chapter 5 osi network layer modified by profs. chen and cappellino
Post on 21-Dec-2015
221 views
TRANSCRIPT
Objectives The Network layer encapsulation allows the Transport
layer contents to be passed to the destination within a network or on another network entirely.
Communication between networks is facilitated by a process called routing.
Upon completion of this chapter, you will be able to: Identify the role of the Network layer as it describes
communication from one end device to another end device. Examine the most common Network layer protocol, Internet
Protocol (IP), and its features for providing connectionless and best-effort service.
Understand the principles used to guide the division, or grouping, of devices into networks.
Understand the hierarchical addressing of devices and how this allows communication between networks.
Understand the fundamentals of routes, next-hop addresses, and packet forwarding to a destination network.
Network Layer – Communication from Host to Host Transport layer (OSI Layer 4), which manages
the data transport between the processes running on each end host
VS Network layer (OSI Layer 3) protocols ____
_______________ and ___________ used to ____________ from one host to another host.
Network layer doesn’t care what data it is actually caring
To accomplish this end-to-end transport, the Network layer uses 4 basic processes:
1. ______________________2. ______________________3. ______________________4. ______________________
Communication from Host to Host1. Addressing
Both end devices must have _____________________. device AKA ___________________________
2. EncapsulationRecall: Network layer PDU is call what?As the data travels down the OSI from the source host, the Network layer (L3) receives the Transport layer (L4) PDU –AKA…
_______________________________________________
Among other info, the Packet contains two addresses: The address of the host _______________________ known as
the _____________________________________________ The address of the _________ host is called _______________.
Communication from Host to Host
3. RoutingSource and destination hosts are often not connected to the same
network. Network layer provides services to direct these packets to their
destination host. _____________________________________________, known
as __________________, en route to a ___________________ Each router (network) that a packet passes through is called a _____.
The router ____________________________ and direct packets toward their destination.
Known as _____________________________
4. DecapsulationFinally, the packet arrives at the destination host and is processed
at the Network Layer. The __________________ by the Network layer and __________
________________________________________________
Network Layer Protocols Protocols implemented at the Network layer
that carry user data include:Internet Protocol version 4 (___________)Internet Protocol version 6 (____________)Novell Internetwork Packet Exchange (______)AppleTalk
The Internet Protocol (____ and IPv6) is the __________________________ data carrying protocol and will be the focus of this course.
IP V4 Protocol- most widely used… Internet Protocol (IP) is a ____________________ IPv4 basic characteristics:
____________________ - No connection is established before sending data packets.
__________________________________ - No overhead is used to guarantee packet delivery.
_____________________________ - Operates independently of the medium carrying the data.
More to come on these…
FYI: IP version 6 (IPv6) is developed and being implemented in some areas.
IPv6 will operate alongside IPv4 and may replace it in the future.
IP V4 - Connectionless Service In Connectionless data communications IP
packets are __________________________ ____________________ that they are coming.
IP does ________________: ___________________________________ to establish an end-to-end connection,
________________________________ to maintain the connection.
With connectionless service, packets __________ at the destination _______________________.
upper layer services will have to resolve any issues.
IP V4 - Best Effort (unreliable)
Since protocols at other layers can manage reliability (for example, TCP of the TCP/IP protocol suite), IP is allowed to function very efficiently at the Network layer.
makes IP more _______________________________ for _________________________________.
IP packet header does not include fields required for reliable data delivery and so therefore is an unreliable protocol
Unreliable meaning IP does not have the capability to manage, and recover from, undelivered or corrupt packets.
____________________________ of packet delivery. ____________________________ for data. _____________________________________________
IP V4 - Media Independent Network layer is ___________________________
________________________________ IP packet can be communicated electrically over
cable, via light waves over fiber, or wirelessly as radio signals.
Data Link layer is concerned with transmission over the communications medium.
One major characteristic of the media that the _________________________________:
The _________________________________ ________________________________
Known as: Maximum Transmission Unit (_______). The Data Link layer passes the MTU to the Network
layer. The Network layer then determines how large to
create the packets. A ____________________________________
when forwarding it from one media to another media if a smaller MTU is required.
This process is called ______________________ or fragmentation.
Encapsulating the Transport layer Segment IPv4 encapsulates, the Transport
layer segmentThe process of encapsulating data by layer enables the _________ ____________________________ ___________________________.
_____________ - remains ______________________ during the Network layer processes.
Routers can implement different Network layer protocols concurrently
_________ only ___________ with the ________________________ that encapsulates the segment.
IPv4 Packet
Red square indicates the HEADER portion of the
packet
We will discuss a few field- refer to the text or curriculum for details on all fields
IP V4 Packet Header fields _____________________ (32 bits)
represents the source Network layer host address.
_____________________ (32 bits)represents the destination Network layer host address.
______________________ (8 bits)Indicates the ____________________________
The _____________________________________ Typically- initially set to 123 seconds Value is ________________ at each hop When the value becomes zero, the router discards the packet Assures packets don’t loop around indefinitely between routers
causing a routing loop.
Neat TTL tidbit…
Shows # of hops (TTL) for a packet of a particular type of OS running on a particular
processor or platform
IP V4 Packet Header ________________ (8 bits)
Indicates the data __________________ that the packet is ___________________________.
Example values are: 01 ICMP; 06 TCP; 17 UDP _____________________________ (8 bits)
The field is used to ___________________________. This value enables router to give priority to certain traffic
Example: Telephony voice data might be considered high priority packets
_____________________________ (13 bits)If a packet needs to be fragmented, the fragment offset field _______________________________________ ___________ in the reconstruction at the destination
Typically set to 0 indicating there is no offset For additional field see curriculum- we have
discussed the key ones…
Networks – Separating Hosts into Common Groups
As the number of hosts on the network grows, more planning is required to manage and address the network.
It is more practical and manageable to ________ ________________________________.
These smaller networks are often called __________ or ______________________.
Networks can be grouped based on three common factors that include:
1. _________________________________ Grouping hosts at the same location into separate networks can
improve network management and operation.Continued on next slide…
Separating Hosts into Common Groups cont…
2. ______________________________Users who have ______________ typically
use common software, tools, and access common hardware
We can often reduce the traffic by placing the ____________ to support the users in the ________________________________
Users using bandwidth intensive apps should be separated from other users
3. ___________________________________________________________
___________ and devices based on the need for those resources
Ownership of a resource could be based on a company or part of a company or department
Why Separate Hosts into Networks (subnets)?
Improve Performance Increase SecurityAddress Management issues
More to come on all of these…
Improve Performance A ______________________________
__________________________ due to increased data traffic as well as increased control and management traffic
An increase in control traffic is often due to _________________________
A broadcast is a message _______________ ____________________________
Receiving host processing excess broadcast traffic will cause a degradation in it’s performance
____________________ generate ________ ______________________________
_________________________ to enable data communication on networks.
Broadcasts __________________, is known as a _____________________________
_____________________ also _______ ____________________________
Increase Security The Internet has grown as businesses and
organizations have developed their own IP networks that link to it.
Dividing networks based on ownership means that _________________________________ ___________________________________________________________________.
Same security concept applies within a corporate network
Dividing a network into subnets based on user access is a means ___________________________ ____________________________________________________________________________________
Security between networks is _____________ by devices such as a router or ____________ appliance
Address Management Issues _________________________________
_________________________________ Dividing large networks so that hosts who
need to communicate are grouped together allows host to know or easily learn the Layer two address of other hosts in that subnet
Increases efficiency For ____________________________,
the hosts only need to ______________ _________________, to which they send packets for all other destinations addresses.
This intermediary device is called a ________ and is generally a __________________________ __________________________________________
Hierarchical Addressing
Network layer addressing schemes are hierarchical.Enables communication between networks and over the Internet.
What is an example of a hierarchical addressing scheme? Using hierarchical addressing means that the __________
_____________________________________________________________________________
The _______________________ of the address indicates the ________________________________________________
Routers forward packets between networks by referring only to the part of the Network layer address that is required to direct the packet toward the destination network.
By the time the packet arrives at the destination host network, the whole network layer address of the destination host will have been used to deliver the packet.
____________________________ can be created if large networks need be ______________________________
Address would be: _____________________________________
More to come on next slide…
Hierarchical Addressing cont…
Logical 32-bit IPv4 addressAre _________________________________Each octet is converted to its decimal value 4 decimal values separated by a dot (period).For example - 192.168.18.57
The IPv4 address is hierarchical and is made up of two parts (three parts when subnetted).
The ________ part identifies the ____________ and the __________ part identifies a _________________. In this example, the first three octets, (192.168.18), can
identify the network portion of the address, and the last octet, (57) identifies the host.
In a subnetted address: first part is network, second is subnet, third is host
In subnetted network, the ____________________ _________________________________ of the address.
These borrowed host bits represent the different subnetworks within the range of the original network.
Hierarchical Addressing cont…
The number of bits of an address used as the network (and subnet) portion is called the _______________________
For example if a network uses 24 bits to express the network portion of an address the _______________ _____________________________-
In the devices in an IPv4 network, a separate 32-bit number called a _______________________ _________________________________-
________________ the prefix length or subnet mask enables the ________________________________.
Chapter 6 in this course will cover IPv4 network addressing and subnetworking in detail.
Support communication Outside our Network _____________ a local area network or a
_________________, _______________ _______________________________________________________ (router).
When a host needs to communicate with a network outside the local area network, the router connected to our local area network or subnet, acts as a gateway
The _________________________________ __________________________________
_______________ is the _________________ ___________________ that is connected to the same network as the host.
The router also needs a _________ that defines ______________________ next. This is called the ___________________
Carrying Data End to End via IP Packets If communication is between hosts on two
different networks The local network delivers the packet from the
_______________________________The router ________________________ of
the packet _________ address and forwards the packet to the appropriate interface.
If the destination network is (NOW) ________ ______________ to this router, the packet is _______________________________
If the destination network is _____________ ___________________, the packet is forwarded on to a second router- __________
The packet forwarding then becomes the responsibility of this second router.
This continues until the destination is reached or the max. number of hops is reached
At each hop, the forwarding decisions are based on the information in the IP packet header.
________________________________________ _____________________________________
A Gateway – The way out of Our Network
The gateway, also known as the _________________, is needed to _____________________________________
This gateway is a _________________ connected to the local network.
The gateway interface has a ______________________ that ______________________________________________
Default Gateway- configured on a hostBoth the host IPv4 address and the gateway address must have
the same network (and subnet, if used) portion of their respective addresses.
Confirming the GatewayHost IP address, default gateway etc. can be viewed by issuing
the ipconfig or _______________ command at the command line of a Windows computer.
The ______________ command used on a Linux or UNIX host
A Gateway – The way out of Our Network A ___________________
____________________________________________ for each packet that arrives at the gateway interface.
This forwarding process is referred to as ____________
If a route to a destination ____________________, the packet cannot be forwarded and is _________
Router uses a routing table to determine next hop…
A Route – The Path to a Network The ___________ stores ________________
__________________________________Connected networks are directly attached to
one of the router interfaces. These interfaces are the gateways for the hosts on
different local networks. ____________________ can be __________
configured by the network admin. or _________ ____________________________________
Routes in a routing table have three main features:
_________________________________________________________________________________________
______________________________________________________________________
The _____________________________ is used to forward a packet when the destination network is not represented by any other route in the routing table.
Note: The routing process and the role of metrics are the subject of a later course and will be covered in detail there.
Routing Table Entries- a closer look A _________ in the routing table could refer to a
_________________________________________________________________
When forwarding a packet, the ___________ __________________________________
EXAMPLE: As shown in the figure, if a packet arrives at a router with the destination address of 10.1.1.55, the router forwards the packet to a next-hop router associated with a route to network 10.1.1.0.
If a route to 10.1.1.0 is not listed on the routing, but a route to 10.1.0.0 is available, the packet is forwarded to the next-hop router for that network.
Therefore, the precedence of route selection for the packet going to 10.1.1.55 would be:
1. 10.1.1.02. 10.1.0.03. 10.0.0.04. 0.0.0.0 (Default route if configured)5. Dropped
See next slide…
Default Route AKA __________________
A __________________ is a route that ______________________________
All or any is denoted by the address _______The default route is used to _____________ for which there is _____________________ for the destination network.
A Route – Host Routing Table ______ also require a _______________ to
ensure that Network layer packets created by that host, are directed to the correct destination network.
The host routing table is _________________ by the ____________________________________ ___________________________
Recall: the routing table in a _______ contains both _______________________
Local routing table info from a computer can be examined at the command line by issuing the _______________________ commands.
You can use the following options for the route command to modify the routing table contents:
route ADD route DELETE route CHANGE
The Next-Hop – Where the Packet Goes Next
A _____________________ of the device that will ____________________________
Next-hop for a host on the network, will be the ______ ______________________ (default gateway)
Next-hop for a router is the __________________ that will process the packet
In the routing table of a router, each route lists a next-hop for each destination address that is encompassed by the route.
__________________________________________________ because they are directly cabled to that router
Some _________________________________ indicating there are multiple paths to the same destination network.
Packet Forwarding – Moving toward its Destination A router will do one of three things with a packet it
receives:______________________________________________________________________________________________ if…
No default route is programmed OR The destination network address doesn’t exist
Packet ExaminationPackets that arrive at a router's interfaces are
encapsulated as a Data Link layer (Layer 2) PDU. What s the special name for the PDU at L2?
The ____________________________ so that the packet and destination IP address can be examined.
Next Hop SelectionDestination (IP) address in a packet is examined and
the routing table is referenced If the destination network is ______________ to the
router, the packet is first _______________________ protocol then ______________________ to which that network is connected.
Otherwise, on to the next-hop router or dropped
Packet Forwarding – Using the Default Route Review: As shown in the figure, if the
routing table does not contain a more specific route entry for an arriving packet, the packet is forwarded to the interface indicated by a default route, if one exists.
This process may occur a number of times until the packet reaches its destination network.
Default routes are important: It is not possible for all routers to have a route
to every possible network on the Internet. ____________________________________
______________________ at a router that has a specific route to the destination network.
Sees the default route (Gateway of last resort)
Routing Protocols – Sharing the Routes
Recall: route information within a routing table can be manually configured on the router or learned dynamically from other routers in the same internetwork.
For accurate routing decisions, the _____________ _______________________________________________________________ that the router can access.
Out-of-date routing information means that packets may not be forwarded to the most appropriate next-hop,
Two types of routing________ Routing_________ Routing
More to come on both…
Static Routing ______________________________________ to remote
networks can be _________________ on the router. This is known as static routing. Upside- ________________________________A _______________________________________________
If the router is connected to a number of other routers, knowledge of the internetworking structure is required for _________________________________
If the internetwork structure changes or if new networks become available, these changes ________________________________ ______________________________ that is running static routing
What do you think will happen if timely manual updating does not occur?
Must be manually configured
Dynamic Routing The administrative maintenance involved
and manual up-dating needed in Static routing makes it an undesirable routing option
Routing protocols are the answer:Set of rules by which ___________________
____________________________________ When routers become aware of changes to the
network, the information is automatically passed on to other routers.
When a router _______________________ __________________________________________________________________ and, in turn, passes the information to other routers.
Common routing protocols are:Routing Information Protocol (_________)Enhanced Interior Gateway Routing Protocol
(________________)Open Shortest Path First (___________)
Dynamic Routing cont…
Costs involved in routing protocols First, the ________________________________ ___________________________ that consumes network bandwidth.
Second, _______________________________ by protocols such as EIGRP and OSPF- involves ________ ___________________________________
In many internetworks, a _______________ of static, dynamic, and default routes are used to provide the necessary routes.
Configuration of routing protocols covered extensively in
later courses…