP: The Internet
Control Message
Protocol
5.7 Network management
and SNMP
Chapter 5: outline
5-30Network Layer: Control Plane
31. Making routing
scalable
scale: with billions of
destinations:
can’t store all
destinations in routing
tables!
routing table exchange
would swamp links!
administrative
autonomy
internet = network of
networks
each network admin may
want to control routing in
its own network
our routing study thus far - idealized
all routers identical
network “flat”
… not true in practice
5-31Network Layer: Control Plane
32. aggregate routers into regions known as
“autonomous systems” (AS) (a.k.a. “domains”)
inter-AS routing
routing among AS’es
gateways perform inter-
domain routing (as well
as intra-domain
routing)
Internet approach to scalable
routing
intra-AS routing
routing among hosts,
routers in same AS
(“network”)
all routers in AS must run
same intra-domain protocol
routers in different AS can
run different intra-domain
routing protocol
gateway router: at “edge”
of its own AS, has link(s) to
router(s) in other AS’es 5-32Network Layer: Control Plane
34. Inter-AS tasks
suppose router in AS1
receives datagram
destined outside of
AS1:
• router should forward
packet to gateway
router, but which
one?
AS1 must:
1. learn which dests are
reachable through
AS2, which through
AS3
2. propagate this
reachability info to all
routers in AS1
job of inter-AS routing!
AS3
AS2
3b
3c
3a
AS1
1c
1a
1d
1b
2a
2c
2b
other
networks
other
networks
5-34Network Layer: Control Plane
35. Intra-AS Routing
also known as interior gateway protocols
(IGP)
most common intra-AS routing protocols:
• RIP: Routing Information Protocol
• OSPF: Open Shortest Path First (IS-IS
protocol essentially same as OSPF)
• IGRP: Interior Gateway Routing Protocol
(Cisco proprietary for decades, until 2016)
5-35Network Layer: Control Plane
36. OSPF (Open Shortest Path First)
“open”: publicly available
uses link-state algorithm
• link state packet dissemination
• topology map at each node
• route computation using Dijkstra’s algorithm
router floods OSPF link-state advertisements to
all other routers in entire AS
• carried in OSPF messages directly over IP (rather
than TCP or UDP
• link state: for each attached link
IS-IS routing protocol: nearly identical to OSPF
5-36Network Layer: Control Plane
37. OSPF “advanced” features
security: all OSPF messages authenticated (to
prevent malicious intrusion)
multiple same-cost paths allowed (only one path
in RIP)
for each link, multiple cost metrics for different
TOS (e.g., satellite link cost set low for best
effort ToS; high for real-time ToS)
integrated uni- and multi-cast support:
• Multicast OSPF (MOSPF) uses same
topology data base as OSPF
hierarchical OSPF in large domains.
5-37Network Layer: Control Plane
39. two-level hierarchy: local area, backbone.
• link-state advertisements only in area
• each nodes has detailed area topology; only
know direction (shortest path) to nets in other
areas.
area border routers: “summarize” distances to
nets in own area, advertise to other Area Border
routers.
backbone routers: run OSPF routing limited to
backbone.
boundary routers: connect to other AS’es.
Hierarchical
OSPF
5-39Network Layer: Control Plane
40. 5.1 introduction
5.2 routing protocols
link state
distance vector
5.3 intra-AS routing in the
Internet: OSPF
5.4 routing among the
ISPs: BGP
5.5 The SDN control plane
5.6 ICMP: The Internet
Control Message
Protocol
5.7 Network management
and SNMP
Chapter 5: outline
5-40Network Layer: Control Plane
41. Internet inter-AS routing: BGP
BGP (Border Gateway Protocol): the de facto
inter-domain routing protocol
• “glue that holds the Internet together”
BGP provides each AS a means to:
• eBGP: obtain subnet reachability information
from neighboring ASes
• iBGP: propagate reachability information to all
AS-internal routers.
• determine “good” routes to other networks based
on reachability information and policy
allows subnet to advertise its existence to
rest of Internet: “I am here”
5-41Network Layer: Control Plane
42. eBGP, iBGP connections
eBGP connectivity
iBGP connectivity
1b
1d
1c1a
2b
2d
2c2a
3b
3d
3c3a
AS 2
AS 3AS 1
5-42Network Layer: Control Plane
1c
∂
∂
gateway routers run both eBGP and iBGP protools
43. BGP basics
when AS3 gateway router 3a advertises path AS3,X to AS2
gateway router 2c:
• AS3 promises to AS2 it will forward datagrams towards
X
BGP session: two BGP routers (“peers”) exchange BGP
messages over semi-permanent TCP connection:
• advertising paths to different destination network
prefixes (BGP is a “path vector” protocol)
1b
1d
1c1a
2b
2d
2c2a
3b
3d
3c3a
AS 2
AS 3
AS 1
X
BGP advertisement:
AS3, X
5-43Network Layer: Control Plane
44. Path attributes and BGP
routes
advertised prefix includes BGP attributes
• prefix + attributes = “route”
two important attributes:
• AS-PATH: list of ASes through which prefix
advertisement has passed
• NEXT-HOP: indicates specific internal-AS router to
next-hop AS
Policy-based routing:
• gateway receiving route advertisement uses import
policy to accept/decline path (e.g., never route
through AS Y).
• AS policy also determines whether to advertise path
to other other neighboring ASes
5-44Network Layer: Control Plane
45. BGP path advertisement
Based on AS2 policy, AS2 router 2c accepts path AS3,X,
propagates (via iBGP) to all AS2 routers
1b
1d
1c1a
2b
2d
2c2a
3b
3d
3c3a
AS2
AS3
AS1
X
AS3,X
AS2,AS3,X
AS2 router 2c receives path advertisement AS3,X (via eBGP)
from AS3 router 3a
Based on AS2 policy, AS2 router 2a advertises (via eBGP) path
AS2, AS3, X to AS1 router 1c
5-45Network Layer: Control Plane
46. BGP path advertisement
AS1 gateway router 1c learns path AS2,AS3,X from 2a
1b
1d
1c1a
2b
2d
2c2a
3b
3d
3c3a
AS2
AS3
AS1
X
AS3,X
AS2,AS3,X
gateway router may learn about multiple paths to destination:
AS1 gateway router 1c learns path AS3,X from 3a
Based on policy, AS1 gateway router 1c chooses path AS3,X,
and advertises path within AS1 via iBGP
5-46Network Layer: Control Plane
47. BGP messages
BGP messages exchanged between peers over TCP
connection
BGP messages:
• OPEN: opens TCP connection to remote BGP peer
and authenticates sending BGP peer
• UPDATE: advertises new path (or withdraws old)
• KEEPALIVE: keeps connection alive in absence of
UPDATES; also ACKs OPEN request
• NOTIFICATION: reports errors in previous msg; also
used to close connection
5-47Network Layer: Control Plane
48. BGP, OSPF, forwarding table
entries
recall: 1a, 1b, 1c learn about dest X via
iBGP from 1c: “path to X goes through
1c”
1b
1d
1c1a
2b
2d
2c2a
3b
3d
3c3a
AS2
AS3
AS1
X
AS3,X
AS2,AS3,X
1d: OSPF intra-domain routing: to get to 1c,
forward over outgoing local interface 1
Q: how does router set forwarding table entry to distant prefix?
12
1
2
dest interface
…
…
X
…
…
1
physical link
local link
interfaces
at 1a, 1d
5-48Network Layer: Control Plane
49. BGP, OSPF, forwarding table
entries
recall: 1a, 1b, 1c learn about dest X via
iBGP from 1c: “path to X goes through
1c”
1b
1d
1c1a
2b
2d
2c2a
3b
3d
3c3a
AS2
AS3
AS1
X
1d: OSPF intra-domain routing: to get to 1c,
forward over outgoing local interface 1
Q: how does router set forwarding table entry to distant prefix?
dest interface
…
…
X
…
…
2
1a: OSPF intra-domain routing: to get to
1c, forward over outgoing local interface
2
1
2
5-49Network Layer: Control Plane
50. BGP route selection
router may learn about more than one route
to destination AS, selects route based on:
1. local preference value attribute: policy decision
2. shortest AS-PATH
3. closest NEXT-HOP router: hot potato routing
4. additional criteria
5-50Network Layer: Control Plane
51. Hot Potato Routing
2d learns (via iBGP) it can route to X via 2a or 2c
hot potato routing: choose local gateway that has least
intra-domain cost (e.g., 2d chooses 2a, even though
more AS hops to X): don’t worry about inter-domain cost!
1b
1d
1c1a
2b
2d
2c2a
3b
3d
3c3a
AS2
AS3
AS1
X
AS3,X
AS1,AS3,X
OSPF link weights
201
152
112
263
5-51Network Layer: Control Plane
52. A advertises path Aw to B and to C
B chooses not to advertise BAw to C:
B gets no “revenue” for routing CBAw, since none of C, A, w
are B’s customers
C does not learn about CBAw path
C will route CAw (not using B) to get to w
A
B
C
W
X
Y
legend:
customer
network:
provider
network
Suppose an ISP only wants to route traffic to/from its customer
networks (does not want to carry transit traffic between other ISPs)
5-52Network Layer: Control Plane
BGP: achieving policy via
advertisements
53. BGP: achieving policy via
advertisements
A,B,C are provider networks
X,W,Y are customer (of provider networks)
X is dual-homed: attached to two networks
policy to enforce: X does not want to route from B to C via
X
.. so X will not advertise to B a route to C
A
B
C
W
X
Y
legend:
customer
network:
provider
network
Suppose an ISP only wants to route traffic to/from its customer
networks (does not want to carry transit traffic between other ISPs)
5-53Network Layer: Control Plane
54. Why different Intra-, Inter-AS routing
?
policy:
inter-AS: admin wants control over how its traffic
routed, who routes through its net.
intra-AS: single admin, so no policy decisions
needed
scale:
hierarchical routing saves table size, reduced
update traffic
performance:
intra-AS: can focus on performance
inter-AS: policy may dominate over performance
5-54Network Layer: Control Plane
55. 5.1 introduction
5.2 routing protocols
link state
distance vector
5.3 intra-AS routing in the
Internet: OSPF
5.4 routing among the
ISPs: BGP
5.5 The SDN control plane
5.6 ICMP: The Internet
Control Message
Protocol
5.7 Network management
and SNMP
Chapter 5: outline
5-55Network Layer: Control Plane
56. Software defined networking (SDN)
Internet network layer: historically has been
implemented via distributed, per-router
approach
• monolithic router contains switching hardware,
runs proprietary implementation of Internet
standard protocols (IP, RIP, IS-IS, OSPF, BGP) in
proprietary router OS (e.g., Cisco IOS)
• different “middleboxes” for different network layer
functions: firewalls, load balancers, NAT boxes, ..
~2005: renewed interest in rethinking network
control plane
5-56Network Layer: Control Plane
57. Recall: per-router control plane
Routing
Algorithm
Individual routing algorithm components in each and every
router interact with each other in control plane to compute
forwarding tables
data
plane
control
plane
5-57Network Layer: Control Plane
58. data
plane
control
plane
Recall: logically centralized control plane
A distinct (typically remote) controller interacts with local
control agents (CAs) in routers to compute forwarding tables
Remote Controller
CA
CA CA CA CA
5-58Network Layer: Control Plane
59. Software defined networking (SDN)
Why a logically centralized control plane?
easier network management: avoid router
misconfigurations, greater flexibility of traffic
flows
table-based forwarding (recall OpenFlow API)
allows “programming” routers
• centralized “programming” easier: compute tables
centrally and distribute
• distributed “programming: more difficult: compute
tables as result of distributed algorithm (protocol)
implemented in each and every router
open (non-proprietary) implementation of
control plane
5-59Network Layer: Control Plane
60. Vertically integrated
Closed, proprietary
Slow innovation
Small industry
Specialized
Operating
System
Specialized
Hardware
Ap
p
Ap
p
Ap
p
Ap
p
Ap
p
Ap
p
Ap
p
Ap
p
Ap
p
Ap
p
App
Specialized
Applications
Horizontal
Open interfaces
Rapid innovation
Huge industry
Microprocessor
Open Interface
Linux
Mac
OS
Windows
(OS)
or or
Open Interface
Analogy: mainframe to PC evolution*
* Slide courtesy: N. McKeown 5-60Network Layer: Control Plane
61. Traffic engineering: difficult traditional
routing
Q: what if network operator wants u-to-z traffic to flow along
uvwz, x-to-z traffic to flow xwyz?
A: need to define link weights so traffic routing algorithm
computes routes accordingly (or need a new routing algorithm)!
Link weights are only control “knobs”: wrong!
5-61Network Layer: Control Plane
2
2
1
3
1
1
2
5
3
5
v w
u z
yx
62. Traffic engineering: difficult
Q: what if network operator wants to split u-to-z
traffic along uvwz and uxyz (load balancing)?
A: can’t do it (or need a new routing algorithm)
5-62Network Layer: Control Plane
2
2
1
3
1
1
2
5
3
5
v w
u z
yx
64. Software defined networking (SDN)
data
plane
control
plane
Remote Controller
CA
CA CA CA CA
1: generalized“ flow-
based” forwarding
(e.g., OpenFlow)
2. control,
data plane
separation
3. control plane
functions
external to data-
plane switches
…
4. programmable
control
applications
routing
access
control
load
balance
5-64Network Layer: Control Plane
65. SDN perspective: data plane switches
Data plane switches
fast, simple, commodity
switches implementing
generalized data-plane
forwarding (Section 4.4) in
hardware
switch flow table computed,
installed by controller
API for table-based switch
control (e.g., OpenFlow)
• defines what is controllable and
what is not
protocol for communicating
with controller (e.g.,
OpenFlow)
data
plane
control
plane
SDN Controller
(network operating system)
…routing
access
control
load
balance
southbound API
northbound API
SDN-controlled switches
network-control applications
5-65Network Layer: Control Plane
66. SDN perspective: SDN controller
SDN controller (network
OS):
maintain network state
information
interacts with network
control applications “above”
via northbound API
interacts with network
switches “below” via
southbound API
implemented as distributed
system for performance,
scalability, fault-tolerance,
robustness
data
plane
control
plane
SDN Controller
(network operating system)
…routing
access
control
load
balance
southbound API
northbound API
SDN-controlled switches
network-control applications
5-66Network Layer: Control Plane
67. SDN perspective: control applications
network-control apps:
“brains” of control:
implement control functions
using lower-level services,
API provided by SND
controller
unbundled: can be provided
by 3rd party: distinct from
routing vendor, or SDN
controller
data
plane
control
plane
SDN Controller
(network operating system)
…routing
access
control
load
balance
southbound API
northbound API
SDN-controlled switches
network-control applications
5-67Network Layer: Control Plane
68. Network-wide distributed, robust state management
Communication to/from controlled devices
Link-state info switch infohost info
statistics flow tables…
…
OpenFlow SNMP…
network
graph intent
RESTful
API
…
Interface, abstractions for network control apps
SDN
controller
routing access
control
load
balance
Components of SDN controller
communication
layer:
communicate
between SDN
controller and
controlled
switches
Network-wide state
management
layer: state of
networks links,
switches, services:
a distributed
database
Interface layer to
network control
apps: abstractions
API
5-68Network Layer: Control Plane
69. OpenFlow protocol
operates between
controller, switch
TCP used to
exchange messages
• optional encryption
three classes of
OpenFlow
messages:
• controller-to-switch
• asynchronous
(switch to controller)
• symmetric (misc)
OpenFlow Controller
5-69Network Layer: Control Plane
70. OpenFlow: controller-to-switch
messages
Key controller-to-switch
messages
features: controller queries
switch features, switch
replies
configure: controller
queries/sets switch
configuration parameters
modify-state: add, delete,
modify flow entries in the
OpenFlow tables
packet-out: controller can
send this packet out of
OpenFlow Controller
5-70Network Layer: Control Plane
71. OpenFlow: switch-to-controller
messages
Key switch-to-controller messages
packet-in: transfer packet (and
its control) to controller. See
packet-out message from
controller
flow-removed: flow table entry
deleted at switch
port status: inform controller of a
change on a port.
Fortunately, network operators don’t “program” switches
by creating/sending OpenFlow messages directly.
Instead use higher-level abstraction at controller
OpenFlow Controller
5-71Network Layer: Control Plane
72. Link-state info switch infohost info
statistics flow tables
…
…
OpenFlow SNMP
…
network
graph intent
RESTful
API
…
1
2
3
4 5
Dijkstra’s link-state
Routing
s1
s2
s3
s4
SDN: control/data plane interaction
example
S1, experiencing link failure
using OpenFlow port status
message to notify controller
1
SDN controller receives
OpenFlow message,
updates link status info
2
Dijkstra’s routing algorithm
application has previously
registered to be called when
ever link status changes. It
is called.
3
Dijkstra’s routing algorithm
access network graph info,
link state info in controller,
computes new routes
4
5-72Network Layer: Control Plane
73. Link-state info switch infohost info
statistics flow tables
…
…
OpenFlow SNMP
…
network
graph intent
RESTful
API
…
1
2
3
4 5
Dijkstra’s link-state
Routing
s1
s2
s3
s4
SDN: control/data plane interaction
example
link state routing app
interacts with flow-table-
computation component in
SDN controller, which
computes new flow tables
needed
5
Controller uses OpenFlow
to install new tables in
switches that need updating
6
5-73Network Layer: Control Plane
74. topology
manager
Basic Network Service Functions
REST
API
OpenFlow 1.0
… SNMP OVSDB
forwarding
manager
switch
manager
host
manager
stats
manager
Network
service apps
Service Abstraction Layer (SAL)
Access
Control
Traffic
Engineering
…
OpenDaylight (ODL) controller
ODL Lithium
controller
network apps may
be contained
within, or be
external to SDN
controller
Service
Abstraction Layer:
interconnects
internal, external
applications and
services
5-74Network Layer: Control Plane
75. Network
control apps
…
REST API
ONOS
distributed
core
southbound
abstractions,
protocolsOpenFlow Netconf OVSDB
device link host flow packet
northbound
abstractions,
protocols
Intent
statisticsdevices
hosts
links
paths flow rules topology
ONOS controller
control apps
separate from
controller
intent framework:
high-level
specification of
service: what
rather than how
considerable
emphasis on
distributed core:
service reliability,
replication
performance
scaling
5-75Network Layer: Control Plane
76. SDN: selected challenges
hardening the control plane: dependable,
reliable, performance-scalable, secure
distributed system
• robustness to failures: leverage strong theory of
reliable distributed system for control plane
• dependability, security: “baked in” from day one?
networks, protocols meeting mission-specific
requirements
• e.g., real-time, ultra-reliable, ultra-secure
Internet-scaling
5-76Network Layer: Control Plane
77. 5.1 introduction
5.2 routing protocols
link state
distance vector
5.3 intra-AS routing in the
Internet: OSPF
5.4 routing among the
ISPs: BGP
5.5 The SDN control plane
5.6 ICMP: The Internet
Control Message
Protocol
5.7 Network management
and SNMP
Chapter 5: outline
5-77Network Layer: Control Plane
78. ICMP: internet control message
protocol
used by hosts & routers
to communicate
network-level
information
• error reporting:
unreachable host,
network, port, protocol
• echo request/reply (used
by ping)
network-layer “above”
IP:
• ICMP msgs carried in IP
datagrams
ICMP message: type,
code plus first 8 bytes
of IP datagram causing
error
Type Code description
0 0 echo reply (ping)
3 0 dest. network unreachable
3 1 dest host unreachable
3 2 dest protocol unreachable
3 3 dest port unreachable
3 6 dest network unknown
3 7 dest host unknown
4 0 source quench (congestion
control - not used)
8 0 echo request (ping)
9 0 route advertisement
10 0 router discovery
11 0 TTL expired
12 0 bad IP header
5-78Network Layer: Control Plane
79. Traceroute and ICMP
source sends series of
UDP segments to
destination
• first set has TTL =1
• second set has TTL=2, etc.
• unlikely port number
when datagram in nth
set arrives to nth router:
• router discards datagram
and sends source ICMP
message (type 11, code 0)
• ICMP message include
name of router & IP address
when ICMP message
arrives, source records
RTTs
stopping criteria:
UDP segment
eventually arrives at
destination host
destination returns
ICMP “port
unreachable” message
(type 3, code 3)
source stops
3 probes
3 probes
3 probes
5-79Network Layer: Control Plane
80. 5.1 introduction
5.2 routing protocols
link state
distance vector
5.3 intra-AS routing in the
Internet: OSPF
5.4 routing among the
ISPs: BGP
5.5 The SDN control plane
5.6 ICMP: The Internet
Control Message
Protocol
5.7 Network management
and SNMP
Chapter 5: outline
5-80Network Layer: Control Plane
81. What is network
management?
autonomous systems (aka “network”): 1000s of
interacting hardware/software components
other complex systems requiring monitoring, control:
• jet airplane
• nuclear power plant
• others?
"Network management includes the deployment, integration
and coordination of the hardware, software, and human
elements to monitor, test, poll, configure, analyze, evaluate,
and control the network and element resources to meet the
real-time, operational performance, and Quality of Service
requirements at a reasonable cost."
5-81Network Layer: Control Plane
82. Infrastructure for network
management
managed device
managed device
managed device
managed device
definitions:
managed devices
contain managed
objects whose data
is gathered into a
Management
Information Base
(MIB)
managing
entity data
managing entity
agent data
agent data
network
management
protocol
managed device
agent data
agent data
agent data
5-82Network Layer: Control Plane
83. SNMP protocol
Two ways to convey MIB info, commands:
agent data
managed device
managing
entity
agent data
managed device
managing
entity
trap msg
request
request/response mode trap mode
response
5-83Network Layer: Control Plane
84. SNMP protocol: message
types
GetRequest
GetNextRequest
GetBulkRequest
manager-to-agent: “get me data”
(data instance, next data in list, block of data)
Message type Function
InformRequest manager-to-manager: here’s MIB value
SetRequest manager-to-agent: set MIB value
Response Agent-to-manager: value, response to
Request
Trap Agent-to-manager: inform manager
of exceptional event
5-84Network Layer: Control Plane
86. Chapter 5: summary
we’ve learned a lot!
approaches to network control plane
• per-router control (traditional)
• logically centralized control (software defined
networking)
traditional routing algorithms
• implementation in Internet: OSPF, BGP
SDN controllers
• implementation in practice: ODL, ONOS
Internet Control Message Protocol
network management
next stop: link layer!
5-86Network Layer: Control Plane