SlideShare una empresa de Scribd logo
1 de 16
Several Design Issues at Network layer ,[object Object]
Implementation of Connection oriented Services
Comparison of datagram subnet and virtual-circuit subnetAshishDubey(9) Hansel Gonsalves(12) KashyapDavariya(7)
Implementation of Connectionless Services In Connectionless Service, no need to establish connection In this packets are injected into subnet and routed independently of each other. No advance set up is needed In this context the packets are frequently called datagram and subnet is called datagram subnet.
Routing within a datagram subnet
 Let see the working of datagram subnet. Suppose process p1 has long message for process p2. It hands message with instructions to transport layer to deliver it to process 2 on host 2. The transport layer code runs on H1,within an OS. It prepends a transport header to the front of message and hands the result to the network layer.
Assume that message is four times longer than maximum packet size. The Network layer breaks it into four packets 1, 2 ,3 and 4 and sends all to router A using point-to-point protocol. At this point carrier takes over. Every router has an internal table that tells where to send packets for each possible destinations.
Each table entry is a pair consisting of a destination and the outgoing line to use for that destination. Only directly connected lines can be used. For eg: A has only two outgoing lines - to B and C - so every incoming packet must be sent to one of these routers, even if ultimate destination is some other router.
As packets arrived at A, packets 1, 2 and 3 were stored briefly(to verify their checksums). Then each was forwarded to C according to A’s table . Packet 1 was then forwarded to C according to A’s table. Packet 1 was then forwarded to E and then to F and at F it was encapsulated in datalink layer frame and sent to H2 over the LAN.
Packet 2 and 3 follow the same route. However packet 4 was routed at different router(i.e at B) for some reason. Perhaps it learned of traffic jam somewhere along the ACE path and updated its router table as “later”. The algorithm that manages the tables and makes the routing decisions is called Routing Algorithm.
Implementation of Connection Oriented Services In this a connection is established. A path from source to the destination router must be established before any packets can be sent.  This connection is virtual circuit with physical circuit set up by the telephone system  Subnet is called virtual circuit subnet. The particular route choosen is used for all traffic flowing over the connection.
With connection oriented service , each packet carries an identifier telling which virtual circuit it belongs.
Routing within a virtual-circuit subnet.
Here , host H1 has established a connection 1 with host H2. It is remembered as the first entry in each of the routing tables. The first lines of A’s table says that if a packet bearing  connection identifier 1 comes from H1, it to be sent to router C and given a connection identifier 1. Similarly, the first entry at C routes the packet to E, also with connection identifier 1.
Now let consider what happens if H3 also wants to establish a connection to H2. It chooses identifier 1(because it is initiating the connection and this is its only connection) and tells the subnet to establish the virtual circuit. This leads to the second row in the tables. Note that we have a conflict here because although A can easily distinguish connection 1 packets from H1 from connection 1 packets  from H3 , C cannot do this.
For this reason, A assigns a different connection identifier to the outgoing traffic for the second connection. Avoiding conflicts of this kind is why routers need the ability to replace connection identifiers in outgoing packets. In some contexts, this is called label swithing.

Más contenido relacionado

La actualidad más candente

Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
jayaprakash
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
ymghorpade
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 

La actualidad más candente (20)

Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 

Destacado

Math project final 1
Math project final 1Math project final 1
Math project final 1
Rain Wolf's
 
Prefixes
PrefixesPrefixes
Prefixes
Eve_55
 
Ip address concepts
Ip address conceptsIp address concepts
Ip address concepts
myrajendra
 
Polygon clipping
Polygon clippingPolygon clipping
Polygon clipping
Mohd Arif
 

Destacado (20)

Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Math project final 1
Math project final 1Math project final 1
Math project final 1
 
network hardware
network hardwarenetwork hardware
network hardware
 
Prefixes
PrefixesPrefixes
Prefixes
 
Prefixes
PrefixesPrefixes
Prefixes
 
Quantitative Analysis for Management, Tenth Edition
Quantitative Analysis for Management, Tenth EditionQuantitative Analysis for Management, Tenth Edition
Quantitative Analysis for Management, Tenth Edition
 
data link layer
data link layerdata link layer
data link layer
 
Chapter 7: Transmission Media
Chapter 7: Transmission MediaChapter 7: Transmission Media
Chapter 7: Transmission Media
 
Ip address concepts
Ip address conceptsIp address concepts
Ip address concepts
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
My presentation minimum spanning tree
My presentation minimum spanning treeMy presentation minimum spanning tree
My presentation minimum spanning tree
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Computer networks
Computer networksComputer networks
Computer networks
 
Ch 21
Ch 21Ch 21
Ch 21
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
IP addressing
IP addressingIP addressing
IP addressing
 
Polygon clipping
Polygon clippingPolygon clipping
Polygon clipping
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 

Similar a Final several design issues at network layer

4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
mrcopyxerox
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedting
H K
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
MelkamtseganewTigabi1
 
Forwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docxForwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docx
budbarber38650
 

Similar a Final several design issues at network layer (20)

4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
CN R16 -UNIT-5.pdf
CN R16 -UNIT-5.pdfCN R16 -UNIT-5.pdf
CN R16 -UNIT-5.pdf
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
Notes
NotesNotes
Notes
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedting
 
Routing
RoutingRouting
Routing
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulation
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Module_3_Part_3.pptx
Module_3_Part_3.pptxModule_3_Part_3.pptx
Module_3_Part_3.pptx
 
CN-UNIT-3 __Network Layer (2).pptx
CN-UNIT-3 __Network Layer (2).pptxCN-UNIT-3 __Network Layer (2).pptx
CN-UNIT-3 __Network Layer (2).pptx
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 
Mit6 02 f12_chap18
Mit6 02 f12_chap18Mit6 02 f12_chap18
Mit6 02 f12_chap18
 
Forwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docxForwarding and Routing The role of the network layer is thus dec.docx
Forwarding and Routing The role of the network layer is thus dec.docx
 
Transport layer
Transport layerTransport layer
Transport layer
 
Link layer
Link layerLink layer
Link layer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Final several design issues at network layer

  • 1.
  • 2. Implementation of Connection oriented Services
  • 3. Comparison of datagram subnet and virtual-circuit subnetAshishDubey(9) Hansel Gonsalves(12) KashyapDavariya(7)
  • 4. Implementation of Connectionless Services In Connectionless Service, no need to establish connection In this packets are injected into subnet and routed independently of each other. No advance set up is needed In this context the packets are frequently called datagram and subnet is called datagram subnet.
  • 5. Routing within a datagram subnet
  • 6. Let see the working of datagram subnet. Suppose process p1 has long message for process p2. It hands message with instructions to transport layer to deliver it to process 2 on host 2. The transport layer code runs on H1,within an OS. It prepends a transport header to the front of message and hands the result to the network layer.
  • 7. Assume that message is four times longer than maximum packet size. The Network layer breaks it into four packets 1, 2 ,3 and 4 and sends all to router A using point-to-point protocol. At this point carrier takes over. Every router has an internal table that tells where to send packets for each possible destinations.
  • 8. Each table entry is a pair consisting of a destination and the outgoing line to use for that destination. Only directly connected lines can be used. For eg: A has only two outgoing lines - to B and C - so every incoming packet must be sent to one of these routers, even if ultimate destination is some other router.
  • 9. As packets arrived at A, packets 1, 2 and 3 were stored briefly(to verify their checksums). Then each was forwarded to C according to A’s table . Packet 1 was then forwarded to C according to A’s table. Packet 1 was then forwarded to E and then to F and at F it was encapsulated in datalink layer frame and sent to H2 over the LAN.
  • 10. Packet 2 and 3 follow the same route. However packet 4 was routed at different router(i.e at B) for some reason. Perhaps it learned of traffic jam somewhere along the ACE path and updated its router table as “later”. The algorithm that manages the tables and makes the routing decisions is called Routing Algorithm.
  • 11. Implementation of Connection Oriented Services In this a connection is established. A path from source to the destination router must be established before any packets can be sent. This connection is virtual circuit with physical circuit set up by the telephone system Subnet is called virtual circuit subnet. The particular route choosen is used for all traffic flowing over the connection.
  • 12. With connection oriented service , each packet carries an identifier telling which virtual circuit it belongs.
  • 13. Routing within a virtual-circuit subnet.
  • 14. Here , host H1 has established a connection 1 with host H2. It is remembered as the first entry in each of the routing tables. The first lines of A’s table says that if a packet bearing connection identifier 1 comes from H1, it to be sent to router C and given a connection identifier 1. Similarly, the first entry at C routes the packet to E, also with connection identifier 1.
  • 15. Now let consider what happens if H3 also wants to establish a connection to H2. It chooses identifier 1(because it is initiating the connection and this is its only connection) and tells the subnet to establish the virtual circuit. This leads to the second row in the tables. Note that we have a conflict here because although A can easily distinguish connection 1 packets from H1 from connection 1 packets from H3 , C cannot do this.
  • 16. For this reason, A assigns a different connection identifier to the outgoing traffic for the second connection. Avoiding conflicts of this kind is why routers need the ability to replace connection identifiers in outgoing packets. In some contexts, this is called label swithing.
  • 17. Comparison of datagram subnet and virtual-circuit subnet
  • 18. Comparison of datagram subnet and virtual-circuit subnet