Date post: | 30-Dec-2015 |
Category: |
Documents |
Upload: | egbert-fowler |
View: | 225 times |
Download: | 2 times |
1
Lecture #16: Network Layer Lecture #16: Network Layer and Internetworkingand Internetworking
C o n t e n t s C o n t e n t s
Network Layer: functions and servicesNetwork Layer: functions and services
Network Layer: technologiesNetwork Layer: technologies
InternetworkingInternetworking
Concatenated Virtual CircuitsConcatenated Virtual Circuits
Connectionless internetworkingConnectionless internetworking
FragmentationFragmentation
Firewall technologyFirewall technology
6
2
7
10
19
15
12
2
OSI Network LayerOSI Network LayerUser application 1 ...
Encryption/decryption
compression/expansion
Choice of syntax
Sessioncontrol
Session to transportmapping
Session management
Sessionsynch.
Layer and flowcontrol
Error recovery
Multiplexing
Connection control
Routing Addressing
Errorcontrol
Flowcontrol
Data link establishment
Synch Framing
Access to transm. media
Physical and electrical interface
Activation/ deactivation of con.
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Link layer
Physical layer
Connection controlConnection control: establishment, maintaining and terminating : establishment, maintaining and terminating network connectionsnetwork connections between source and destination open systems between source and destination open systems
RoutingRouting: considerations associated with : considerations associated with hop-by-hop serviceshop-by-hop services transparent to the underlying resources such as data link connections .transparent to the underlying resources such as data link connections .
AddressingAddressing: : globally unique identificationglobally unique identification of a service access point of of a service access point of an end system (transparent to subnet technology (routers/LANs…) and an end system (transparent to subnet technology (routers/LANs…) and topology (# of hops) including namingtopology (# of hops) including naming
1/18
3
NL Services to the Transport NL Services to the Transport LayerLayer
The basic service of the network layer is to provide the The basic service of the network layer is to provide the transparent transfer of data between transport transparent transfer of data between transport entitiesentities. This service allows the structure and detailed . This service allows the structure and detailed content of submitted data to be determined exclusively content of submitted data to be determined exclusively by layers above the network layer.by layers above the network layer.
The network layer contains functions necessary to The network layer contains functions necessary to provide the transport layer with a firm provide the transport layer with a firm network/transport layer boundary which is independent network/transport layer boundary which is independent of the underlying communications media in all things of the underlying communications media in all things other than quality of service. other than quality of service.
Thus the network layer contains functions necessary to Thus the network layer contains functions necessary to mask the differences in the characteristics of different mask the differences in the characteristics of different transmission and subnetwork technologies into a transmission and subnetwork technologies into a consistent network service.consistent network service.
4
Services provided to the Services provided to the transport layertransport layer
Transparent transfer of data between transport Transparent transfer of data between transport entities. This service allows the structure and entities. This service allows the structure and detailed content of submitted data to be detailed content of submitted data to be determined exclusively by layers above the determined exclusively by layers above the network layer.network layer.
Firm network/transport layer boundary which is Firm network/transport layer boundary which is independent of the underlying communications independent of the underlying communications media in all things other than quality of service. media in all things other than quality of service.
Mask the differences in the characteristics of Mask the differences in the characteristics of different transmission and subnetwork different transmission and subnetwork technologies into a consistent network service.technologies into a consistent network service.
5
Network Layer Service Network Layer Service TypesTypes Connection oriented - Connection oriented - virtual circuitvirtual circuit (VC) (VC) - -
supported by the lower network layers (DLL):supported by the lower network layers (DLL):– setup and release of the connectionsetup and release of the connection– connection parameters negotiationconnection parameters negotiation– sequenced delivery of packetssequenced delivery of packets– receiver’s overflow prevented by flow controlreceiver’s overflow prevented by flow control– options:options:
• priority of deliverypriority of delivery• confirmation of deliveryconfirmation of delivery
– reliablereliable– unreliable (rare usage)unreliable (rare usage)
– ExamplesExamples: most popular : most popular X.25X.25 Connectionless oriented - Connectionless oriented - datagrams exchangedatagrams exchange - -
reliability issues (if present) supported by the reliability issues (if present) supported by the transport layer transport layer – send/receive directives (confirmed/nonconfirmed send/receive directives (confirmed/nonconfirmed
services)services)– independent packets’ (“datagrams”) delivery with full independent packets’ (“datagrams”) delivery with full
destination addressdestination address– ExamplesExamples: most popular : most popular IPIP (required when using TCP/IP) (required when using TCP/IP)
16/1
16/2
6
Network Layer TechnologiesNetwork Layer Technologies Datagram ExchangeDatagram Exchange
– AddressingAddressing: full source and destination address in each : full source and destination address in each datagramdatagram
– State informationState information: not needed nor hold: not needed nor hold– RoutingRouting: independent routing of the subsequent packets: independent routing of the subsequent packets– Node Failure effectsNode Failure effects: packets loss: packets loss– Congestion controlCongestion control: not typical, rarely applied: not typical, rarely applied– ComplexityComplexity: in transport layer (above the subnet!): in transport layer (above the subnet!)– ApplicationApplication: connectionless services but also connection : connectionless services but also connection
oriented oriented Virtual CircuitVirtual Circuit
– AddressingAddressing: short VC number in each packet: short VC number in each packet– State informationState information: kept in the subnet table for each VC: kept in the subnet table for each VC– RoutingRouting: only during the VC setup: only during the VC setup– Node Failure effectsNode Failure effects: VCs termination: VCs termination– Congestion controlCongestion control: consists of and depends on buffering: consists of and depends on buffering– ComplexityComplexity: in the network layer (in the subnet!): in the network layer (in the subnet!)– ApplicationApplication: connection oriented services: connection oriented services
5/2
7
5/34
Internetworking - TermsInternetworking - Terms InternetworkingInternetworking - multinet structure including different - multinet structure including different
types of networks and protocolstypes of networks and protocols
Internetworking glossaryInternetworking glossary::– Communication networkCommunication network: a facility providing data transfer service : a facility providing data transfer service
among stations attached to the networkamong stations attached to the network– InternetInternet: a collection of communication networks connected by : a collection of communication networks connected by
bridges and/or routersbridges and/or routers– SubnetworkSubnetwork: a constituent network of an internet: a constituent network of an internet– Intermediate systemIntermediate system ( (ISIS): a connection device between any two ): a connection device between any two
subnetworkssubnetworks– RepeaterRepeater: IS that connect two identical subnetworks on the physical : IS that connect two identical subnetworks on the physical
level, repeats the bit sequence without storing of any data.level, repeats the bit sequence without storing of any data.– BridgeBridge: IS that connects two LANs with identical protocols. Bridges : IS that connects two LANs with identical protocols. Bridges
are address filters that use store-and-forward mechanism without are address filters that use store-and-forward mechanism without modifying the packets’ contents. It operates on DLL levelmodifying the packets’ contents. It operates on DLL level
– RouterRouter: IS that connects two networks with potentially different : IS that connects two networks with potentially different protocols (“multiprotocol router”); store-and-forward address filter protocols (“multiprotocol router”); store-and-forward address filter operating on the Network Layeroperating on the Network Layer
– GatewayGateway: internetworking protocol converters acting on the : internetworking protocol converters acting on the Transport and Application layers. Modifications: full and half gateways Transport and Application layers. Modifications: full and half gateways
5/33
8
Protocol stackProtocol stack: : OSI/IP/Novel/DECnet/AppleTalk/...OSI/IP/Novel/DECnet/AppleTalk/... Addressing schemeAddressing scheme: : flat files (802.X) vs. hierarchical (IP), flat files (802.X) vs. hierarchical (IP),
implementation of directory servicesimplementation of directory services
Service types incl. QoSService types incl. QoS: : connectivity, confirmed/ connectivity, confirmed/ /nonconfirmed services, special features support (e.g.real /nonconfirmed services, special features support (e.g.real time) time)
Parameters:Parameters: system of timeouts, buffer sizes etc.system of timeouts, buffer sizes etc. Flow/error controlFlow/error control: : level of ordering and error level of ordering and error
protectionprotection SecuritySecurity: : levels of privacy, encryption, identification etc.levels of privacy, encryption, identification etc. Routing and congestion controlRouting and congestion control: : different different
mechanismsmechanisms Broadcasting and multicastingBroadcasting and multicasting: : yes/noyes/no
Packet sizePacket size: : maximum size varies substantiallymaximum size varies substantially Accounting rulesAccounting rules: : yes/no; by traffic/timeyes/no; by traffic/time
Networks Networks CharacteristicsCharacteristics
9
5/35
9
AddressingAddressingUniqueness: Addressing allows the DTE to be uniquely identified so that data may be routed globally to the correct destination.Levels of addressing
Network Level (and above) SAP: Uniquely identifies the DTE within the internetDTE may have more than one SAP, each of them is unique to that
particular DTEGlobal Internet Address (GNA) = (network, host or station)
parametersForm: (network identifier, end system identifier)
Subnet Level A unique address for each DTE attached to the subnetReferred to as the Subnetwork Attachment Point Address (SAPA)Host parameter of GNA and SAPA may be the same but are often
notDifferent networks use different addressing formats and lengths (ARP,
RARP)Some host have more than one attachment point to the subnetHost parameter (GNA) has global significance, SAPA has local
significance
16/3
10
Concatenated Virtual Concatenated Virtual CircuitsCircuits
CVC is End-to-End connection that consists of several consecutive Point-to-Point links between:
source host and subnetsubnet and multiprotocol router (“full gateway”)[subnet and subnet, connected by shared “half-gateways”]) subnet and destination host
Features:the data routes are identified by VC numbersduring the session data packets traverse the same sequence
of GWs and arrive in order the routes are supported by VC tables containing
the ID number of the actual VCsthe next destination for each VCthe number of the next concatenated VC
Application: internetworking in set of subnets of similar type of services (e.g. either reliable or unreliable). Usually implemented on Transport layer (e.g. TCP - End-to-End transport protocol)
5/36
11
Pro’sPro’s• reservation of buffers and reservation of buffers and
communication capacity in communication capacity in
advanceadvance
• guaranteed sequencing, guaranteed sequencing,
delivery and stable delays delivery and stable delays
• possible implementation possible implementation
of any type services of any type services
• short addressing (small short addressing (small
communication overload communication overload
due to the headers)due to the headers)
• small communication small communication
overload due to packets overload due to packets
retransmission and lossesretransmission and losses
Contra’sContra’s
• waste of buffer space waste of buffer space
(table space) for each (table space) for each
open connectionopen connection
• static routing during the static routing during the
session i.e. bad session i.e. bad
congestion control congestion control
• vulnerability to router vulnerability to router
failures failures
• complicated complicated
implementation in implementation in
unreliable datagram unreliable datagram
subnetworkssubnetworks
Concatenated Virtual Concatenated Virtual CircuitsCircuits
12
Connectionless Connectionless InternetworkingInternetworking
Applies Datagram model
Features:
• independent routing for each packet thus
optimizing the the congestion
• not-in-order delivery
• datagram packets can be routed around network
failure points in d.g. subnetworks
• requires universal addressing system - Internet,
IPX, OSI, SNA, AppleTalk address standards
5/37
13
Pro’sPro’s
• adaptive dynamic routing adaptive dynamic routing
and adaptive congestion and adaptive congestion
controlcontrol
• low buffer space needed low buffer space needed
at routersat routers
• robustness to router robustness to router
failures failures
• applicable for any type of applicable for any type of
subnets incl. unreliable subnets incl. unreliable
onesones
Contra’sContra’s
• communication overhead communication overhead
due to longer address due to longer address
fields, repeated in each fields, repeated in each
datagramdatagram
• communication overhead communication overhead
due to unreliable due to unreliable
unordered servicesunordered services
• dispersed delay durationdispersed delay duration
• requires universal requires universal
addressing systemaddressing system
Connectionless Connectionless InternetworkingInternetworking
14
TunnelingTunneling• TunnelingTunneling is a technique for connection of two is a technique for connection of two
similar networks through the arbitrary type[s] of similar networks through the arbitrary type[s] of
intermediate network[s]intermediate network[s]
• Data entities (datagrams, packets) of two ends Data entities (datagrams, packets) of two ends
are packed together with their control information are packed together with their control information
(addressing, ordering, error control fields, etc.) (addressing, ordering, error control fields, etc.)
into the payload field of the intermediate network’ into the payload field of the intermediate network’
NL packetsNL packets
• The original control information is not being The original control information is not being
interpret anywhere in the intermediate network interpret anywhere in the intermediate network
but in both endsbut in both ends
• Therefore, tunneling needs multiprotocol routers Therefore, tunneling needs multiprotocol routers
only on the both ends of the “tunnel” where the only on the both ends of the “tunnel” where the
original data entities are constructed/restoredoriginal data entities are constructed/restored
5/38
15
FragmentationFragmentation• FragmentationFragmentation is the process of splitting of the is the process of splitting of the data structures into the entities that are suitable to data structures into the entities that are suitable to transmit over the various networks and the reverse transmit over the various networks and the reverse process of restoring the original structures out of the process of restoring the original structures out of the fragments.fragments.
• Fragmentation factors:Fragmentation factors:• Transmission method (bit error rate, multiplexing method, etc.) Transmission method (bit error rate, multiplexing method, etc.) • Operating system (read/write blocks of 0.5 kB)Operating system (read/write blocks of 0.5 kB)• Protocols (packet length field limitation)Protocols (packet length field limitation)• Standardization Standardization • Service discipline and resource sharing in the end stations and Service discipline and resource sharing in the end stations and
intermediate systems (IS): routers, gateways (e.g. SJF “shortest intermediate systems (IS): routers, gateways (e.g. SJF “shortest job first”, RR “Round Robin” etc.)job first”, RR “Round Robin” etc.)
• Examples of payload size:Examples of payload size:• ATM cell carries 48BATM cell carries 48B• IP packet carries 64kB IP packet carries 64kB
• Data packets are broken into fragments and Data packets are broken into fragments and
each fragment is sent in separate internet each fragment is sent in separate internet
packet.packet.
16
Fragmentation Fragmentation MethodsMethods•Each network in the internet is bounded by gateways
which are the entry point and the output point of the packets traversing that network
•1st approach: transparent fragmentation. Large packets are fragmented (if needed!) into fragments at the small-packet-network entry point (gateways G1, G3) and resembled back at the network output point (G2, G4). Note that all the fragments should reach the same network output point!
• Example: ATM networks hardware fragmentation/defragmentation of the packets into ATM cells at each entry/output point
• Requirements/features: • additional counting of the number of fragments in
connectionless networks or End-of-the-packet flag in the last fragment in the connection-oriented networks
• congestion control and performance are affected by the requirement for similar routing of all the fragments
• multiple fragmentation/defragmentation cycles may occur during an internet route of a long packet
5/41
a
17
Fragmentation Methods (2)Fragmentation Methods (2)•22ndnd approach: approach: nontransparent fragmentationnontransparent fragmentation. . Large packets are fragmented (if needed!) at the Large packets are fragmented (if needed!) at the small-packet-network entry point (gateway G1), then small-packet-network entry point (gateway G1), then traverse the internet as independent packets and are traverse the internet as independent packets and are resembled back only at the destination host. resembled back only at the destination host. •Requirements/features:Requirements/features:
• defragmentation capabilities of each hostdefragmentation capabilities of each host• communication overhead for each fragment during the communication overhead for each fragment during the
whole route whole route • better possibility for congestion control and dynamic better possibility for congestion control and dynamic
routing (in the datagram model)routing (in the datagram model)• only one fragmentation/defragmentation cycle (if any!) only one fragmentation/defragmentation cycle (if any!)
may occur during an internet route of a long packetmay occur during an internet route of a long packet• possibility for hierarchical fragmentation: fragmentation of possibility for hierarchical fragmentation: fragmentation of
already fragmented packets in case the route passes already fragmented packets in case the route passes network of even smaller packets: tree-numbering of the network of even smaller packets: tree-numbering of the fragments that can be extended hierarchically (e.g. fragments that can be extended hierarchically (e.g.
[0.] [0.] [0.0, 0.1, 0.2 ...] [0.0, 0.1, 0.2 ...] [0.0.0, 0.0.1, 0.0.2 … 0.1.0, 0.1.1 ...] [0.0.0, 0.0.1, 0.0.2 … 0.1.0, 0.1.1 ...] ......
18
5/41
b
18
Requirements/featuresRequirements/features (cont.): (cont.):
• fragmentation to some elementary frame size. fragmentation to some elementary frame size.
Fragments are short enough to be carried by any Fragments are short enough to be carried by any
intermediate network. An internet packet intermediate network. An internet packet
contains one or more elementary frames. contains one or more elementary frames.
Additional flagging:Additional flagging:
• packet ID numberpacket ID number
• ordering number of the first elementary fragment in the ordering number of the first elementary fragment in the
packetpacket
• end-of-the-packet flag (1 bit: end/no_end)end-of-the-packet flag (1 bit: end/no_end)
Fragmentation Methods Fragmentation Methods (3)(3)
5/42