Network Layer and Internetworking
Network Layer and Internetworking
Internetworking
Contents
Internetworking 7
Concatenated Virtual Circuits 10
Connectionless internetworking 12
Fragmentation 15
Firewall technology 19 1
OSI Network Layer
Application layer User application 1 ...
Encryption/ compression/ Choice of
Presentation layer decryption expansion syntax
4
Network Layer Service Types
Connection oriented - virtual circuit (VC) - supported
by the lower network layers (DLL):
– setup and release of the connection
16/1 – connection parameters negotiation
– sequenced delivery of packets
– receiver’s overflow prevented by flow control
– options:
• priority of delivery
• confirmation of delivery
– reliable
– unreliable (rare usage)
– Examples: most popular X.25
16/2
Connectionless oriented - datagrams exchange -
reliability issues (if present) supported by the transport
layer
– send/receive directives (confirmed/nonconfirmed services)
– independent packets’ (“datagrams”) delivery with full
destination address 5
– Examples: most popular IP (required when using TCP/IP)
Network Layer Technologies
Datagram Exchange
– Addressing: full source and destination address in each
datagram
– State information: not needed nor hold 5/2
– Routing: independent routing of the subsequent packets
– Node Failure effects: packets loss
– Congestion control: not typical, rarely applied
– Complexity: in transport layer (above the subnet!)
– Application: connectionless services but also connection
oriented
Virtual Circuit
– Addressing: short VC number in each packet
– State information: kept in the subnet table for each VC
– Routing: only during the VC setup
– Node Failure effects: VCs termination
– Congestion control: consists of and depends on buffering
– Complexity: in the network layer (in the subnet!) 6
– Application: connection oriented services
Internetworking - Terms
Internetworking - multinet structure including different types of
networks and protocols
Internetworking glossary:
– Communication network: a facility providing data transfer service among
stations attached to the network
5/33
Features:
• not-in-order delivery
13
Tunneling
• Tunneling is a technique for connection of two similar
5/38 networks through the arbitrary type[s] of intermediate
network[s]
• Data entities (datagrams, packets) of two ends are
packed together with their control information
(addressing, ordering, error control fields, etc.) into the
payload field of the intermediate network’ NL packets
• The original control information is not being interpret
anywhere in the intermediate network but in both ends
• Therefore, tunneling needs multiprotocol routers only on
the both ends of the “tunnel” where the original data
entities are constructed/restored
14
Fragmentation
• Fragmentation is the process of splitting of the data
structures into the entities that are suitable to transmit over
the various networks and the reverse process of restoring the
original structures out of the fragments.
• Fragmentation factors:
• Transmission method (bit error rate, multiplexing method, etc.)
• Operating system (read/write blocks of 0.5 kB)
• Protocols (packet length field limitation)
• Standardization
• Service discipline and resource sharing in the end stations and intermediate
systems (IS): routers, gateways (e.g. SJF “shortest job first”, RR “Round
Robin” etc.)
• Examples of payload size:
• ATM cell carries 48B
• IP packet carries 64kB
• Data packets are broken into fragments and each
fragment is sent in separate internet packet. 15
Fragmentation Methods
• Each network in the internet is bounded by gateways which
are the entry point and the output point of the packets
5/41a
18
19
20
21
22
23
24
25
26
27
28
29
30
31