Download Document

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wake-on-LAN wikipedia , lookup

Peering wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

AppleTalk wikipedia , lookup

Network tap wikipedia , lookup

Distributed firewall wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Deep packet inspection wikipedia , lookup

IEEE 1355 wikipedia , lookup

Computer network wikipedia , lookup

Airborne Networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Internet protocol suite wikipedia , lookup

Parallel port wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Routing wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Three planes in networks
Prof. Malathi Veeraraghavan
Elec. & Comp. Engg. Dept/CATT
Polytechnic University
[email protected]
M. Veeraraghavan
1
Polytechnic University
User plane, control plane, and
management plane
• Management plane: consists of all the protocols needed to “configure”
data tables for the operation of the network
– For example, protocols for routing data dissemination (distributed or
centralized)
– Other functions: performance, fault mgmt., accounting, security
• Control plane:
– Connection control protocols
• in CO networks, this includes connection setup at each switch (connections at
the network layer)
• in CL networks, this includes connection setup only at the endpoints
(connections at the transport layer, if the TL protocol is reliable)
– Call control protocols
• User plane: protocols for the actual flow of data
M. Veeraraghavan
2
Polytechnic University
Routing protocol in all three types of
networks - Phase 1
Dest.
Next hop
B
B
II
Host A
I
Dest.
Next hop
III-*
IV
Routing
protocol
Routing
protocol
Routing
protocol
IV
Dest.
Next hop
III-*
III
Host B
III
V
Routing tables
• Routing protocols exchange
topology/loading/reachability information
• Routes to destinations are precomputed and stored in
M. Veeraraghavan
3
Polytechnic University
routing tables
Signaling protocol for NL connection setup in
a PS CO network - Phase 2
Connection
setup (B)
II
d/L1
b
a
Host A
IN
Port /Label
I
c
Connection
setup
b
a
a/L1
OUT
Port/Label
c/L2
Connection
setup
IV
III
d
IN
Port /Label
b
Host B
c
V
d
Connection
setup
OUT
Port/Label
a/L2
•
b/L3
a
c
IN
Port /Label
OUT
Port/Label
c/L1
Virtual circuit
Connection setup consists of each switch on the path
– Route lookup for next hop node to reach destination
– CAC (Connection Admission Control) for buffer and BW
– Writing the input/output label mapping tables and programming the scheduler
M. Veeraraghavan
4
Polytechnic University
Signaling protocol for NL connection setup in
a CS CO network - Phase 2
Connection
setup (B)
Host A
II
d/2
b
a
I
IN
OUT
Port /Timeslot Port/Timeslot
c
a
Connection
setup
b
Connection
setup
a
a/1
c/2
IV
III
d
c
IN
OUT
Port /Timeslot Port/Timeslot
b/1
b
Host B
c
V
d
Connection
setup
IN
OUT
Port /Timeslot Port/Timeslot
a/2
c/2
Circuit
• Connection setup consists of each switch on the path
– Route lookup for next hop node to reach destination
– CAC (Connection Admission Control) for BW (note: no buffers)
– Writing the port/timeslot/l
M. Veeraraghavan
5 mapping table
Polytechnic University
User-plane packet forwarding in a PS
CO network - Phase 3
II
L1
b
Host A
IN
Port /Label
a/L1
a
I
c
L1
III
c
d
b
a
OUT
Port/Label
c/L2
L3
a
IV
d
b
Host B
c
V
L2
• Labels are VPI/VCIs in ATM
• Labels are translated from link-to-link
M. Veeraraghavan
6
Polytechnic University
User-plane actions in a circuit-switched
network - Phase 3
II
1
2
b
Host A
a
I
1
a
1
c
2
b
d
c
a
IV
III
d
2
b
Host B
c
V
IN
OUT
Port /Timeslot Port/Timeslot
a/1
c/2
1
2
• Bits arriving at switch I on time slot 1 on
port a are switched to time slot 2 of port c
M. Veeraraghavan
7
Polytechnic University
User-plane packet forwarding in a CL PS
network - Phase 3
II
b
Host A
a
I
c
B
B
a
B
III
c
d
b
a
IV
d
b
Host B
c
V
B
• Packet headers carry destination host address (unchanged
as it passes hop by hop)
• Each CL packet switch does a route lookup to determine
the outgoing port/next hop node
M. Veeraraghavan
8
Polytechnic University
Addressing
• Where are endpoint addresses used:
– In CL PS networks, endpoint addresses are
carried in packet headers
– In CO networks, be it PS or CS, endpoint
addresses are carried in connection setup
messages
M. Veeraraghavan
9
Polytechnic University
Summarized addresses
• What are summarized addresses?
• Why summarize addresses?
M. Veeraraghavan
10
Polytechnic University
Summarized addresses
• What are summarized addresses?
– An address that represents a group of endpoint
addresses
– e.g., all 212 numbers, 128.238 IP addresses
• Why summarize addresses?
– Reduces routing table sizes – hold one entry for a
summarized address instead of a large number of
individual addresses
– Reduces routing message lengths that convey
reachability information
M. Veeraraghavan
11
Polytechnic University
Examples of signaling protocols
• SS7 (Signaling System No. 7) network
(with its SS7 protocol stack) carries
signaling messages to set up and release
circuits in a telephone network
M. Veeraraghavan
12
Polytechnic University
Examples of routing protocols
• In the Internet:
– Link-state routing protocols, such as Open Path
Shortest First (OSPF)
– Distance-vector based routing protocols, such
as Routing Information Protocol (RIP)
• In telephone networks:
– Real-Time Network Routing (RTNR)
M. Veeraraghavan
13
Polytechnic University
Examples of addressing schemes
• Internet
– 4-byte IP addresses
• Telephone networks
– 8-byte E.164 address (telephone number)
• ATM networks
– 20-byte ATM End System Address (AESA)
M. Veeraraghavan
14
Polytechnic University