Chap 4 network Flashcards
(77 cards)
Key Aspects of Network Layer
- Routing: to determine the best path for data packets.
- IP Addressing: to uniquely identify devices on a network.
- Fragmentation and Reassembly: fragment large packets into smaller ones at the source and reassembled at the destination.
- Error Handling: to detect and handle errors that may occur during data transmission.
-
Logical Addressing: for communication between devices.
1.** Packet Forwarding:** to select the next-hop router or outgoing interface. - Internet Protocol (IP): responsible for addressing, routing, and fragmenting/reassembling packets.
-
Virtual Private Networks (VPNs): to encrypt and encapsulate data packets for secure transmission.
1.** Quality of Service (QoS):** to ensure critical applications get sufficient network resources and bandwidth for optimal performance.
1.** Tunneling:** to encapsulate one protocol’s packets within another protocol’s packets for transmission across an intermediary network
network layer and role
The Network Layer is the third layer of the OSI model.
*
It plays a crucial role in computer networks by facilitating communication and routing data between different networks.
*
It enables the Internet and other interconnected networks to function effectively.
Routing Algorithm
Algorithms used by routers to determine the best path for data packets to travel.
*
Consider factors like:
- ◦Network topology (layout)
- ◦Traffic congestion
- ◦Delay (latency)
- ◦Cost (bandwidth)
Goal: Efficiently route data to its destination.
*
Categories include Static Routing and Dynamic Routing
Static Routing
Manually configured paths for data packets.
*
Simple but inflexible, requires manual updates for network changes.
*
Each entry specifies:
- ◦Destination network: The network to which the route applies.
- ◦Next hop: The next router along the path.
- ◦(Optional) Administrative distance: A metric influencing route selection
Advantages of Static Routing
Simple and easy to implement: suitable for small networks or those with clearly defined routing requirements.
*
Predictable and reliable:
*
Enhanced security: tighter control over network access, restricting unauthorized traffic from entering specific areas
Limitations of Static Routing
Scalability limitations: As a network changes, manually configuring static routes on every device becomes increasingly complex and time-consuming.
*
Lack of adaptability:
Increased maintenance overhead: .
When to Use Static Routing
Small, stable networks: patterns are well-defined and unlikely to change frequently.
*
Specific control needed: want to manually define allowed routes.
*
Limited resources:
Dynamic Routing
Adapts to network changes automatically.
More complex but offers greater flexibility and efficiency.
- Employ algorithms to discover and update network paths.
- Rely on information exchange between routers.
Main types:
- Distance Vector Routing (e.g., RIP)
- Link State Routing (e.g., OSPF)
- Hybrid Routing (combines elements of both)
Distance Vector Routing
Routers exchange information about the “distance” (number of hops) to reach specific destinations with neighboring routers.
*
Simple and efficient, but may not always find the optimal path.
*
Example: RIP (Routing Information Protocol)
Link State Routing
Routers share information about the entire network topology with all other routers.
*
Can discover the optimal path, but requires more processing power and bandwidth.
*
Example: OSPF (Open Shortest Path First)
Benefits of Dynamic Routing
- scalability:
- Improved Efficiency:
- Reduced Administrative Overhead:
- Increased Reliability:
Limitations of Dynamic Routing
- Increased network overhead.
- Complexity of configuration and management.
- Convergence time.
- Security concerns.
- Propagation of routing information.
- Impact of route flapping.
- Vendor interoperability issues
Routing Information Protocol (RIP)
A distance vector routing protocol.
Routers exchange information about the “distance” (number of hops) to reach specific destinations.
- Simple and efficient, suitable for small to medium-sized networks.
- Two versions: RIPv1 and RIPv2
Two Main Versions of Routing Info Protocol
RIPv1:
* This is the original version of RIP.
* It utilizes classful routing, which can lead to inefficiencies in networks with varying subnet sizes.
* Lacks certain security features.
RIPv2:
* This version offers several improvements over RIPv1.
* Includes support for classless routing, which enables efficient routing across diverse network configurations.
* Introduces route tagging for better handling of different types of traffic.
* Provides authentication mechanisms to enhance security
RIP Working (Advertisement, Routing Updates, Routing Table Updates, Convergence)
Advertisement: Each router periodically broadcasts its routing table information to neighboring routers through RIP updates.
Routing Updates: These updates include details like:
1. Destination network address
1. Next hop router towards that network
1. Distance (number of hops) required to reach the destination
Routing Table Updates: Upon receiving RIP updates from neighboring routers, each router incorporates the information into its own routing table. The router selects the path with the lowest hop count for each destination network.
*
Convergence: Through this process of information exchange and table updates, the network eventually converges to a loop-free routing path, ensuring efficient and reliable data flow
RIP Advantages
- Simple and easy to configure:
- Efficient for small to medium-sized networks:
- Low resource consumption
- Improved security (RIPv2):
Bellman-Ford Algorithm
Finds the shortest paths from a single source vertex to all other reachable vertices in a graph.
- Handles graphs with negative edge weights
- Iterative approach involving repeated relaxation steps to gradually refine the path estimations and eventually reach the optimal solution
Bellman-Ford Working Initialization
The algorithm begins by assigning an initial distance of positive infinity to all vertices in the graph except the source vertex.
*
The source vertex is typically assigned a distance of 0, signifying its starting point.
Bellman-Ford Working Relaxation
The core operation of the algorithm lies in the relaxation step.
*
This step iterates through each edge in the graph, examining the potential for a shorter path.
*
For each edge connecting vertex u to vertex v, the algorithm checks whether the total distance from the source vertex to v through vertex u (distance(source) + weight(u, v)) is shorter than the currently known distance of v.
*
If this condition is true, the distance of v is updated to reflect the shorter path, and the predecessor of v is also updated to point to vertex u (as u becomes the preceding vertex in the newly discovered shorter path)
Bellman-Ford Working Iterations
The relaxation step is repeated V-1 times, where V represents the total number of vertices in the graph.
*
This repetitive process ensures that the algorithm has sufficient opportunities to discover and update paths throughout the graph, eventually converging to the optimal solution
Bellman-Ford Applications
- Network routing: Finding the shortest paths for data packets to travel across network connections.
- Logistics: Determining the most efficient routes for transportation and delivery services.
- Financial modeling: Calculating the minimum cost paths in financial networks with weighted edges representing risks or benefits.
- Geographic information systems (GIS): Identifying the shortest routes for navigation within a map network
Key Aspects of Network Layer (Quality of Service (QoS): )
to ensure applications get sufficient network resources and bandwidth for optimal performance.
Key Aspects of Network Layer (tunneling)
: to encapsulate one protocol’s packets within another protocol’s packets for transmission across an intermediary network
Key Aspects of Network Layer (VPN)
to encrypt and encapsulate data packets for secure transmission.