Académique Documents
Professionnel Documents
Culture Documents
Part-2
Internetworking
Two or more networks are connected
to form an internet.
The purpose of interconnecting all
these networks is to allow users on
any of them to communicate with
users on all the other ones.
This means sending packets from
one network to another.
It is not always so easy.
Problems:
packets from a connection-oriented network
must transit a connectionless network.
Protocol conversions will often be needed.
Address conversions will also be needed.
Passing multicast packets through a network
that does not support multicasting.
differing maximum packet sizes used by
different networks.
Differing qualities of service is an issue.
Error, flow, and congestion control often
differ among different networks.
Difference:
With a switch, the entire frame is
transported on the basis of its MAC
address. With a router, the packet is
extracted from the frame and the
address in the packet is used for
deciding where to send it.
Switches do not have to understand the
network layer protocol being used to
switch packets. Routers do.
a) Two Ethernets
connected by a switch
b) Two Ethernets
connected by routers.
Concatenated Virtual
Circuits
Two styles of internetworking
virtual-circuit model
A connection to a host in a way similar to the
way connections are normally established.
Subset see the destination.
A virtual circuit to the router, nearest to the
destination, is built if the destination is remote.
Connectionless
Internetworking
Alternative
internetwork
model
datagram model.
The only service the network layer
offers to the transport layer is the ability
to inject datagrams into the subnet and
hope for the best.
This model does not require all packets
belonging to one connection to traverse
the same sequence of gateways.
A connectionless internet
Disadvantages:
Table space required in the routers for
each open connection, no alternate
routing to avoid congested areas, and
vulnerability to router failures along the
path.
It is also difficult.
The properties:
more potential for congestion but also
more potential for adapting to it.
robustness in the face of router failures,
and longer headers needed.
Advantage:
It can be used over subnets that do not
use virtual circuits inside. Many LANs,
mobile networks (e.g., aircraft and naval
fleets), and even some WANs fall into
this category.
Tunneling
Common special case that is
manageable.
The source and destination hosts are
on the same type of network, but
there is a different network in
between.
The solution to this problem is a
technique called tunneling.
Internetwork Routing
Routing through an internetwork is
similar to routing within a single
subnet, but with some added
complications.
Making a graph model of the situation
is complicated by the fact that every
router can directly access every other
router connected to any network to
which it is connected.
interior
exterior
Working:
A typical internet packet starts out on its
LAN addressed to the local multiprotocol
router.
After it gets there, the network layer
code decides which router to forward the
packet, using its own routing tables.
If that router can be reached, the packet
is forwarded there directly.
Otherwise
it
is
tunneled
there,
encapsulated in the protocol required by
the intervening network.
This process is repeated until the packet
reaches the destination network.
Differences
Internetwork
routing
may
require
crossing international boundaries.
Laws will have to be considered.
Fragmentation
Network imposes some maximum size
on its packets:
Hardware
Operating system
Protocols
Compliance with some (inter)national
standard.
Desire to reduce error-induced
retransmissions to some level.
Desire to prevent one packet from occupying
the channel too long.
Problem:
when a large packet wants to travel
through a network whose maximum packet
size is too small.
Solution:
make sure the problem does not occur in
the first place - not so much of a good idea.
Allow gateways to break up packets into
fragments, sending each fragment as a
separate internet packet.
Converting a large object into small
fragments is considerably easier than the
reverse process; packet-switching networks
too has this problem.
Strategy:
Make fragmentation caused by a ''smallpacket'' network transparent to any
subsequent networks through which the
packet must pass on its way to the
ultimate destination.
Refrain from recombining fragments at
any intermediate gateways.
Transparent fragmentation
Straightforward.
The exit gateway must know when it has
received all the pieces.
All packets must exit via the same gateway.
Some performance may be lost.
A last problem is the overhead.
ATM requires transparent fragmentation.
Nontransparent fragmentation
Problem:
it requires every host to be able to do
reassembly
When large packet is fragmented, the total
overhead increases, Whereas in the first
method this overhead disappears as soon as
the small-packet network is exited.
Advantage:
multiple exit gateways can now be used and
higher performance can be achieved.
Keep it simple
Use the simplest solution
Exploit modularity
Having protocol stacks, each of whose layers is
independent of all the other ones.
Expect heterogeneity
Network design must be simple, general, and
flexible.
or
The IP Protocol
An IP datagram consists of a header part
and a text part.
The header has a 20-byte fixed part and
a variable length optional part.
The Version field keeps track of which
version of the protocol the datagram
belongs to.
IP Addresses
Every host and router on the Internet
has an IP address, which encodes its
network number and host number.
Unique combination.
IP addresses are 32 bits long and are
used in the Source address and
Destination address fields of IP packets.
Note: An IP address does not actually
refer to a host. It really refers to a
network interface.
The values
meanings
and
-1
have
special
Subnets
all the hosts in a network must have the same
network number.
A solution to allow a network to be split into
several parts for internal use but still act like
a single network to the outside world.
the parts of the network are called subnets.
Internet Control
Protocols
Internet Control Message Protocol
The operation of the Internet is monitored
closely by the routers.
When something unexpected occurs, the
event is reported by the ICMP, which is
also used to test the Internet.