KEMBAR78
Module Three | PDF | Computer Network | Routing
0% found this document useful (0 votes)
16 views11 pages

Module Three

The document discusses various design issues related to the network layer, including routing, congestion control, addressing, packet forwarding, quality of service, fragmentation, security, and inter-networking. It also explains store-and-forward techniques, services provided by the network layer, and different routing methods such as static and dynamic routing, as well as flooding, distance vector, and link-state routing. Additionally, it compares IPv4 and IPv6 addressing, highlighting their differences in structure, capacity, and security features.

Uploaded by

Jon Snow
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views11 pages

Module Three

The document discusses various design issues related to the network layer, including routing, congestion control, addressing, packet forwarding, quality of service, fragmentation, security, and inter-networking. It also explains store-and-forward techniques, services provided by the network layer, and different routing methods such as static and dynamic routing, as well as flooding, distance vector, and link-state routing. Additionally, it compares IPv4 and IPv6 addressing, highlighting their differences in structure, capacity, and security features.

Uploaded by

Jon Snow
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

What are the network layer design issues?

Network layer design issues primarily revolve around several key functions of the network layer in
the OSI model. Here are the major design issues:

1. Routing: Routing is the process of determining the path packets take from the source to the
destination. Design challenges include finding the most efficient path, handling dynamic
network conditions, ensuring scalability, and balancing load across the network.

2. Congestion Control: The network layer must manage traffic to avoid congestion. Congestion
occurs when too many packets are present in the network, causing performance
degradation. Efficient congestion control mechanisms are necessary to maintain smooth data
flow.

3. Addressing and Address Mapping: Each device on the network needs a unique address to
ensure data is sent to the correct destination. Challenges include maintaining and
distributing these addresses (IP addresses in the case of the Internet), subnetting, and
managing address space.

4. Packet Forwarding: After determining the route, the network layer must forward packets
through intermediate routers. Issues include deciding how to prioritize packets, handle
errors, and ensure packets reach their destination despite possible network changes.

5. Quality of Service (QoS): The network layer must also consider QoS requirements, such as
prioritizing certain types of traffic (e.g., video or voice over other data) to ensure an
acceptable level of performance.

6. Fragmentation and Reassembly: Data packets may be too large to be handled by the
underlying data link layer, which requires fragmentation. The network layer must break the
packets into smaller fragments, transmit them, and reassemble them at the destination,
which can be complex.

7. Security: Ensuring secure data transfer, mitigating threats like packet interception, and
providing mechanisms for network authentication are crucial issues that the network layer
faces, especially in a multi-user environment.

8. Inter-networking: Different types of networks (e.g., Ethernet, Wi-Fi, optical networks) need
to be interconnected, which poses compatibility issues. The network layer must provide
solutions that allow these heterogeneous networks to communicate effectively.

Addressing these issues involves trade-offs between efficiency, complexity, cost, and performance,
often requiring a balance to meet specific network requirements.

What is Store and forward?

In a process called store-and-forward, each packet is temporarily stored at each intermediate node,
then forwarded when the next link becomes available. In a connection-oriented transmission
scheme, each packet takes the same route through the network, and thus all packets usually arrive at
the destination in the order in which they were sent. Conversely, each packet may take a different
path through the network in a connectionless or datagram scheme. Since datagrams may not arrive
at the destination in the order in which they were sent, they are numbered so that they can be
properly reassembled. The latter is the method that is used for transmitting data through
the Internet.

What are the services provided by the network layer?

The network layer provides several key services to the transport layer, facilitating reliable and
efficient communication between devices across the network. These services include:

1. Logical Addressing (IP Addressing):

o The network layer provides a logical addressing scheme, typically through IP


addresses. This allows the transport layer to identify and communicate with remote
hosts regardless of their physical location in the network.

o It ensures that the transport layer can easily address packets for routing across
different sub-networks.

2. Routing and Forwarding:

o The network layer is responsible for determining the best route for data packets to
travel from the source to the destination.

o This routing service allows the transport layer to focus on end-to-end


communication without worrying about the specific paths data takes to reach its
target.

3. Packet Fragmentation and Reassembly:

o The network layer handles the fragmentation of large data packets that exceed the
maximum transmission unit (MTU) of the underlying link layer. It also provides
reassembly of these fragments at the receiving end.

o This fragmentation service helps the transport layer in ensuring that data is
successfully delivered even across network links with different data capacity limits.

4. Connectionless Communication:

o The network layer typically provides connectionless services, meaning that each
packet is routed independently without establishing a connection beforehand.

o This allows the transport layer protocols, such as UDP, to send data without
maintaining state or setting up a session, providing a simple and efficient way to
transmit datagrams.

5. Error Handling and Diagnostics:

o The network layer offers basic error handling and diagnostic services, such as using
ICMP (Internet Control Message Protocol) for error messages and diagnostic
functions.
o This helps the transport layer to recognize issues like destination unreachable or
time-exceeded errors, enabling it to respond appropriately.

6. Quality of Service (QoS):

o Some network layer protocols provide Quality of Service mechanisms to prioritize


certain types of traffic. This service is especially important for ensuring that certain
applications, such as VoIP or video streaming, receive the necessary bandwidth and
low latency.

o The transport layer can benefit from this by relying on the network layer to ensure
that critical data receives better treatment across the network.

7. Address Mapping:

o The network layer assists in mapping between IP addresses and link-layer addresses
(e.g., through ARP for IPv4). This ensures the transport layer can rely on accurate
address resolution to establish communication.

Overall, the services provided by the network layer simplify the task of the transport layer by
abstracting the complexities of routing, addressing, and handling packet-level network functions,
allowing the transport layer to focus on end-to-end communication and reliable data transfer.
Routing

Routing in the network layer is a critical function that determines how data packets are forwarded
through a network from the source to the destination. It involves various processes and algorithms
that ensure efficient and reliable packet delivery across interconnected devices (routers and
switches)

Routing can be broadly classified into two main types:

A. Static Routing

• Definition: In static routing, routes are manually configured and do not change unless
altered by an administrator.

• Characteristics:

o Simplicity and predictability.

o Minimal overhead since no routing protocols are needed.

o Inefficient in dynamic environments, as it cannot adapt to network changes or


failures.

• Use Cases: Small networks or in specific situations where the network topology is stable.

B. Dynamic Routing

• Definition: Dynamic routing uses protocols to automatically discover and maintain routes in
the network.

• Characteristics:

o Adapts to changes in the network topology (e.g., adding/removing routers, link


failures).

o More complex and requires routing protocols to manage and update routing tables.

Shortest path routing in Computer Networks

In between sending and receiving data packets from the sender to the receiver, it will go through
many routers and subnets. So as a part of increasing the efficiency in routing the data packets and
decreasing the traffic, we must find the shortest path

It refers to the algorithms that help to find the shortest path between a sender and receiver for
routing the data packets through the network in terms of shortest distance, minimum cost, and
minimum time.

• It is mainly for building a graph or subnet containing routers as nodes and edges as
communication lines connecting the nodes.
• Hop count is one of the parameters that is used to measure the distance.

• Hop count: It is the number that indicates how many routers are covered. If the hop count
is 6, there are 6 routers/nodes and the edges connecting them.

Flooding

Flooding is a simple and straightforward routing technique used in computer networks where a
data packet is sent to all possible nodes (or devices) within the network. This method ensures that
the packet reaches its destination but can lead to network congestion due to the large number of
copies sent.

Key Characteristics of Flooding:

• No Prior Knowledge: Flooding does not require prior knowledge of the network topology.
Each node simply forwards the packet to all of its neighbors.

• Reliability: It is a reliable method for delivering packets, as the packet will reach its
destination even if there are changes in the network topology.

• Broadcasting: Flooding can be viewed as a form of broadcasting since packets are sent to
all nodes.

Advantages of Flooding:

• Simplicity: The algorithm is simple to implement and does not require complex routing
tables.

• Robustness: It is resilient to changes in the network, such as node failures.

• Guaranteed Delivery: Ensures that packets reach their destination.

Disadvantages of Flooding:

• Network Congestion: It can lead to excessive traffic and congestion due to multiple copies
of the same packet being sent.

• Inefficiency: Inefficient in larger networks, as it consumes bandwidth and processing


resources unnecessarily.

• Routing Loops: Without proper mechanisms to prevent loops, flooding can cause packets
to circulate indefinitely.

Types of Flooding

Flooding can be categorized into several types based on how packets are handled:

1. Simple Flooding:

o Every incoming packet is sent to all outgoing links except the one it arrived on.

o This method is straightforward but can lead to significant redundancy and


congestion.

2. Controlled Flooding:
o To reduce network congestion, controlled flooding limits the number of times a
packet can be forwarded.

o This is often achieved using techniques like:

▪ Time-to-Live (TTL): Each packet has a TTL value that decreases with each
hop. When the TTL reaches zero, the packet is discarded.

▪ Hop Count Limit: The packet is forwarded a specified number of times


(hops) before it is dropped.

3. Selective Flooding:

o Nodes make decisions about whether to forward packets based on certain criteria,
such as whether they are likely to be the destination or whether they have seen
the packet before.

o This approach helps to avoid unnecessary transmissions and reduces congestion.

Distance vector routing and link-state routing are two fundamental approaches used in routing
algorithms within the network layer

• Routers periodically send their routing tables to neighbours, updating them with any new
or changed routes.
• Upon receiving updates, routers adjust their own routing tables based on the information
received.
• The distance vector algorithm is based on the Bellman-Ford algorithm.

Link-state routing algorithms take a different approach by allowing routers to build a complete
topology of the network. Each router gathers information about its neighbours and the state of the
links (up or down) and shares this information with all other routers.

Example of Link-State Protocols

OSPF (Open Shortest Path First): A widely used link-state protocol that supports
hierarchical routing and is suitable for large and complex networks.

Advantages

• Faster Convergence: Changes in the network are reflected more quickly, reducing the risk
of routing loops.

• Efficient Use of Bandwidth: Only link state information is exchanged when there is a
change, reducing unnecessary traffic.

Disadvantages

• Complexity: More complex to implement and maintain compared to distance vector


protocols.
• Resource Intensive: Requires more memory and processing power to store and compute
the complete network topology.

In conclusion, distance vector routing is suitable for simpler, smaller networks where ease
of implementation is a priority, while link-state routing is better for larger and more
complex networks that require fast convergence and efficient routing based on a complete
view of the topology.

Broadcast routing is a method of sending data packets from a source node to all other nodes
within a specific network segment or across a larger network. In broadcast routing, the sender
transmits a packet that is received by all nodes in the network.

Direct Broadcast:

• In direct broadcast, a packet is sent to all nodes in a local network segment. For instance, a
packet sent to the broadcast address (e.g., 192.168.1.255) reaches all devices in that
subnet.

Advantages of Broadcast Routing

• Simplicity: Broadcasting simplifies the process of sending information to multiple nodes


without needing individual addressing or routing.

• Efficiency for Certain Tasks: Effective for tasks that require simultaneous information
dissemination, such as sending service announcements, discovery messages, or
synchronization signals.

Disadvantages of Broadcast Routing

• Network Congestion: Broadcasting can lead to congestion, especially in large networks, as


every node processes the broadcast packets.

• Inefficiency: It may waste bandwidth and processing power since all nodes receive the
packets, even those that do not need the information.

• Security Concerns: Broadcasts can potentially be exploited by malicious actors to spread


unwanted traffic or conduct attacks (e.g., broadcast storms, where excessive broadcasts
lead to network instability).

Multicast routing is a method used in computer networks to efficiently send data from a single
source to multiple destinations simultaneously. Unlike unicast (where data is sent from one sender
to one receiver) or broadcast (where data is sent to all nodes in a network), multicast allows for
targeted data transmission to a specific group of interested receivers.

Advantages of Multicast Routing


• Bandwidth Efficiency: Reduces the amount of redundant data being sent across the
network, as a single copy of data is transmitted to multiple receivers.

• Scalability: Supports a large number of receivers without significantly increasing network


load.

• Dynamic Membership: Hosts can easily join or leave multicast groups as needed.

Disadvantages of Multicast Routing

• Complexity: Implementing and managing multicast routing protocols can be more complex
than traditional unicast routing.

• Compatibility: Not all network infrastructure (especially older devices) supports multicast
routing, which can limit its deployment.

• Security Concerns: Multicast traffic can be more challenging to secure, as data is sent to
multiple recipients, potentially exposing it to unauthorized access.
IPv4 (Internet Protocol version 4) is one of the core protocols of the Internet Protocol Suite. It is
widely used to identify devices on a network through an addressing system. Here's a
comprehensive overview of IPv4, including its structure, functionality, and examples.

Overview of IPv4

1. Address Format:

o IPv4 addresses are 32-bit numbers, typically represented in decimal format as four
octets (8 bits each), separated by periods.

o For example: 192.168.1.1

2. Address Structure:

o An IPv4 address consists of two main components:

▪ Network Portion: Identifies the network.

▪ Host Portion: Identifies the specific device (host) on that network.

o The division between the network and host portions is determined by the subnet
mask.

3. Classes of IPv4 Addresses:

o Class A:

▪ Range: 0.0.0.0 to 127.255.255.255

▪ Default Subnet Mask: 255.0.0.0

▪ Designed for very large networks.

o Class B:

▪ Range: 128.0.0.0 to 191.255.255.255

▪ Default Subnet Mask: 255.255.0.0

▪ Designed for medium-sized networks.

o Class C:

▪ Range: 192.0.0.0 to 223.255.255.255

▪ Default Subnet Mask: 255.255.255.0

▪ Designed for small networks.

o Class D:

▪ Range: 224.0.0.0 to 239.255.255.255

▪ Used for multicast groups.

o Class E:

▪ Range: 240.0.0.0 to 255.255.255.255


▪ Reserved for experimental purposes.

IPv4 and IPv6 are both Internet Protocol versions used to identify devices on a network. They differ
in structure, capacity, and features. Here’s a comparison:

1. Address Size:

• IPv4: 32-bit address length, allowing approximately 4.3 billion unique addresses (2³²).

• IPv6: 128-bit address length, allowing a vastly larger number of unique addresses—
approximately 3.4 x 10³⁸ (2¹²⁸), which is more than enough for future scalability.

Address Exhaustion:

• IPv4: Due to its smaller address space, IPv4 addresses are nearing exhaustion, leading to
techniques like Network Address Translation (NAT) to extend the availability of addresses.

• IPv6: Designed to provide an almost limitless address space, effectively eliminating the
need for NAT.

4. Security:

• IPv4: Security features like IPsec (Internet Protocol Security) are optional and need to be
manually implemented.

• IPv6: IPsec is built into IPv6, making it mandatory for the protocol, thus enhancing the
security model.

5. Configuration:

• IPv4: Often requires manual configuration or relies on Dynamic Host Configuration


Protocol (DHCP) for automatic configuration.

• IPv6: Supports automatic configuration through stateless address autoconfiguration


(SLAAC)

6. NAT Usage:

• IPv4: Frequently uses NAT to mitigate address exhaustion, which can complicate direct
device-to-device communication.

• IPv6: Eliminates the need for NAT because of its large address space, allowing for direct
communication between devices.

Transition:

• IPv4: Still widely in use but faces limitations due to address shortages.
• IPv6: Being gradually adopted to replace IPv4, but IPv4 remains dominant due to
legacy systems and slow transition.

You might also like