SlideShare a Scribd company logo
Packet Switching
COM1337/3501
Textbook: Computer Networks: A Systems Approach,
L. Peterson, B. Davie, Morgan Kaufmann
Chapter 3.
Outline
• Packet switching paradigms
• Bridges and extended LANs
• Cell switching
• Switching hardware
Scalable Networks
• Switch
– forwards packets from input port to output port
– port selected based on address in packet header
• Advantages
– cover large geographic area (tolerate latency)
– support large numbers of hosts (scalable bandwidth)
Input
ports
T3
T3
STS-1
T3
T3
STS-1
Switch
Output
ports
Packet Switching Paradigms
• Virtual circuit switching (routing)
• Datagram switching (routing)
• Source routing
Source Routing
• The information to route the packet is provided by the
source host and included in the packet
• Example of implementing source routing:
– Assign a number to each switch output port
– Include the list of output ports that the packet has to go through
– The list is rotated by the intermediate switches before forwarding
• Disadvantage:
– Packet initiators need to have a sufficient information about the
network topology
– The header has a variable length
Source Routing
0
1
3
2
0
1 3
2
0
1
3
2
0
1
3
2
3 0 1 3 0
1
3
0 1
Sw itch 3
Host B
Sw itch 2
Host A
Sw itch 1
Virtual Circuit (VC) Switching
• Explicit connection setup (and tear-down) phase
• Subsequent packets follow same circuit (path)
• Sometimes called connection-oriented model
0
1
3
2
0
1 3
2
0
1
3
2
5
11
4
7
Switch 3
Host B
Switch 2
Host A
Switch 1
• Analogy:
phone call
• Each switch
maintains a
VC table
Virtual Circuit Switching
• Connection Setup approaches:
– Permanent Virtual Circuits (PVC): manually setup/removed
by network administrators
– Switched Virtual Circuits (SVC): dynamically setup through
signaling over some control channels
• Connection state => VC table
– incoming interface, VC Identifier (VCI), outgoing interface,
outgoing VCI
• SVC:
– The setup message is forwarded over the network
– New entries are created in the VC table and destination
switches choose incoming VCI
– When the setup message reaches the destination, connection
Virtual Circuits
• Examples of Virtual Circuit Technology:
– Frame Relay, X.25, Asynchronous Transfer
Mode (ATM)
• Frame Relay was popular for creating
virtual private networks (VPNs) using PVC.
• ATM is a more complex technology that
provides mechanisms for supporting quality
of service
Datagram Switching
• No connection setup phase
• Each packet forwarded independently
• Sometimes called connectionless model
0
1
3
2
0
1 3
2
0
1
3
2
Switch 3
Switch 2
Host A
Switch 1
Host C
Host D
Host E
Host G
Host H
• Analogy:
postal system
• Each switch
maintains a
forwarding
(routing) table
Switch 4
Virtual Circuit Model
• Setup: Typically wait full RTT for connection
setup before sending first data packet.
• Header: While the connection request contains
the full destination address, each data packet
contains only a small identifier, making the per-
packet header overhead small.
• Quality of Service (QoS):
– Connection setup allows resource reservation
– If a switch or a link in a connection fails, the
connection is broken and a new one needs to be
established.
Datagram Model
• Setup: There is no round trip time delay waiting for
connection setup; a host can send data as soon as it is
ready.
• Header: Since every packet must carry the full
address of the destination, the overhead per packet is
higher than for the connection-oriented model.
• Quality of Service (QoS):
– Source host has no way of knowing if the network is
capable of delivering a packet or if the destination host is
even up.
– Since packets are treated independently, it is possible to
route around link and node failures.
– Successive packets may follow different paths and be
received out of order.
Outline
• Packet switching paradigms
• Bridges and extended LANs
• Cell switching
• Switching hardware
Bridges and Extended LANs
• LANs have physical limitations (e.g., 2500m)
• Connect two or more LANs with a bridge
– accept and forward strategy
– level 2 connection (does not add packet header)
• Ethernet Switch is a LAN Switch = Bridge
A
Bridge
B C
X Y Z
Port 1
Port 2
Learning Bridges
• Do not forward when unnecessary
• Maintain forwarding table
Host
Port
A 1
B 1
C 1
X 2
Y 2
Z 2
• Learn table entries based on source address
• Table is an optimization; need not be
complete
• Always forward broadcast frames
A
Bridge
B C
X Y Z
Port 1
Port 2
Spanning Tree Algorithm
• Problem: loops
• Bridges run a distributed spanning tree algorithm
– select which bridges actively forward
– developed by Radia Perlman
– now IEEE 802.1 specification
B3
A
C
E
D
B2
B5
B
B7 K
F
H
B4
J
B1
B6
G
I
Algorithm Overview
• Each bridge has unique id (e.g., B1, B2, B3)
• Select bridge with smallest id as root
• Select bridge on each LAN closest to root as
designated bridge (use id to break ties)
B3
A
C
E
D
B2
B5
B
B7 K
F
H
B4
J
B1
B6
G
I
• Each bridge forwards
frames over each LAN
for which it is the
designated bridge
Algorithm Details
• Bridges exchange configuration messages
– id for bridge sending the message
– id for what the sending bridge believes to be root bridge
– distance (hops) from sending bridge to root bridge
• Each bridge records current best configuration
message for each port
• Initially, each bridge believes it is the root
Algorithm Detail (cont)
• When learn not root, stop generating config
messages
– in steady state, only root generates configuration
messages
• When learn not designated bridge, stop forwarding
config messages
– in steady state, only designated bridges forward config
messages
• Root continues to periodically send config
messages
• If any bridge does not receive config message after
a period of time, it starts generating config
messages claiming to be the root
Broadcast and Multicast
• Forward all broadcast/multicast frames
– current practice
• Learn when no group members downstream
• Accomplished by having each member of
group G send a frame to bridge multicast
address with G in source field
Limitations of Bridges
• Do not scale
– spanning tree algorithm does not scale
– broadcast does not scale
• Do not accommodate heterogeneity
• Caution: beware of transparency
– Bridged LANs do not always behave as single
shared medium LAN: they drop packets when
congested, higher latency
Virtual LANs (VLAN)
• VLANs are used to:
– increase scalability: reduce broadcast messages
– provide some basic security by separating LANs
• VLANs have an ID (color).
• Bridges insert the VLAN ID between the ethernet
header and its payload
• Packets (unicast and multicast) are only forwarded
to VLAN with the same ID as the source VLAN

More Related Content

Similar to Packet Switching Technique in Computer Network (20)

Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
Roshan Karunarathna
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
Zuhaib Zaroon
 
Switching
SwitchingSwitching
Switching
Shankar Gangaju
 
Chap 03
Chap 03Chap 03
Chap 03
Shraddha Patel
 
Chap 03
Chap 03Chap 03
Chap 03
Shraddha Patel
 
Switching and routing for the networks in computing
Switching and routing for the networks in computingSwitching and routing for the networks in computing
Switching and routing for the networks in computing
newtonaseri
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
VimalMallick
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
DivyanshThakur7
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
VijayKaran7
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
Patrick Theuri
 
Switch networking
Switch networking Switch networking
Switch networking
MohikaJamadari
 
Unit 5 Switching.pdf
Unit 5                     Switching.pdfUnit 5                     Switching.pdf
Unit 5 Switching.pdf
lakshman110405
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
cisco49
 
Manet
ManetManet
Manet
Srinivas Shivchran
 
Manet
ManetManet
Manet
Solomon Degef
 
Lan overview
Lan overviewLan overview
Lan overview
Shyam Gupta
 
Chapter 2 Switches in network.ppt
Chapter 2 Switches in network.pptChapter 2 Switches in network.ppt
Chapter 2 Switches in network.ppt
monikarawat57
 
Network devices
Network devicesNetwork devices
Network devices
Gopal Krishna
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
Roshan Karunarathna
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
Zuhaib Zaroon
 
Switching and routing for the networks in computing
Switching and routing for the networks in computingSwitching and routing for the networks in computing
Switching and routing for the networks in computing
newtonaseri
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
VimalMallick
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
DivyanshThakur7
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
VijayKaran7
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
Patrick Theuri
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
cisco49
 
Chapter 2 Switches in network.ppt
Chapter 2 Switches in network.pptChapter 2 Switches in network.ppt
Chapter 2 Switches in network.ppt
monikarawat57
 

More from NiharikaDubey17 (20)

Information Security and Privacy-Unit-2.pptx
Information Security and Privacy-Unit-2.pptxInformation Security and Privacy-Unit-2.pptx
Information Security and Privacy-Unit-2.pptx
NiharikaDubey17
 
Information Security and Privacy-Unit-1.pptx
Information Security and Privacy-Unit-1.pptxInformation Security and Privacy-Unit-1.pptx
Information Security and Privacy-Unit-1.pptx
NiharikaDubey17
 
Digital Image Processing--Unit-3 - L2.pptx
Digital Image Processing--Unit-3 - L2.pptxDigital Image Processing--Unit-3 - L2.pptx
Digital Image Processing--Unit-3 - L2.pptx
NiharikaDubey17
 
Digital Image Processing -Unit-3 - L1.pptx
Digital Image Processing -Unit-3 - L1.pptxDigital Image Processing -Unit-3 - L1.pptx
Digital Image Processing -Unit-3 - L1.pptx
NiharikaDubey17
 
tableau-finalpresentation-161211155749.pptx
tableau-finalpresentation-161211155749.pptxtableau-finalpresentation-161211155749.pptx
tableau-finalpresentation-161211155749.pptx
NiharikaDubey17
 
9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt
9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt
9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt
NiharikaDubey17
 
Creating-Interactive-Dashboards-and-Reports-in-Tableau.pptx
Creating-Interactive-Dashboards-and-Reports-in-Tableau.pptxCreating-Interactive-Dashboards-and-Reports-in-Tableau.pptx
Creating-Interactive-Dashboards-and-Reports-in-Tableau.pptx
NiharikaDubey17
 
Knowledge Management with data warehouse-Unit-1-L5.pptx
Knowledge Management with data warehouse-Unit-1-L5.pptxKnowledge Management with data warehouse-Unit-1-L5.pptx
Knowledge Management with data warehouse-Unit-1-L5.pptx
NiharikaDubey17
 
Knowledge Management with data mining detail-Unit-1-L6.pptx
Knowledge Management with data mining detail-Unit-1-L6.pptxKnowledge Management with data mining detail-Unit-1-L6.pptx
Knowledge Management with data mining detail-Unit-1-L6.pptx
NiharikaDubey17
 
intro on impact of Artificial Intelligence.ppt
intro on impact of Artificial Intelligence.pptintro on impact of Artificial Intelligence.ppt
intro on impact of Artificial Intelligence.ppt
NiharikaDubey17
 
chapter_1 C++ Programming introduction.ppt
chapter_1 C++ Programming introduction.pptchapter_1 C++ Programming introduction.ppt
chapter_1 C++ Programming introduction.ppt
NiharikaDubey17
 
Constraint_Satisfaction problem based_slides.ppt
Constraint_Satisfaction problem based_slides.pptConstraint_Satisfaction problem based_slides.ppt
Constraint_Satisfaction problem based_slides.ppt
NiharikaDubey17
 
18364_Conceptual dependency-scripts based content.ppt
18364_Conceptual dependency-scripts based content.ppt18364_Conceptual dependency-scripts based content.ppt
18364_Conceptual dependency-scripts based content.ppt
NiharikaDubey17
 
Business Intelligence And Business Decisions:.pptx
Business Intelligence And Business Decisions:.pptxBusiness Intelligence And Business Decisions:.pptx
Business Intelligence And Business Decisions:.pptx
NiharikaDubey17
 
Decision based support system modelling.ppt
Decision based support system modelling.pptDecision based support system modelling.ppt
Decision based support system modelling.ppt
NiharikaDubey17
 
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptAndrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
NiharikaDubey17
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
researchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptxresearchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptx
NiharikaDubey17
 
Circuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods PresentationCircuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods Presentation
NiharikaDubey17
 
ImageProcessing1-Introduction.ppt
ImageProcessing1-Introduction.pptImageProcessing1-Introduction.ppt
ImageProcessing1-Introduction.ppt
NiharikaDubey17
 
Information Security and Privacy-Unit-2.pptx
Information Security and Privacy-Unit-2.pptxInformation Security and Privacy-Unit-2.pptx
Information Security and Privacy-Unit-2.pptx
NiharikaDubey17
 
Information Security and Privacy-Unit-1.pptx
Information Security and Privacy-Unit-1.pptxInformation Security and Privacy-Unit-1.pptx
Information Security and Privacy-Unit-1.pptx
NiharikaDubey17
 
Digital Image Processing--Unit-3 - L2.pptx
Digital Image Processing--Unit-3 - L2.pptxDigital Image Processing--Unit-3 - L2.pptx
Digital Image Processing--Unit-3 - L2.pptx
NiharikaDubey17
 
Digital Image Processing -Unit-3 - L1.pptx
Digital Image Processing -Unit-3 - L1.pptxDigital Image Processing -Unit-3 - L1.pptx
Digital Image Processing -Unit-3 - L1.pptx
NiharikaDubey17
 
tableau-finalpresentation-161211155749.pptx
tableau-finalpresentation-161211155749.pptxtableau-finalpresentation-161211155749.pptx
tableau-finalpresentation-161211155749.pptx
NiharikaDubey17
 
9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt
9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt
9613_2. Dr.U.Syed-Aktharsha-23MBA3DEG5-Introduction-to-Power-BI.ppt
NiharikaDubey17
 
Creating-Interactive-Dashboards-and-Reports-in-Tableau.pptx
Creating-Interactive-Dashboards-and-Reports-in-Tableau.pptxCreating-Interactive-Dashboards-and-Reports-in-Tableau.pptx
Creating-Interactive-Dashboards-and-Reports-in-Tableau.pptx
NiharikaDubey17
 
Knowledge Management with data warehouse-Unit-1-L5.pptx
Knowledge Management with data warehouse-Unit-1-L5.pptxKnowledge Management with data warehouse-Unit-1-L5.pptx
Knowledge Management with data warehouse-Unit-1-L5.pptx
NiharikaDubey17
 
Knowledge Management with data mining detail-Unit-1-L6.pptx
Knowledge Management with data mining detail-Unit-1-L6.pptxKnowledge Management with data mining detail-Unit-1-L6.pptx
Knowledge Management with data mining detail-Unit-1-L6.pptx
NiharikaDubey17
 
intro on impact of Artificial Intelligence.ppt
intro on impact of Artificial Intelligence.pptintro on impact of Artificial Intelligence.ppt
intro on impact of Artificial Intelligence.ppt
NiharikaDubey17
 
chapter_1 C++ Programming introduction.ppt
chapter_1 C++ Programming introduction.pptchapter_1 C++ Programming introduction.ppt
chapter_1 C++ Programming introduction.ppt
NiharikaDubey17
 
Constraint_Satisfaction problem based_slides.ppt
Constraint_Satisfaction problem based_slides.pptConstraint_Satisfaction problem based_slides.ppt
Constraint_Satisfaction problem based_slides.ppt
NiharikaDubey17
 
18364_Conceptual dependency-scripts based content.ppt
18364_Conceptual dependency-scripts based content.ppt18364_Conceptual dependency-scripts based content.ppt
18364_Conceptual dependency-scripts based content.ppt
NiharikaDubey17
 
Business Intelligence And Business Decisions:.pptx
Business Intelligence And Business Decisions:.pptxBusiness Intelligence And Business Decisions:.pptx
Business Intelligence And Business Decisions:.pptx
NiharikaDubey17
 
Decision based support system modelling.ppt
Decision based support system modelling.pptDecision based support system modelling.ppt
Decision based support system modelling.ppt
NiharikaDubey17
 
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptAndrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
NiharikaDubey17
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
researchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptxresearchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptx
NiharikaDubey17
 
Circuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods PresentationCircuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods Presentation
NiharikaDubey17
 
ImageProcessing1-Introduction.ppt
ImageProcessing1-Introduction.pptImageProcessing1-Introduction.ppt
ImageProcessing1-Introduction.ppt
NiharikaDubey17
 
Ad

Recently uploaded (20)

社内勉強会資料_Chain of Thought .
社内勉強会資料_Chain of Thought                           .社内勉強会資料_Chain of Thought                           .
社内勉強会資料_Chain of Thought .
NABLAS株式会社
 
Third Review PPT that consists of the project d etails like abstract.
Third Review PPT that consists of the project d etails like abstract.Third Review PPT that consists of the project d etails like abstract.
Third Review PPT that consists of the project d etails like abstract.
Sowndarya6
 
02 - Ethics & Professionalism - BEM, IEM, MySET.PPT
02 - Ethics & Professionalism - BEM, IEM, MySET.PPT02 - Ethics & Professionalism - BEM, IEM, MySET.PPT
02 - Ethics & Professionalism - BEM, IEM, MySET.PPT
SharinAbGhani1
 
fHUINhKG5lM1WBBk608.pptxfhjjhhjffhiuhhghj
fHUINhKG5lM1WBBk608.pptxfhjjhhjffhiuhhghjfHUINhKG5lM1WBBk608.pptxfhjjhhjffhiuhhghj
fHUINhKG5lM1WBBk608.pptxfhjjhhjffhiuhhghj
yadavshivank2006
 
Introduction to AI agent development with MCP
Introduction to AI agent development with MCPIntroduction to AI agent development with MCP
Introduction to AI agent development with MCP
Dori Waldman
 
Tree_Traversals.pptbbbbbbbbbbbbbbbbbbbbbbbbb
Tree_Traversals.pptbbbbbbbbbbbbbbbbbbbbbbbbbTree_Traversals.pptbbbbbbbbbbbbbbbbbbbbbbbbb
Tree_Traversals.pptbbbbbbbbbbbbbbbbbbbbbbbbb
RATNANITINPATIL
 
Pavement and its types, Application of rigid and Flexible Pavements
Pavement and its types, Application of rigid and Flexible PavementsPavement and its types, Application of rigid and Flexible Pavements
Pavement and its types, Application of rigid and Flexible Pavements
Sakthivel M
 
How Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdfHow Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdf
Mina Anis
 
Artificial Power 2025 raport krajobrazowy
Artificial Power 2025 raport krajobrazowyArtificial Power 2025 raport krajobrazowy
Artificial Power 2025 raport krajobrazowy
dominikamizerska1
 
operationg systemsdocumentmemorymanagement
operationg systemsdocumentmemorymanagementoperationg systemsdocumentmemorymanagement
operationg systemsdocumentmemorymanagement
SNIGDHAAPPANABHOTLA
 
chemistry investigatory project for class 12
chemistry investigatory project for class 12chemistry investigatory project for class 12
chemistry investigatory project for class 12
Susis10
 
Strength of materials (Thermal stress and strain relationships)
Strength of materials (Thermal stress and strain relationships)Strength of materials (Thermal stress and strain relationships)
Strength of materials (Thermal stress and strain relationships)
pelumiadigun2006
 
May 2025: Top 10 Read Articles Advanced Information Technology
May 2025: Top 10 Read Articles Advanced Information TechnologyMay 2025: Top 10 Read Articles Advanced Information Technology
May 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
The first edition of the AIAG-VDA FMEA.pptx
The first edition of the AIAG-VDA FMEA.pptxThe first edition of the AIAG-VDA FMEA.pptx
The first edition of the AIAG-VDA FMEA.pptx
Mayank Mathur
 
Rigor, ethics, wellbeing and resilience in the ICT doctoral journey
Rigor, ethics, wellbeing and resilience in the ICT doctoral journeyRigor, ethics, wellbeing and resilience in the ICT doctoral journey
Rigor, ethics, wellbeing and resilience in the ICT doctoral journey
Yannis
 
Universal Human Values and professional ethics Quantum AKTU BVE401
Universal Human Values and professional ethics Quantum AKTU BVE401Universal Human Values and professional ethics Quantum AKTU BVE401
Universal Human Values and professional ethics Quantum AKTU BVE401
Unknown
 
Montreal Dreamin' 25 - Introduction to the MuleSoft AI Chain (MAC) Project
Montreal Dreamin' 25 - Introduction to the MuleSoft AI Chain (MAC) ProjectMontreal Dreamin' 25 - Introduction to the MuleSoft AI Chain (MAC) Project
Montreal Dreamin' 25 - Introduction to the MuleSoft AI Chain (MAC) Project
Alexandra N. Martinez
 
FINAL 2013 Module 20 Corrosion Control and Sequestering PPT Slides.pptx
FINAL 2013 Module 20 Corrosion Control and Sequestering PPT Slides.pptxFINAL 2013 Module 20 Corrosion Control and Sequestering PPT Slides.pptx
FINAL 2013 Module 20 Corrosion Control and Sequestering PPT Slides.pptx
kippcam
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-ABB Furse.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-ABB Furse.pdf362 Alec Data Center Solutions-Slysium Data Center-AUH-ABB Furse.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-ABB Furse.pdf
djiceramil
 
22PCOAM16 _ML_Unit 3 Notes & Question bank
22PCOAM16 _ML_Unit 3 Notes & Question bank22PCOAM16 _ML_Unit 3 Notes & Question bank
22PCOAM16 _ML_Unit 3 Notes & Question bank
Guru Nanak Technical Institutions
 
社内勉強会資料_Chain of Thought .
社内勉強会資料_Chain of Thought                           .社内勉強会資料_Chain of Thought                           .
社内勉強会資料_Chain of Thought .
NABLAS株式会社
 
Third Review PPT that consists of the project d etails like abstract.
Third Review PPT that consists of the project d etails like abstract.Third Review PPT that consists of the project d etails like abstract.
Third Review PPT that consists of the project d etails like abstract.
Sowndarya6
 
02 - Ethics & Professionalism - BEM, IEM, MySET.PPT
02 - Ethics & Professionalism - BEM, IEM, MySET.PPT02 - Ethics & Professionalism - BEM, IEM, MySET.PPT
02 - Ethics & Professionalism - BEM, IEM, MySET.PPT
SharinAbGhani1
 
fHUINhKG5lM1WBBk608.pptxfhjjhhjffhiuhhghj
fHUINhKG5lM1WBBk608.pptxfhjjhhjffhiuhhghjfHUINhKG5lM1WBBk608.pptxfhjjhhjffhiuhhghj
fHUINhKG5lM1WBBk608.pptxfhjjhhjffhiuhhghj
yadavshivank2006
 
Introduction to AI agent development with MCP
Introduction to AI agent development with MCPIntroduction to AI agent development with MCP
Introduction to AI agent development with MCP
Dori Waldman
 
Tree_Traversals.pptbbbbbbbbbbbbbbbbbbbbbbbbb
Tree_Traversals.pptbbbbbbbbbbbbbbbbbbbbbbbbbTree_Traversals.pptbbbbbbbbbbbbbbbbbbbbbbbbb
Tree_Traversals.pptbbbbbbbbbbbbbbbbbbbbbbbbb
RATNANITINPATIL
 
Pavement and its types, Application of rigid and Flexible Pavements
Pavement and its types, Application of rigid and Flexible PavementsPavement and its types, Application of rigid and Flexible Pavements
Pavement and its types, Application of rigid and Flexible Pavements
Sakthivel M
 
How Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdfHow Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdf
Mina Anis
 
Artificial Power 2025 raport krajobrazowy
Artificial Power 2025 raport krajobrazowyArtificial Power 2025 raport krajobrazowy
Artificial Power 2025 raport krajobrazowy
dominikamizerska1
 
operationg systemsdocumentmemorymanagement
operationg systemsdocumentmemorymanagementoperationg systemsdocumentmemorymanagement
operationg systemsdocumentmemorymanagement
SNIGDHAAPPANABHOTLA
 
chemistry investigatory project for class 12
chemistry investigatory project for class 12chemistry investigatory project for class 12
chemistry investigatory project for class 12
Susis10
 
Strength of materials (Thermal stress and strain relationships)
Strength of materials (Thermal stress and strain relationships)Strength of materials (Thermal stress and strain relationships)
Strength of materials (Thermal stress and strain relationships)
pelumiadigun2006
 
May 2025: Top 10 Read Articles Advanced Information Technology
May 2025: Top 10 Read Articles Advanced Information TechnologyMay 2025: Top 10 Read Articles Advanced Information Technology
May 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
The first edition of the AIAG-VDA FMEA.pptx
The first edition of the AIAG-VDA FMEA.pptxThe first edition of the AIAG-VDA FMEA.pptx
The first edition of the AIAG-VDA FMEA.pptx
Mayank Mathur
 
Rigor, ethics, wellbeing and resilience in the ICT doctoral journey
Rigor, ethics, wellbeing and resilience in the ICT doctoral journeyRigor, ethics, wellbeing and resilience in the ICT doctoral journey
Rigor, ethics, wellbeing and resilience in the ICT doctoral journey
Yannis
 
Universal Human Values and professional ethics Quantum AKTU BVE401
Universal Human Values and professional ethics Quantum AKTU BVE401Universal Human Values and professional ethics Quantum AKTU BVE401
Universal Human Values and professional ethics Quantum AKTU BVE401
Unknown
 
Montreal Dreamin' 25 - Introduction to the MuleSoft AI Chain (MAC) Project
Montreal Dreamin' 25 - Introduction to the MuleSoft AI Chain (MAC) ProjectMontreal Dreamin' 25 - Introduction to the MuleSoft AI Chain (MAC) Project
Montreal Dreamin' 25 - Introduction to the MuleSoft AI Chain (MAC) Project
Alexandra N. Martinez
 
FINAL 2013 Module 20 Corrosion Control and Sequestering PPT Slides.pptx
FINAL 2013 Module 20 Corrosion Control and Sequestering PPT Slides.pptxFINAL 2013 Module 20 Corrosion Control and Sequestering PPT Slides.pptx
FINAL 2013 Module 20 Corrosion Control and Sequestering PPT Slides.pptx
kippcam
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-ABB Furse.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-ABB Furse.pdf362 Alec Data Center Solutions-Slysium Data Center-AUH-ABB Furse.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-ABB Furse.pdf
djiceramil
 
Ad

Packet Switching Technique in Computer Network

  • 1. Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
  • 2. Outline • Packet switching paradigms • Bridges and extended LANs • Cell switching • Switching hardware
  • 3. Scalable Networks • Switch – forwards packets from input port to output port – port selected based on address in packet header • Advantages – cover large geographic area (tolerate latency) – support large numbers of hosts (scalable bandwidth) Input ports T3 T3 STS-1 T3 T3 STS-1 Switch Output ports
  • 4. Packet Switching Paradigms • Virtual circuit switching (routing) • Datagram switching (routing) • Source routing
  • 5. Source Routing • The information to route the packet is provided by the source host and included in the packet • Example of implementing source routing: – Assign a number to each switch output port – Include the list of output ports that the packet has to go through – The list is rotated by the intermediate switches before forwarding • Disadvantage: – Packet initiators need to have a sufficient information about the network topology – The header has a variable length
  • 6. Source Routing 0 1 3 2 0 1 3 2 0 1 3 2 0 1 3 2 3 0 1 3 0 1 3 0 1 Sw itch 3 Host B Sw itch 2 Host A Sw itch 1
  • 7. Virtual Circuit (VC) Switching • Explicit connection setup (and tear-down) phase • Subsequent packets follow same circuit (path) • Sometimes called connection-oriented model 0 1 3 2 0 1 3 2 0 1 3 2 5 11 4 7 Switch 3 Host B Switch 2 Host A Switch 1 • Analogy: phone call • Each switch maintains a VC table
  • 8. Virtual Circuit Switching • Connection Setup approaches: – Permanent Virtual Circuits (PVC): manually setup/removed by network administrators – Switched Virtual Circuits (SVC): dynamically setup through signaling over some control channels • Connection state => VC table – incoming interface, VC Identifier (VCI), outgoing interface, outgoing VCI • SVC: – The setup message is forwarded over the network – New entries are created in the VC table and destination switches choose incoming VCI – When the setup message reaches the destination, connection
  • 9. Virtual Circuits • Examples of Virtual Circuit Technology: – Frame Relay, X.25, Asynchronous Transfer Mode (ATM) • Frame Relay was popular for creating virtual private networks (VPNs) using PVC. • ATM is a more complex technology that provides mechanisms for supporting quality of service
  • 10. Datagram Switching • No connection setup phase • Each packet forwarded independently • Sometimes called connectionless model 0 1 3 2 0 1 3 2 0 1 3 2 Switch 3 Switch 2 Host A Switch 1 Host C Host D Host E Host G Host H • Analogy: postal system • Each switch maintains a forwarding (routing) table Switch 4
  • 11. Virtual Circuit Model • Setup: Typically wait full RTT for connection setup before sending first data packet. • Header: While the connection request contains the full destination address, each data packet contains only a small identifier, making the per- packet header overhead small. • Quality of Service (QoS): – Connection setup allows resource reservation – If a switch or a link in a connection fails, the connection is broken and a new one needs to be established.
  • 12. Datagram Model • Setup: There is no round trip time delay waiting for connection setup; a host can send data as soon as it is ready. • Header: Since every packet must carry the full address of the destination, the overhead per packet is higher than for the connection-oriented model. • Quality of Service (QoS): – Source host has no way of knowing if the network is capable of delivering a packet or if the destination host is even up. – Since packets are treated independently, it is possible to route around link and node failures. – Successive packets may follow different paths and be received out of order.
  • 13. Outline • Packet switching paradigms • Bridges and extended LANs • Cell switching • Switching hardware
  • 14. Bridges and Extended LANs • LANs have physical limitations (e.g., 2500m) • Connect two or more LANs with a bridge – accept and forward strategy – level 2 connection (does not add packet header) • Ethernet Switch is a LAN Switch = Bridge A Bridge B C X Y Z Port 1 Port 2
  • 15. Learning Bridges • Do not forward when unnecessary • Maintain forwarding table Host Port A 1 B 1 C 1 X 2 Y 2 Z 2 • Learn table entries based on source address • Table is an optimization; need not be complete • Always forward broadcast frames A Bridge B C X Y Z Port 1 Port 2
  • 16. Spanning Tree Algorithm • Problem: loops • Bridges run a distributed spanning tree algorithm – select which bridges actively forward – developed by Radia Perlman – now IEEE 802.1 specification B3 A C E D B2 B5 B B7 K F H B4 J B1 B6 G I
  • 17. Algorithm Overview • Each bridge has unique id (e.g., B1, B2, B3) • Select bridge with smallest id as root • Select bridge on each LAN closest to root as designated bridge (use id to break ties) B3 A C E D B2 B5 B B7 K F H B4 J B1 B6 G I • Each bridge forwards frames over each LAN for which it is the designated bridge
  • 18. Algorithm Details • Bridges exchange configuration messages – id for bridge sending the message – id for what the sending bridge believes to be root bridge – distance (hops) from sending bridge to root bridge • Each bridge records current best configuration message for each port • Initially, each bridge believes it is the root
  • 19. Algorithm Detail (cont) • When learn not root, stop generating config messages – in steady state, only root generates configuration messages • When learn not designated bridge, stop forwarding config messages – in steady state, only designated bridges forward config messages • Root continues to periodically send config messages • If any bridge does not receive config message after a period of time, it starts generating config messages claiming to be the root
  • 20. Broadcast and Multicast • Forward all broadcast/multicast frames – current practice • Learn when no group members downstream • Accomplished by having each member of group G send a frame to bridge multicast address with G in source field
  • 21. Limitations of Bridges • Do not scale – spanning tree algorithm does not scale – broadcast does not scale • Do not accommodate heterogeneity • Caution: beware of transparency – Bridged LANs do not always behave as single shared medium LAN: they drop packets when congested, higher latency
  • 22. Virtual LANs (VLAN) • VLANs are used to: – increase scalability: reduce broadcast messages – provide some basic security by separating LANs • VLANs have an ID (color). • Bridges insert the VLAN ID between the ethernet header and its payload • Packets (unicast and multicast) are only forwarded to VLAN with the same ID as the source VLAN