* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Slide 1
Multiprotocol Label Switching wikipedia , lookup
Computer network wikipedia , lookup
Airborne Networking wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Deep packet inspection wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Net-Centric Computing Division Department of Computer Science Bogor Agricultural University KOM 312 KOMUNIKASI DATA DAN JARINGAN KOMPUTER Packet Switching Network Sri Wahjuni my_juni04(at)ipb.ac.id AGENDA Network-layer swj/11 Functions Packet Network Topology Network Service Model Routing Principles Shortest Path Routing QoS in Network Layer 2 Department of Computer Science -IPB REVIEW OSI Reference Model TCP/IP Architecture swj/11 3 Department of Computer Science -IPB TWO VIEWS OF NETWORKS External view: what services provided to transport layer by a network (i.e. network layer) Need connection setup or not What QoSs are provided Services should be independent from underlying networks so that transport layer can run over any networks as long as the networks provide the services Internal view: physical topology, datagram message transfer or virtual circuit information transfer, addressing and routing, congestion control. 4 swj/11 Department of Computer Science -IPB COMPARISONS OF TWO VIEWS BY EXAMPLES Broadcast networks and packet-switched networks From external view, both networks provides transfer of information between users, not too much different But from internal view, very different: A broadcast network (such as LANs) is small, addressing is simple, frame transferred in one hop so no routing is needed In a packet-switching network, addressing must accommodate large-scale networks and routing is necessary. swj/11 5 Department of Computer Science -IPB PACKET SWITCHING swj/11 Transfer of information as payload in data packets Packets undergo random delays & possible loss Different applications impose differing requirements on the transfer of information Department of Computer Science -IPB 6 NETWORK SERVICE swj/11 Network layer can offer a variety of services to transport layer Connection-oriented service or connectionless service Best-effort or delay/loss guarantees Department of Computer Science -IPB 7 NETWORK-LAYER FUNCTIONS 8 Department of Computer Science -IPB swj/11 Essential Routing: mechanisms for determining the set of best paths for routing packets requires the collaboration of network elements Forwarding: transfer of packets from NE inputs to outputs Priority & Scheduling: determining order of packet transmission in each NE Optional: congestion control, segmentation & reassembly, security AGENDA Network-layer swj/11 Functions Packet Network Topology Network Service Model Routing Principles Shortest Path Routing QoS in Network Layer 9 Department of Computer Science -IPB ACCESS MULTIPLEXER swj/11 10 Department of Computer Science -IPB LOCAL AREA NETWORK swj/11 LAN 1 Bridge LAN 2 11 Department of Computer Science -IPB INTRADOMAIN AND INTERDOMAIN swj/11 12 Department of Computer Science -IPB KEY ROLE OF ROUTING swj/11 How to get packet from here to there? Decentralized nature of Internet makes routing a major challenge Interior gateway protocols (IGPs) are used to determine routes within a domain Exterior gateway protocols (EGPs) are used to determine routes across domains Routes must be consistent & produce stable flows Scalability required to accommodate growth Hierarchical structure of IP addresses essential to keeping size of routing tables manageable 13 Department of Computer Science -IPB AGENDA Network-layer swj/11 Functions Packet Network Topology Network Service Model Routing Principles Shortest Path Routing QoS in Network Layer 14 Department of Computer Science -IPB MESSAGE SWITCHING swj/11 15 Department of Computer Science -IPB MESSAGE SWITCHING DELAY Source t t Switch 2 swj/11 Switch 1 T t t Destination Delay Minimum Delay = 3 + 3T, : propagation delay (umumnya panjang hop/kecepatan cahaya) T: message transmission time 16 Department of Computer Science -IPB DATAGRAM PACKET SWITCHING Department of Computer Science -IPB swj/11 Messages broken into smaller units (packets) Source & destination addresses in packet header Connectionless, packets routed independently Packet may arrive out of order Pipelining of packets across network can reduce delay, increase throughput Lower delay that message switching, suitable for interactive traffic 17 DATAGRAM PACKET SWITCHING DELAY Assume three packets corresponding to one message traverse same path T swj/11 τ Minimum Delay = 3τ + 5(T/3) (single path assumed) Additional queuing delays possible at each link Packet pipelining enables message to arrive sooner 18 Department of Computer Science -IPB DELAY FOR K-PACKET MESSAGE OVER L HOPS Source t 1 2 3 1 2 3 t 1 2 3 hops 3 t L hops 3 + 2(T/3) first bit received L + (L-1)P first bit received 3 + 3(T/3) first bit released L + LP first bit released 3 + 5 (T/3) last bit released Department of Computer Science -IPB swj/11 t L + LP + (k-1)P last bit released where T = k P ; P disebut delay transmisi 19 DATAGRAM VS MESSAGE SWITCHING Delay in message switching : L + L(kP) Delay in packet switching (k packets): L + LP + (k-1)P Additional delay in message switching : P(k-1)(L1) swj/11 20 Department of Computer Science -IPB ROUTING TABLES IN CONNECTIONLESS PACKET SWITCHING Department of Computer Science -IPB swj/11 Route determined by table lookup Routing decision involves finding next hop in route to given destination Routing table has an entry for each destination specifying output port that leads to next hop Size of table becomes impractical for very large number of destinations 21 EXAMPLE: INTERNET ROUTING Internet protocol uses datagram packet switching across networks Hosts have two-part IP address: Networks are treated as data links swj/11 Network address + Host address Routers do table lookup on network address This reduces size of routing table 22 Department of Computer Science -IPB VIRTUAL-CIRCUIT PACKET SWITCHING swj/11 Network-layer connection-oriented service Call set-up phase sets ups pointers in fixed path along network All packets for a connection follow the same path Abbreviated header identifies connection on each link Packets queue for transmission Variable bit rates possible, negotiated during call set-up Delays variable, cannot be less than circuit switching 23 Department of Computer Science -IPB CONNECTION SETUP Department of Computer Science -IPB swj/11 Signaling messages propagate as route is selected Signaling messages identify connection and setup tables in switches Typically a connection is identified by a local tag, Virtual Circuit Identifier (VCI) Each switch only needs to know how to relate an incoming tag in one input to an outgoing tag in the corresponding output Once tables are setup, packets can flow along path 24 CONNECTION SETUP DELAY swj/11 Connection setup delay is incurred before any packet can be transferred Delay is acceptable for sustained transfer of large number of packets This delay may be unacceptably high if only a few packets are being transferred 25 Department of Computer Science -IPB VC IMPLEMENTATION A VC consists of: 1. 3. swj/11 2. Path from source to destination VC numbers, one number for each link along path Entries in forwarding tables in routers along path Packet belonging to VC carries a VC number. VC number must be changed on each link. New VC number comes from forwarding table 26 Department of Computer Science -IPB VC FORWARDING TABLE swj/11 Each input port of packet switch has a forwarding table Lookup entry for VCI of incoming packet Determine output port (next hop) and insert VCI for next link Very high speeds are possible Table can also include priority or other information about how packet should be treated 27 Department of Computer Science -IPB AGENDA Network-layer swj/11 Functions Packet Network Topology Network Service Model Routing Principles Routing algorithm Routing tables Hierarchical routing Flooding and Deflection Routing Shortest Path Routing QoS in Network Layer Department of Computer Science -IPB 28 ROUTING ALGORITHM REQUIREMENTS Responsiveness to changes Topology or bandwidth changes, congestion Rapid convergence of routers to consistent set of routes Freedom from persistent loops Optimality Resource utilization, path length Robustness swj/11 Continues working under high load, congestion, faults, equipment failures, incorrect implementations Simplicity Efficient software implementation, reasonable processing 29 load Department of Computer Science -IPB ROUTING ALGORITHM CLASSIFICATION Centralized vs Distributed Routing Centralized Routing All routes determined by a central node All state information sent to central node Problems adapting to frequent topology changes Does not scale swj/11 Distributed Routing Routes determined by routers using distributed algorithm State information exchanged by routers Adapts to topology and other changes Better scalability 30 Department of Computer Science -IPB ROUTING ALGORITHM CLASSIFICATION -2 Set up manually, do not change; requires administration Works when traffic predictable & network is simple Used to override some routes set by dynamic algorithm Used to provide default router swj/11 Static vs Dynamic Routing Static Routing Dynamic Routing Adapt to changes in network conditions Automated Calculates routes based on received updated network state information Department of Computer Science -IPB 31 ROUTING TABLES IN DATAGRAM swj/11 32 Department of Computer Science -IPB ROUTING TABLE IN VIRTUAL-CIRCUIT swj/11 • Route determined during connection setup • Tables in switches implement forwarding that realizes 33 selected route Department of Computer Science -IPB ROUTING TABLES IN VC - CONT swj/11 34 Department of Computer Science -IPB NON-HIERARCHICAL ADDRESSES AND ROUTING swj/11 No relationship between addresses & routing proximity Routing tables require 16 entries each Department of Computer Science -IPB 35 HIERARCHICAL ADDRESSES AND ROUTING swj/11 Prefix indicates network where host is attached Routing tables require 4 entries each Department of Computer Science -IPB 36 FLOODING Send a packet to all nodes in a network No routing tables available Need to broadcast packet to all nodes (e.g. to propagate link state information) swj/11 Approach Send packet on all ports except one where it arrived Exponential growth in packet transmissions 37 Department of Computer Science -IPB swj/11 Flooding is initiated from Node 1: Hop 1 transmissions Department of Computer Science -IPB 38 swj/11 39 Flooding is initiated from Node 1: Hop 2 transmissions Department of Computer Science -IPB swj/11 Flooding is initiated from Node 1: Hop 3 transmissions Department of Computer Science -IPB 40 LIMITED FLOODING Time-to-Live field in each packet limits number of hops to certain diameter Each switch adds its ID before flooding; discards repeats Source puts sequence number in each packet; switches records source address and sequence number and discards repeats swj/11 41 Department of Computer Science -IPB DEFLECTION ROUTING Network nodes forward packets to preferred port If preferred port busy, deflect packet to another port Works well with regular topologies swj/11 Manhattan street network Rectangular array of nodes Nodes designated (i,j) Rows alternate as one-way streets Columns alternate as one-way avenues Bufferless operation is possible Proposed for optical packet networks All-optical buffering currently not viable Department of Computer Science -IPB 42 EXAMPLE: NODE (0,2)→(1,0) swj/11 Tunnel from last column to first column or vice versa 43 Department of Computer Science -IPB EXAMPLE: BUSY NODE swj/11 44 Department of Computer Science -IPB AGENDA Network-layer swj/11 Functions Packet Network Topology Network Service Model Routing Principles Shortest Path Routing QoS in Network Layer 45 Department of Computer Science -IPB SHORTEST PATHS & ROUTING Many possible paths connect any given source and to any given destination Routing involves the selection of the path to be used to accomplish a given transfer Typically it is possible to attach a cost or distance to a link connecting two nodes Routing can then be posed as a shortest path problem swj/11 46 Department of Computer Science -IPB ROUTING METRICS swj/11 Means for measuring desirability of a path Path Length = sum of costs or distances Possible metrics Hop count: rough measure of resources used Delay: sum of delays along path; complex & dynamic Bandwidth: “available capacity” in a path Load: Link & router utilization along path (congestion) Cost: $$$ 47 Department of Computer Science -IPB SHORTEST PATH APPROACHES Department of Computer Science -IPB swj/11 Distance Vector Protocols Neighbors exchange list of distances to destinations Best next-hop determined for each destination Ford-Fulkerson (distributed) shortest path algorithm Link State Protocols Link state information flooded to all routers Routers have complete topology information Shortest path (& hence next hop) calculated Dijkstra (centralized) shortest path algorithm 48 DISTANCE VECTOR ALGORITHM Iterative, asynchronous: swj/11 each local iteration caused by: local link cost change DV update message from neighbor Each node: wait for (change in local link cost of msg from neighbor) Distributed: each node notifies neighbors only when its DV changes neighbors then notify their neighbors if necessary recompute estimates if DV to any dest has changed, notify neighbors 49 Department of Computer Science -IPB BELLMAN-FORD ALGORITHM Now consider parallel computations for all destinations d Initialization Send Step Send new distance vector to immediate neighbors across local link Receive Step swj/11 Each node has 1 row for each destination d Distance of node d to itself is zero: Dd(d)=0 Distance of other node j to d is infinite: Dj(d)= ∝ , for j ≠ d Next node nj = -1 since not yet defined For each destination d, find the next hop that gives the minimum distance to d, Minj { Cij+ Dj(d) } Replace old (nj, Di(d)) by new (nj*, Dj*(d)) if new next node or distance found Go to send step Department of Computer Science -IPB 50 BELLMAN-FORD ALGORITHM(3) swj/11 Table entry @ node 1 for dest Node 6 Table entry @ node 3 for dest Node 6 51 Department of Computer Science -IPB BELLMAN-FORD ALGORITHM(4) swj/11 52 Department of Computer Science -IPB BELLMAN-FORD ALGORITHM(5) swj/11 53 Department of Computer Science -IPB BELLMAN-FORD ALGORITHM(6) swj/11 54 Department of Computer Science -IPB SHORTEST PATH TREE TO NODE 6 swj/11 55 Department of Computer Science -IPB COMPARISON OF LS AND DV ALGORITHMS Message complexity LS: DV: exchange between neighbors only convergence time varies Speed of Convergence LS: O(n2) algorithm requires O(nE) msgs may have oscillations DV: convergence time varies may be routing loops count-to-infinity problem Department of Computer Science -IPB router malfunctions? LS: node can advertise incorrect link cost each node computes only its own table swj/11 with n nodes, E links, O(nE) msgs sent Robustness: what happens if DV: DV node can advertise incorrect path cost each node’s table used by others error propagate thru network 59 EXAMPLE: INTRADOMAIN ROUTING Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols: RIP: Routing Information Protocol OSPF: Open Shortest Path First IGRP: Interior Gateway Routing Protocol (Cisco proprietary) swj/11 60 Department of Computer Science -IPB RIP ( ROUTING INFORMATION PROTOCOL) Distance vector algorithm Distance metric: # of hops (max = 15 hops) Distance vectors: exchanged among neighbors every 30 sec via Response Message (also called advertisement) Each advertisement: list of up to 25 destination nets within AS swj/11 61 Department of Computer Science -IPB RIP: EXAMPLE z w y D B swj/11 A x C Destination Network Next Router Num. of hops to dest. w y z x A B B -- 2 2 7 1 …. …. .... Routing table in D Department of Computer Science -IPB 62 RIP: EXAMPLE Advertisement from A to D Next hops - - C 4 … ... w z x A swj/11 Dest w x z …. y D B C Destination Network Next Router Num. of hops to dest. w y z x A B BA -- 2 2 75 1 …. …. .... Routing table in D Department of Computer Science -IPB 63 RIP: LINK FAILURE AND RECOVERY If no advertisement heard after 180 sec --> neighbor/link declared dead routes via neighbor invalidated new advertisements sent to neighbors neighbors in turn send out new advertisements (if tables changed) link failure info quickly propagates to entire net poison reverse used to prevent ping-pong loops (infinite distance = 16 hops) swj/11 64 Department of Computer Science -IPB OSPF (OPEN SHORTEST PATH FIRST) “open”: publicly available Uses Link State algorithm LS packet dissemination Topology map at each node Route computation using Dijkstra’s algorithm swj/11 OSPF advertisement carries one entry per neighbor router Advertisements disseminated to entire AS (via flooding) 65 Department of Computer Science -IPB INTERDOMAIN ROUTING: BGP (Border Gateway Protocol): the de facto standard Path vector protocol instead of distance vector swj/11 BGP 66 Department of Computer Science -IPB AGENDA Network-layer swj/11 Functions Packet Network Topology Network Service Model Routing Principles Shortest Path Routing QoS in Network Layer 67 Department of Computer Science -IPB QOS PARAMETER End-to-end delay : Jitter Variability in the packet delays swj/11 sum of individual delays experienced at each system Packet loss Sum of packet discarded by he queue system 68 Department of Computer Science -IPB QOS REQUIREMENTS swj/11 69 Department of Computer Science -IPB QUEUEING SYSTEM swj/11 Queue scheduling : - FIFO - Priority (discard priority, HOL priority) 70 Department of Computer Science -IPB (A) FIFO AND (B) FIFO W/ DISCARD PRIORITY swj/11 71 Department of Computer Science -IPB HEAD OF LINE (HOL) PRIORITY swj/11 High priority queue serviced until empty High priority queue has lower waiting time Department of Computer Science -IPB 72 FAIR QUEUEING Each flow has its own logical queue: prevents hogging; allows differential loss probabilities C bits/sec allocated equally among non-empty queues transmission rate = C / n(t), where n(t)=# non-empty queues swj/11 Idealized system assumes fluid flow from queues Implementation requires approximation: simulate fluid system; sort packets according to completion time in ideal system 73 Department of Computer Science -IPB RANDOM EARLY DETECTION (RED) swj/11 Background : Packets produced by TCP will reduce input rate in response to network congestion Early drop: discard packets before buffers are full Random drop causes some sources to reduce rate before others, causing gradual reduction in aggregate input rate 74 Department of Computer Science -IPB RED ALGORITHM swj/11 Algorithm: Maintain running average of queue length If Qavg < minthreshold, do nothing If Qavg > maxthreshold, drop packet If in between, drop packet according to probability Flows that send more packets are more likely to have packets dropped 75 Department of Computer Science -IPB QOS PROVISIONING Open-loop control : does not rely on feedback information to react to congestion swj/11 Admission Control : common for virtual-circuit Policing (Leaky Bucket algorithm) Traffic Shaping Closed-loop control : maximize link utilization while preventing buffer overflows due to congestion Congestion control (in TCP) 76 Department of Computer Science -IPB ADMISSION CONTROL Flows negotiate contract with network Specify requirements: swj/11 Peak, Avg., Min bit rate Maximum burst size Delay, Loss requirement o Network computes resources needed o“Effective” bandwidth o If flow accepted, network allocates resources to ensure QoS delivered as long as source conforms to contract Department of Computer Science -IPB 77 POLICING Network monitors traffic flows continuously to ensure they meet their traffic contract When a packet violates the contract, network can discard or tag the packet giving it lower priority If congestion occurs, tagged packets are discarded first Leaky Bucket Algorithm is the most commonly used policing mechanism swj/11 Bucket has specified leak rate for average contracted rate Bucket has specified depth to accommodate variations in arrival rate Arriving packet is conforming if it does not result in overflow Department of Computer Science -IPB 78 LEAKY BUCKET PRINCIPLES swj/11 Let X = bucket content at last conforming packet arrival Let ta – last conforming packet arrival time = depletion in bucket Department of Computer Science -IPB 79 LEAKY BUCKET ALGORITHM swj/11 80 Department of Computer Science -IPB LEAKY BUCKET EXAMPLE swj/11 81 Department of Computer Science -IPB TRAFFIC SHAPING swj/11 Networks police the incoming traffic flow (ingress) Traffic shaping is used to ensure that a packet stream conforms to specific parameters (engress) Networks can shape their traffic prior to passing it to another network Department of Computer Science -IPB 82 LEAKY BUCKET TRAFFIC SHAPER swj/11 Buffer incoming packets Play out periodically to conform to parameters Surges in arrivals are buffered & smoothed out Possible packet loss due to buffer overflow Too restrictive, since conforming traffic does not need to be completely smooth 83 Department of Computer Science -IPB TOKEN BUCKET TRAFFIC SHAPER swj/11 Token rate regulates transfer of packets If sufficient tokens available, packets enter network without delay K determines how much burstiness allowed into the network Department of Computer Science -IPB 84 TOKEN BUCKET SHAPING EFFECT swj/11 The token bucket constrains the traffic from a source to be limited to b + r t bits in an interval of length t Department of Computer Science -IPB 85 REFERENCES Garcia A.L., Widjaja A. 2004. Networks Communication : Fundamental Concepts and Key Architectures 2nd ed. – Chapter 7. McGraw-Hill Companies, Inc. Kurose J.F., Ross K.W. 2003. Computer Networking : A Top-Down Approach Featuring Internet 2nd ed. – Chapter 4. Pearson Education. swj/11 86 Department of Computer Science -IPB