Chapter 5: Network layer Flashcards
The network is highest…
highest layer that runs on network specific hardware, everything afterwards is software.
What the previous networks dont have but really need…
A way to establish communications between hosts that arent directly connected to one another, but connected by virtue of intermediaries. Speed should be as optimal as possible
Store-and-Foreward packet switching
In order to transfer packets from one host to another via intermediaries, a technique known as store-and-forward packet switching is used.
How store-and-forward works
each of the routers between the source and the destination will fully buffer the packets they receive before sending them to the next node in the path.
One of the most important functions of the network layer
Identification of the optimal route. Routing algorithms are used.
Connectionless network
Sends data in a fire-and-forget method. No attempt is made to check if the information is received correctly or at all.
Connection orientated
Establish a communication channel before any actual information is transmitted. The goal is usually to ensure that the information is received and received correctly.
Routing algorithms with connectionless network
Send all the packets individually using individual paths. But the route will change with every packet, making it more difficult to implement congestion control or quality of life (qos) features.
Datagram network
Connectionless network, where packets are called datagrams.
Virtual circuit (VC)
connection oriented, and gets its name from the fact that a “circuit” connecting the communicating hosts is created before the data is sent.
Network differences:
Circuit setup
Datagram: not needed
VC: Required
Addressing differences
Datagram: each packet contains the full source and destination address
VC: each packet contains a short VC number
State information differences
Datagram: routers do not hold state information about connections
VC: each VC requires router table space per connection
Routing differences
Datagram: each packet is routed independently
VC: Route chosen when VC is set up; all packets follow it.
Effect of router failure (differences)
Datagram: None, except that packets are lost
VC: All VC’s that pass through the failed router are terminated
Quality of Service (differences)
Datagram: difficult
VC: Easy if enough resources can be allocated in advance to each VC
Congestion control differences
Datagram: difficult
VC: Easy if enough resources can be allocated in advance for each VC
How routers store information needed to calculate routes
Each server has a routing table, which contains information about other routers in the network.
Important example for studying
So topological routing tables explored on efundi page!!
Optimality principle
If the path from router A to router K is optimal, and router F is on that path, then the optimal path from router F to K will follow that path.
Sink tree
When optimality principle is applied to a network graph, you can create a sink tree that only contains optimal paths.
Sink tree example
SEE AND STUDY THE EFUNDI EXAMPLE
Dijkstra’s Alogirthm (shortest path)
By describing each connection as a path with a known length, you can identify the optimal path from any source to any destination by simply minimising the length of the path that a packet would need to travel.
How Dijkstra’s algorithm works
Uses labelling to identify the shortest route. As longer routes are used, labels keep track of the shortest path.
Simply selecting all the nodes with the shortest paths will yield the shortest route.