RS-2011-2012-v0.1-15 feb -2012

download RS-2011-2012-v0.1-15 feb -2012

of 82

Transcript of RS-2011-2012-v0.1-15 feb -2012

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    1/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 2

    Retele si Servicii

    Sem II licenta spec. RST

    (English version)

    Network and Services

    E. Borcoci, UPB

    2011-2012

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    2/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 3

    CONTENTS

    1 INTRODUCTION-ARCHITECTURE REVISION 5

    1.1 NETWORKS LAYERED ARCHITECTURES 51.1.1 General Principles and Functional Layers 51.1.2 OSI Reference Model 61.1.3 Real Stack Examples. Incomplete stacks 9

    1.1.3.1 TCP/IP Stack 91.1.3.2 IEEE 802.x standards for LAN, MAN 131.1.3.3 Signalling System No.7 131.1.3.4 MPLS architecture 14

    1.1.3.4.1 MPLS IP stack 141.2 MULTIPLE PLANES ARCHITECTURES 15

    1.2.1 Principles 151.2.2 Signalling Issues 161.2.3 Next Generation Networks Architecture- high level view 17

    1.3 BUSINESS MODELS FOR (MULTIMEDIA)COMMUNICATION ARCHITECTURES 201.3.1.1 Customers and Users 201.3.1.2 Providers (PR) 20

    1.3.2 Service Level Agreements/Specifications (SLA/SLS) 221.4 EXAMPLES OF MULTIPLE PLANE ARCHITECTURES 241.4.1 IEEE 802.16 multi-plane stack 241.4.2 Generic Example of a multi-plane architecture 261.4.3 Architectural stack for wireless heterogeneous mesh network 261.4.4 Control Plane in GSM (2G) 28

    2 INTERCONNECTION- REVISION 29

    2.1 MODURI DE LUCRU CU IFR CONEXIUNE CO/CL 292.2 CERINELE UNUI SERVICIU DE INTERCONECTARE (LA NIVEL TREI) 302.3 MODUL DE LUCRU CO( CONEXIUNE LA NIVEL REEA) 312.4 MODUL DE LUCRU CL (FARA CONEXIUNE LA NIVEL REEA) 312.5 INTERCONECTAREA DE TIP PUNTE (BRIDGE APPROACH) 31

    2.6 EXEMPLE DE INTERCONECTRI 322.6.1 Interconectarea de reele LAN prin puni (B) 342.6.1.1 Puni transparente (Transparent Bridges- TB) 362.6.1.2 Punti cu rutare de tip sursa 36

    3 ROUTING ALGORITHMS AND PROTOCOLS 36

    3.1 GENERALITATI 363.2 ALGORITMI DE CAUTARE A CELUI MAI SCURT DRUM 40

    3.2.1 Algoritmul Dijkstra (centralizat) 413.2.2 Algoritmul Ford (Fulkerson) 43

    3.3 IPROUTING PROTOCOLS 473.3.1 Internet Protocol reminder 473.3.2 Principles of IP routing 49

    3.3.3 Network hierarchies 503.3.4 Address Resolution Protocol (ARP), Reverse ARPRARP 533.3.5 Interior Gateway Protocols 55

    3.3.5.1 Routing Internet Protocol (RIP) 553.3.5.2 Ad hoc On-Demand Distance Vector (AODV) 58

    3.3.5.2.1 Open Shortest Path First (OSPF) 633.3.6 Border Gateway Protocol (BGP) 68

    3.4 IPV6 703.5 ICMPV6 73

    4 SERVICES 73

    4.1 REFERENCES 744.2

    GENERAL LIST OF ACRONYMS 74

    5 ANNEX 1 81

    5.1 ETHERNET FRAME FORMATS: 81

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    3/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 4

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    4/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 5

    1 INTRODUCTION-ARCHITECTURE REVISION

    1.1 Networks Layered Architectures

    1.1.1 General Principles and Functional LayersArchitectural Model : set of functions and relations between them, independent of

    implementation

    Objective:

    management of high complexity: (divide et impera) - principle

    interoperability among different products

    Tools: definition of functional layers + interfaces

    Network element: terminal, switching node, multiplexer, router, etc. = hierarchical set of

    levels

    -tasks:

    - information transport (lower layers)

    - high level processing of information (upper layers)

    Ta Tb

    Processing

    functions

    Network

    functions

    Appl.

    processes

    Processing

    functions

    Network

    functions

    Appl.

    processes

    C1

    C2

    N2

    N1

    Ta Tb

    Network(s)

    User

    Protocols

    Physical medium

    Upper layers

    protocols

    Complexity/

    Intelligence Future Internet?

    (more intelligent networks)

    E.g. Content aware networks

    a b

    Figure 1-1 Simplified architectural model for communication

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    5/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 6

    a. Network and terminals b.Two level model : Ta, Tb = terminals

    -application processes ( usually resident in Ta, Tb - they communicate through a set of rules

    (protocol) at user level:

    Protocols at different levels between:

    - application processes

    - higher layers processing functions (higher layers)

    - network transport functions (lower layers)

    - set of layers = protocol stack

    Layering principle is extended inside each of the two layer

    1.1.2 OSI Reference Model

    Classical architectural mode (1970-80)

    ISO (International Standardization Organization): OSI - RM ("Open System Interconnection -Reference Model")for layered architecture networks

    OSI RM defines: architectural and functional principles for open systems able to beinterconnected no matter the equipment manufacturer

    - real world stack can be different of OSI-RM, but the same principles are applied

    - OSI, TCP/IP modelone plane architectural model

    Usage examples of layered architecture networks use:

    - industry, administration, business, health, military, education, research, etc.

    - data and multimedia networks: local (LAN), metropolitan (MAN) wide area WAN (typical

    example: INTERNET, Intranets, Extranets)

    -digital telecommunication wide area networks:

    - fixed communications: ISDN, BISDN, GSM ( e.g.Signalling System No.7 SS7used to control the digital telecom networks)

    - networks for mobile communications 2G, 3G,

    - Integrated (convergent) networks

    - TCP/IP based, 3G, 4G- for fixed or mobile communications

    - Next Generation Networks ( ITU-T) ~ 1995-2000

    - Future Internet: evolution/revolution for current Internet ( > 2005)

    Fundamental Architectural Principles:

    - layer N offers to N+1 a service set

    - that can be accessed through interfaces (SAP = Service Access Point)

    - service implementation is achieved by the protocol of the lower layer

    -service primitives - information transport between adjacent layers

    - protocols- specify the rules of comm between two peer entities

    Criteria for function distribution on layers :

    - homogeneity inside a layer

    -minimal interactions between layers

    - small number of layers

    Note about word service usage

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    6/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 7

    - very general term used in a lot of contexts

    - much confusion out of this

    - OSI model defines very precise semantic for service- Adopting such semantic we distinguish among:

    o Low level services , e.g:

    L2 service = connectivity service between two nodes L3 service = connectivity service over a network domain L4 service = E2E connectivity service

    o High level services , e.g:

    data oriented services: FTP, e-mail, web access to info, transactional

    services

    multimedia-oriented services: VoIP, video conf, A/Vstreaming, DVB,IPTV, etc.

    Curent trends:

    -traditionally we want/have low coupling between layers

    - today this principle is no longer considered good by all professional communities

    - Cross-layer optimisation especially in wireless on L1-L3

    - Content aware networks and Network Aware Applications

    - pros and cons this approachstill open issue

    Base layers (1-3) ( network access and information transfer through network(s)

    Upper layers (4-7)

    - higher layer processing functions (closer to user application processes)

    - usuallylayers 4-7 belong to terminals (endto-end ( E2E) protocols independent of:

    - Network technology, Number of networks, Fixed or mobile mode

    Important Notes:

    o the same function name can be encountered on different layers but with different

    semantics

    o Not all functions listed must be present in a layer (large variety in practical stacks)

    Layer 1 (Physical- PHY) ; Layer 2 (Data Link Layer - DL ); Layer 3 (Network) :

    Layer 4 (Transport T); Layer 5 (Terminal SessionS); Layer 6 (Presentation);

    Layer 7 (Applicaion) :

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    7/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 8

    Local Processes

    Communication

    Processes

    Ta

    7 Application

    6 Presentation

    5 Session

    4 Transport

    3 Network

    2 Data Link

    1 Physical

    Local Processes

    Communication

    Processes

    Tb

    7 Application

    6 Presentation

    5 Session

    4 Transport

    3 Retea

    2 Data Link

    1 Physical

    Different level

    Protocols

    3 Network

    2 Data Link

    1 Physical

    Transport Protocol

    Network node

    Physical transmission

    medium

    User Entities

    Service Access

    Point

    Service Primitives

    Protocol Data

    Units (PDU)

    Information flow circulation

    through layers

    E2E

    Protocols

    Network

    Transport

    Protocols

    Higher

    Layer

    Protocols

    Network

    Acces

    Protocols

    Network

    environment

    OSI Environment

    Real systems environment

    Figure 1-2 OSI Reference Model

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    8/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 9

    Figure 1-3 Internetworking example in OSI Model

    Note : Service Provider = Transport Service Provider

    1.1.3 Real Stack Examples. Incomplete stacks

    1.1.3.1 TCP/IP Stack

    - TCP/IP stackdifferent from OSI

    - much greater success (history, simpler stack, market driven)

    - WWW/Internet strengthened the usage of TCP/IP stack

    Important note:

    o Advances in microelectronics and huge increase of perf/cost allowed to include the

    full TCP/IP stack in all terminals (including small mobile devices)

    o This naturally creates the posibility to integrate all kind of high level services based

    on TCP/IP stack

    o That is why TCP/IP ( called Internet is accepted today as a basis for fu ll networkand services integration

    Communication models:

    o Hierachy criterion

    Classic model: Client/server( asymmetric one)

    After 2000 Peer to peer (P2P) model

    Symmetric model

    huge expansion in last years ( ~70% of the total Internet traffic)

    o Time criterion

    Synchronous communication (usually r.t: VoIP, AVC, VoD, but also FTP,etc.)

    Asynchronous communication : e-mail, publish/subscribe

    o Mode to get information: push/pull

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    9/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 10

    - Original TCP/IP stack single architectural plain containing several protocols fordata transfer and control

    Application services

    Transport (TCP)

    Internetworking (IP)

    Subnetworks

    Figure 1-4 Simplified view of TCP/IP stack

    Application(communication between processes or

    applications on separate hosts)

    Telnet, FTP, E-mail,

    SNMP, etc

    Transport(end-to-end data transfer service reliable or unreliable)

    TCP, UDP

    Network layer( network resources mng.,

    routing the data to destination)

    IP, ICMP, IGMP,

    OSPF, etc.

    Data link(acces CO or CL to network layer)

    (LLC) + MAC

    Physical layer

    Figure 1-5 Simplified view of the TCP/IP protocol stack

    MIME

    BGP

    (*1)

    FTP

    Telnet HTTP SMTP RTCP

    TCP (Connection oriented)

    IP (Connectionless)

    (LLC)+MAC (e.g.IEEE 802.x), AAL+ATM,

    Physical Layer

    ARPRARP

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    10/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 11

    Video

    Voice

    RTP SNMP

    Multicast

    protocols RIP

    (*) BOOTP RSVP

    UDP (Connectionless)

    OSPF

    (*1)

    ICMP,

    IGMP(*2)

    IP (Connectionless)

    (LLC)+MAC (e.g IEEE 802.x) , AAL+ATM, etc

    Physical Layer

    ARP RARP

    Figure 1-6 Example of TCP/IP stack protocols

    (*1)they are not transport protocols but cooperate with IP

    MIMEMultipurpose Internet Mail Extensions

    BGPBorder Gateway Protocol

    HTTPHypertext Transfer Protocol

    SMTPSimple Mail Transfer Protocol

    SNMPSimple Network Management Protocol

    FTPFile Transfer protocol

    RTPReal Time Protocol

    ICMPInternet Control Messages Protocol

    IGMPInternet Group Management Protocol

    OSPFOpen Shortest Path First Protocol

    Transport:

    TCPTransmission Control Protocol (connection oriented -CO)

    UDPUser Datagram Protocol ( connectionless CL)

    Network: IPInternet Protocol + ICMP, IGMP, BGP, OSPF

    Data link Layer:

    LLCLogical Link Control + MAC- Medium acces Control

    Example: AALATM Adaptation Layer + ATMAsynchronous TransferMode

    Example: FTP, TCP, IP, (LLC) + MAC ( driver Ethernet)

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    11/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 12

    Multicasting:

    IGMPInternet Group Management Protocol ( v.1, v.2, v.3)

    Multicast routing protocols:

    DVMRPDistance Vector Multicast Routing Protocol

    PIM-DMProtocol Independent MulticastDense ModePIM-SMProtocol Independent MulticastSparse Mode

    CBTCore based Tree

    MOSPFMulticast OSPFmulticast extension of OSPF

    MBGPMulticast BGPextension of BGP to multicast

    Multicast transport protocols:

    RMTPReliable Multicast Transport Protocol

    SRMScalable Reliable Multicast Protocol

    MFTPMulticast File Transfer ProtocolPGMPretty Good Multicast

    Ping FTPTelnet

    Rlogin

    SMTP

    X

    Trace-

    route

    DNS

    TFTP

    BOOTP

    SNMP

    NFS+RPC

    User

    process

    UDPTCP

    IP

    IGMP

    ARP RARP

    ICMP

    (LLC) MAC

    Appl

    Transport

    Data link

    Network

    User

    processes

    Figure 1-7 Example of logical links between layers

    ARPAddress Resolution Protocol

    RARPReverse Address Resolution Protocol

    TFTPTrivial FTP, BOOTPBootstrap Protocol

    NFSNetwork File Server

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    12/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 13

    1.1.3.2 IEEE 802.x standards for LAN, MAN

    Figure 1-8 IEEE 802 LAN/MAN Standards- examples

    1.1.3.3 Signalling System No.7

    SS7:

    - datagram virtual network for digital circuit switching network ( ex. ISDN, GSM) control

    - Control plane for Telecom Digital Networkcontaining the signaling protocols

    Example for GSM - MSC:

    (MSC- Message Switching Centremain switch in GSM)- MTP 1-2-3subsystem for message transport (layers 1-3)

    - Layers 4-5-6 : void

    - signaling applications : TUP, ISUP, MAP, etc

    ISUP, TUP, MAP, TCAP

    MTP-1

    MTP-2

    MTP-3

    7

    4-6

    3

    2

    1

    Control Plane

    of Telecom

    Network

    SCCP

    Figure 1-9 Example of incomplete stack: SS7 signalling stack

    Signalling Connections Control Part (SCCP)optionally completes the L3 (CO mode for L3)

    - applications :

    TCAP -"Transaction Capabilities Application Part" - realizes a common general transaction service

    offered to other applications

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    13/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 14

    Transaction : communication of type query/response (suitable for low volume of information

    transfer)

    Examples of signalling applications :

    TUP - "Telephonic User Part"- telephonic call control

    ISUP - "ISDN User Part" - ISDN call control

    MAP - "Mobile Application Part"mobility control in GSM

    All these applications use the message transport part MTP1-3

    in CL mode ( if they work directly over MTP 3)

    in CO mode ( if they work directly over SCCP)

    1.1.3.4 MPLS architecture

    Packet Forwarding in IP Networks

    IP forwarding is done independently at every hop

    IP forwarding decision is made on:

    o

    Packet header, Routing algorithm output (routing table)

    o Note: Searching in routing table- time consuming operation done for every

    packet

    Each IP hop runs its own instance of the routing algorithm

    Each IP hop makes its own forwarding decisions

    Figure 1-10 IP routing example (Cisco Systems)

    MPLS ideas

    Packet forwarding is done based on label switching (not IP addresses, no search in the

    forwarding table of routers) Labels are shortallow indexed addressing- fast switching

    Labels are assigned when the packets enter into the network (edge)

    Assignment is result of classification at the ingress node in a MPLS domain (criteria:

    destination, VPN, QoS, TE, Multicast )

    Labels are added in frontof the IP packets

    1.1.3.4.1 MPLS IP stack

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    14/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 15

    Application

    Transport TCP, UDP

    Internet layer IP, ICMP, IGMP,OSPF, etc.

    MPLS sublayer

    Data link layer (LLC) + MAC

    Physical layer

    Figure 1-11 MPLS oriented IP stack

    IP-H TCP-H Application Data IP Datgram

    MPLS-H IP-H TCP-H Application Data Labelled IP

    Datagram

    LABEL EXP S TTL Header MPLS

    20 Bit 3 1 832 bit

    Figure 1-12 MPLS label adding

    1.2 Multiple Planes Architectures

    1.2.1 Principles

    Ongoing standardization : IETF, ITU-T ETSI, IEEE, 3GPP

    Telecom originated layered architectures: more than one architectural plane

    IETF (TCP/IP- Internet) stackoriginally only one plane

    Nowadays- recognized the need of defining several cooperating architectural planes

    Reasons: Real systems/networks deals with:

    - user data flow transfer

    - network resources ( paths, links, buffers, etc. ) should be controlled

    - short time scale, long time scale

    - high level services should be controlled (short and long time scale)

    Architectural Planes

    Data plane ( DPl)- transport of user data traffic directly:

    o Examples of functions: traffic classification, packet marking traffic policing, traffic

    shaping, buffer management, congestion avoidance, queuing and scheduling

    o transfer the user dataflows and accomplish the traffic control mechanisms to assure

    the desired level of QoS

    Control plane (CPl)

    o controls the pathways for user data traffic: e.g. Admission control, Routing, Resource

    reservation.

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    15/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 16

    o short term actions for resource and traffic engineering and control, including routing.

    In multi-domain environment theMPl and also CPl are logically divided in two sub-

    planes: inter-domain and intra-domain. This approach allows each domain to have its

    own management and control policies and mechanisms.

    Management plane (MPl)

    o the operation, administration, and management aspects of the resources and services

    to serve user data traffic: Monitoring, Management Policies (management based not

    on fixed configuration of network elements but on set of rules), Service

    Management, Service and network restoration.

    o long term actions related to resource and traffic management in order to assure the

    desired QoS levels for the users and also efficient utilization of the network resources

    Examples of early multiple plane architectures (DPl + CPl + MPl):

    ISDN , GSM, BISDN

    - reason: telecom design philosophy (user data have been seen long time ago - from the

    beginning of telecom systems as separate entities from signalling and management) data s

    TCP/IP :

    - Initially: mono-plane (data + control + management)

    - Currently it becomes multi-plane (DPl + CPl + MPl)

    New stacks- multiple plane: IEEE802.16, 3G, 4G

    1.2.2 Signalling Issues

    Signaling = actions performed in the control plane :

    -

    convey application (or network) performance requirements

    - reserve network resources across the network

    - discover routes

    - general control messages

    - QoS related signalling

    QoS signaling : in bandor out of band.

    In band

    - signalling info is part of the associated data traffic( typically presented in a particular header fieldof the data packets.(e.g., the TOS field in IPv4 as in DiffServ and 802.1p)

    - Performed in the data plane neither introduces additional traffic into the network nor incurs setup

    delay for the data traffic.

    - not suitable for resource reservation or QoS routing, which needs to be done a priori before data

    transmission

    - in-band signaling by definition is path-coupled (signaling nodes must be collocated with routers)

    Out of band

    - signalling info - carried by dedicated packets, separate from the associated data traffic. - introducesextra traffic into the network and incurs an overhead for delivering desired network performance

    it entails the use of a signaling protocol and further processing above the network layer, which tends

    to render slower responses than in-band signaling.

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    16/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 17

    - lends itself naturally to resource reservation or QoS routing.

    - depending on whether the signaling path is closely tied to the associated data path, signaling is path-

    coupledor decoupled

    Path-coupled

    - signaling nodes must be collocated with routers

    signaling messages - routed only through the nodes that are potentially on the data path.

    - advantage of reduced overall signaling processing cost (since it leverages network- layer routing

    tasks)

    - disadvantage of inflexibility in upgrading routers or in integrating control entities (e.g., policy

    servers) not on the data path (or nontraditional routing methods)

    If a path-coupled mechanism involves a signaling protocol, routers need to support the protocol and

    be able to process related signaling messages

    - Example of a path-coupled signaling protocol : RSVP

    Path-decoupled

    - signaling messages are routed through nodes that are not assumed to be on the data path

    only out-of-band signaling may be path-decoupled. (to date, most out-of-band QoS signaling schemes

    are path coupled.)

    - signaling nodes should be dedicated and separate from routers

    - advantage of flexibility in deploying and upgrading signaling nodes independent of routers or in

    integrating control entities not on the data path

    - disadvantage of added complexity and cost in overall processing and operational tasks.

    Example: Session Initiation Protocol for VoIP, videoconference, etc.

    Standardization Effort

    NSIS ( Next Step in Signalling)

    - Standards efforts underway specifically dealing with QoS signaling- e.g. IETFnsis working group

    - developing a flexible signaling framework with path-coupled QoS signaling as its initial major

    application

    - a QoS signaling protocol defined under the framework - expected to address the limitations of RSVP

    On path-decoupled signaling there seems not enough support in the IETF for a new project after

    some explorative discussion

    1.2.3 Next Generation Networks Architecture- high level view

    Standardization Players

    ATIS NGN FG: Alliance for Telecommunication Industry Solutions, Next Generation Networks

    Focus Group - USA

    ITU-T NGN FG: International Telecommunication Union (Telecom), Next Generation NetworksFocus Group

    ETSI TISPAN: European Telecommunications Standards Institute, Telecoms & Internet

    converged Services & Protocols for Advanced Networks

    3GPP: Third Generation Partnershipstandardization in Mobile 3G networks

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    17/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 18

    NGN

    packet-based network

    able to provide Telecommunication multiple services

    able to make use ofmultiple broadband,

    QoS-enabled transporttechnologies

    service-related functions are independent from underlying transport-related technologies.

    enables unfettered access for users to networks and to competing service providers and/or services

    of their choice.

    supports generalized mobility which will allow consistent and ubiquitous provision of services to

    users.

    Key requirements of an NGN Architecture

    Trust:Operator should be able to trust the network. User should be able to trust the operator

    Reliability: Users should find it reliable

    Availability: Network should always be available

    Quality: Able to control Quality of the Service

    Accountability: Determine usage of the Service

    Legal: Comply with laws in the local jurisdictions

    GeneralizedMobility support

    Note: Classical Internet cannot respond in very controllable manner to the above requirements

    NGN characteristics

    NGN: new telecommunications network for broadband fixed access

    facilitates convergence of networks and services

    enables different business models across access, core network and service domains

    it is an IP based network

    IETFSession Initiation Protocol (SIP) will be used for call & session control

    3GPP release 6 (2004) IMS will be the base for NGN IP Multimedia Subsystem

    enables any IP access to Operator IMS; from

    Mobile domain

    Home domain

    Enterprise domain

    enables service mobility

    enables interworking towards circuit switched networks

    maintains Service Operator control for IMS signaling & media traffic

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    18/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 19

    Transport Level

    Applications and

    Service Level

    Management

    Plane

    User (Data)

    Plane

    Control

    Plane

    INTERNET

    SCN

    Figure 1-13 NGN Architecture

    Design Principles

    Service is rendered in exchange for value

    o explicitly requested and explicitly stopped, providing a basis for charging

    o only delivered to authorized users

    o

    only saleable if QoS and security can be guaranteedNote : Traditional Internet does not offer this!

    Dedicated VoIP infrastructure is expensiveo Only a converged(packet) network that supports multiple services over one

    infrastructure can be commercially viable NGN will be deployed in an unbundled environment

    o Competition on service values other than price

    o Support for value-added applications

    Affordable multi-service architecture

    o Do not mix application and transport!

    Support service for roaming users

    o Service provided from HOME service provider

    o New Home Box concept

    End user as content consumer and/or content provider

    Service provider determines media route

    o Service may include in-band media events

    o Support for Lawful Intercept

    o

    Call Routing follows the money

    o QoS flows cost money so service providers will do least cost routing on it (providing

    QoS can be met)

    Technologies are transient:NGN is technology independent !

    Clear separation of Application/Services from Transport Services

    o Note that this concept is in discussion today!! Provide a modular architectural framework which is easy to introduce and extend.

    Use a meta-protocol to specify the technology and inter-working to all applicable protocols

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    19/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 20

    1.3 Business Models for (Multimedia) Communication Architectures

    1.3.1.1 Customers and Users

    Customer (CS) (may be a subscriber) :- entity, having legal ability to subscribe to QoS-based services offered byProviders

    (PR) orResellers (RS)

    - target recipients of QoS-based services: CS/PR or CS/RS interaction

    -

    Examples of CS: Householders, SMEs, large corporations, universities or public

    organisations

    Service Level Agreements (SLA)- concluded betrween CS and providers

    CS differentiation by : size , type of business, type of services required

    User (US)

    - entity (human or process) - named by a CS and appropriately identified by PR for

    actually requesting/accessing and using the QoS-based services cf. SLAs

    - USs are end-users of the services, they can only exist in association with a CS

    - may be associated with one or several CS using services according to the agreed

    SLAs of the respective CS. (e.g. Company = Customer, End User = employee)

    Note: In the current public internet, the majority of users are subscribers for Connectivity servicesonly and maybe for a small subset of high level services (e.g e-mail)

    - there is no SLA concluded for high level services quality; e.g for media A/V

    streaming, IPTV, etc.

    - best effort access to high level services is practised but with no guarantees

    1.3.1.2 Providers (PR)

    PR types :

    (High Level) Service Providers (SP) IP Network Providers (NP)

    Physical Connectivity Providers (PHYP) (or PHY infrastructure Providers)

    Resellers (RS)

    Content Providers (CP)

    Network Providers (NPs)

    - offer QoS-based plain IP connectivity services

    - own and administer an IP network infrastructure

    - may interact withAccess Network Providers'(ANP) or CS can be connected directly

    to NPs

    -

    Expanding the geographical span of NPs- Interconnected NPs - corresponding peering agreements

    - IP NPs differentiation: small ( e.g. for a city) , medium (region) and large ( e.g.

    continental)

    (High Level) Service Providers (SPs)

    - offer higher-level (possible QoS-based) services e.g. : e-mail, VoIP, VoD, IPTV,

    A/VC, etc.

    - owns or not an IP network infrastructure

    - administer a logical infrastructure to provision services (e.g. VoIP gateways, IP

    videoservers, content distribution servers)

    -

    may rely on the connectivity services offered by NPs (SPs Providers' interact withNPs following a customer-provider paradigm based on SLAs

    - expanding the geographical scope and augmenting the portfolio of the services

    offered SP may interact with each other

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    20/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 21

    - size : small, medium and large

    Physical Connectivity Providers (PHYP)

    - offer physical connectivity services between determined locations

    - services may also be offered in higher layers (layer-3 e.g. IP), ( but only between

    specific points)

    - distinguished by their target market:

    Facilities (Infrastructure) Providers (FP)

    Access Network Providers (AP) (could be seen as distinct stakeholders)

    FPs services - are mainly offered to IP NPs (link-layer connectivity , interconnect with their peers

    FPs differentiation : size of technology deployment means

    ANPs - connect CS premises equipment to the SPs or NPs equipment

    - own and administer appropriate infrastructure

    - may be differentiated by- technology (e.g. POTS, FR, ISDN, xDSL, WLAN, Ethernet, WiMAX, hybrid)

    - their deployment means and their size

    - may not be present as a distinct stakeholder in the chain of QoS-service delivery

    - may be distinct administrative domains, interacting at a business level with SPs /NPs and/or

    CSs

    Interactions between Providers

    - mainly governed by the legislations of the established legal telecom regulation framework

    - may follow a customer-provider and/or a consumer-producer paradigm on the basis of

    SLAs

    Reseller (RS)

    - intermediaries in offering the QoS-based services of the PRs to the CSs

    - offer market-penetration services (e.g. sales force, distribution/selling points) to PRs for

    promoting and selling their QoS-based services in the market

    - may promote the QoS-based services of the PRs either 'as they are' or with 'value-added',

    however adhering to the SLAs of the services as required by the 'Providers'

    - interact with :

    CSs on a customer-provider paradigm (SLA based)

    PRs based upon respective commercial agreements..

    Different types RSs:

    - according to whether they introduce value-added or not

    - their market penetration means

    - size ( # of of points of presence and/or sales force)

    RSs examples: Dealers, electronic/computers commercial chains, service portals

    Content Provider (CP)

    -

    an entity (organisation) gathering/creating, maintain, and distributing digitalinformation.

    - owns/operates hosts = source of downloadable content

    - might not own any networking infrastructure to deliver the content

    - content is offered to the customers or service providers.

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    21/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 22

    - can contain : Content Manager(CM); several Content Servers (CS

    New enties (in the perspective of Future Internet)

    Virtual Network Provider (VNP)

    - composes and configures and offer Virtual Network slices, i.e., a set of virtual

    resources at request of higher layers, as a consequence of its provisioning policy orduring self-healing operations

    - this approach avoids for the higher layers to establish direct relationships with

    infrastructure providers and to take care of inter-domain connections at physical

    layer.

    Virtual Network Operator (VNO)

    - manages and exploits the VNEt s provided by VNPs , on behalf of HLSPs or end

    users

    Note: the same organisational entity migh play the both roles :VNP and VNO

    1.3.2 Service Level Agreements/Specifications (SLA/SLS)

    SLA

    it is a contract : documented result of a negotiation between a customerand aprovider

    of a service that specifies the levels of availability, serviceability, performance,

    operation or other attributes of the transport service

    SLA contains technical and non-technical terms and conditions

    May be established offline or online (using negotiation oriented-protocols)

    Service Level Specification (SLS)

    It is a part of SLA SLS = set of technical parameters and their values, defining the service, offered by the provbider

    to the customer

    o e.g. service offered to a traffic stream by a network domain (e.g. Diffserv domain)

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    22/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 23

    (HIGH LEVEL)SERVICEPROVIDER 1

    USER

    RESELLER

    CUSTOMERIP NETWORK

    PROVIDER 1

    PHYSICALCONNECTIVITY

    PROVIDER 1

    PROVIDER/OPERATOR 1

    HIGH LEVEL

    SERVICEPROVIDER N

    IP NETWORK

    PROVIDER M

    PHYSICALCONNECTIVITY

    PROVIDER P

    . . . . .

    May be joinedwithin the sameentity

    . . . . .

    . . . . .

    Content

    Provider

    USER

    USER

    Figure 1-14 Generic IP Business Model (I) - and business relationships (SLA)

    Figure 1-15 Example: IP Business Models (II) - Hub model and Cascade model

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    23/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 24

    1.4 Examples of Multiple Plane Architectures

    1.4.1 IEEE 802.16 multi-plane stack

    IEEE 802.16 : PHY + MAC

    Multiple plane architecture: Data Plane(DPl), Control Plane (CPl), Management Plane (MPl)

    Figure 1-16 Basic IEEE 802.16 multi-plane protocol stack

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    24/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 25

    Figure 1-17 (IEEE 802.16g-05/008r2, December 2005)

    Figure 1-18 Relation IEEE802.16 vs. WiMAX NWG

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    25/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 26

    1.4.2 Generic Example of a multi-plane architecture

    Stratum:Applicatio

    n

    Stratum:Transport

    Data

    Plane

    ApplicationApplication Data flow-user

    Inter-domainResources and traffic Mng.

    Access & Core

    Intra-domainResources and traffic Mng.

    Access & Core

    Services and session Control

    ControlPlan

    Control ResurseInter si Intra domeniu

    Service Mng. (Planning provisioning,Offering, monitoring)

    Mana

    gement

    Plane

    Control flow

    Figure 1-19 Generic example of a multi-plane architecture

    1.4.3 Architectural stack for wireless heterogeneous mesh network

    European Research Project, FP7, 2008-2011

    SMART-antenna multimode wireless mesh Network

    Vertical structure of the architectural stack:

    Application and Service Macro-Layer (ASM)

    Transport Macro-Layer (TM) (layers 1-4 in the OSI terminology)

    ASM- contains applications (real-time or not real-time), which in their turn may use services

    offered by the system (e.g. a given complex application may use, among others, a VoIP

    service).

    TM- abstraction of layers providing IP connectivity services, (any PHY and MACtechnologies)

    This view offers a complete independency to the application and service providers with

    respect to the transport infrastructure.

    The application and service providers can be third parties using connectivity services providedby the Transport Macro-Layer based on agreed Service Level Agreements (SLA) betweenthem.

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    26/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 27

    Applications &Services

    PHY

    Multimode MAC

    ( 802.11, 802.16, ..)

    ConvergenceSublayer

    TCP/IP

    Services andSession

    Mng&Ctrl

    PHY Mng&CtrlSmart Antennas and RAT Control

    Data Plane Management and Control Plane

    ResourceMng &Control

    Coordinator

    AccesControl

    MobilityMng

    QoS

    Data Link Mng&CtrlQoS, Mobility, RR Control,

    Scheduling

    NetworkCoding

    CrossLay

    er

    Optimization

    Trans

    ortMacro-La

    er

    Applicationand

    ServiceMacro-Lay

    er

    DataFlows

    Routing

    Sec

    RM&C

    Figure 1-20 Multi-plane generic functional architecture

    The architecture is horizontally divided into MPl, CPl, DPl.

    The Data Plane (DPl) processes the data packets (e.g. traffic classification and conditioning,

    conversion, coding/transcoding, prioritizing, marking and queuing) and transfer the multimedia flows.

    At ASM level, the DPl may run mechanisms to adapt/transform media flows (fixed or scalable

    coding/decoding, transcoding, compression, conversion, security operations) under the control

    of some Media Control Middleware (MCM).

    At TM level DPl runs all network level data flow mechanisms for traffic control and QoS

    assurance if guarantees are required from the connectivity service offered by this macro-layer.

    The MPl performs essentially mid-long-term functions related to:

    At ASM: management of high level services (e.g subscription, invocation, etc.)

    At TM network, resources and traffic management operations.

    The CPl performs the short-term control functions including (at different layers):

    At ASM: it accomplishes the service and session control.

    At TM: PHY processing control, MAC processing, routing, mobility,resource and QoS

    control, security, etc.

    Further vertical decomposition can be seen in the TM

    The lower layers covers Data Link layers and below. The upper layers cover the network

    and traditional Layer 4 (transport).

    A convergence layer will solve the compatibility with Layer 3. The MPL and CPl contains

    all low-layer mechanisms for PHY/MAC (these are usually defined in the 802.x

    standards) but also management and control methods/algorithms which are intentionally

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    27/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 28

    not specified by the standards (to give freedom to constructors to use their best knowhow for them).

    The QoS will be assured with several levels of guarantee (depending on application

    requirements), by considering two time scale approaches for resource management and

    control:

    provisioning for those applications flows where future resource consumptions

    can be forecasted (e.g. media distribution applications), done at aggregated

    levels based on Service Level Agreements/Specifications between entities;

    per session/flow QoS control for dynamic call requests.

    1.4.4 Control Plane in GSM (2G)

    PLMN Public Land Mobile Network

    MSMobile Station

    BTSBase Tranceiver Station

    BSC Base Station ControllerMSC Mobile Switching Center

    GMSC Gateway MSC

    HLR/VLR Home Visitor Location Register

    EIREquipment Identity Register

    AUC- Authentication Center

    ISDN Integrated Services Digital Network

    PSPDN Packet Switched Public Data Network

    EIRBSC

    MS

    HLR

    GMSC

    MSC

    VLR

    MSC

    VLR

    PLMN

    AUC

    ISDN/IN

    PSTN

    PSPDN Other PLMNs

    MS

    BTS

    Figure 1-21 GSM Network General Architecture

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    28/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 29

    Distribution

    DTAPBSSMAP

    BSSAP

    MS BTS BSC

    RIL3-CM

    RIL3-

    MM

    DTAP

    RIL3-

    RR

    I/F radio

    LAPDm

    4-5-

    3

    Distrib

    Um Abis

    RSM

    LAPD

    64 kb/s

    4-5-6

    3

    RIL3_RR

    SCCP

    4-5-6

    MTP1-3

    Releu

    LAPDm

    I/F radio

    4-5-6

    3

    LAPD

    64 kb/s

    4-5-6

    3

    RIL3_RR RSM

    Relay

    to MSC

    anchor

    Protocol MM

    Protocol CM

    PHY Conections

    7 OSI-RM

    2

    1

    BSS

    MSC/VLR

    Relay

    A

    SCCP

    4-5-6

    MTP1-3

    Distribution

    DTAPBSSMAP

    BSSAP

    RIL3-CM

    RIL3-MM MAP/E

    MAP/G

    TCAP

    NSS

    Figure 1-22 Control Plane in GSM

    RIL3 - Radio Interface Layer; CM, MM, RR - Connection, Mobility, Radio Resource -

    Management; Distrib distribution RSM - Radio Subsystem Management; BSSAP - Base StationSubsystem Appl. Part;

    2 INTERCONNECTION- REVISION

    (Romanian)

    2.1 Moduri de lucru cu i fr conexiune CO/CL

    CO/CL

    DTE-A DTE-B

    ISa

    SN3

    SN2SN1

    ISc

    ISb DTE-C

    14 3 2

    n CO PDU

    32

    1

    1CL PDU

    Figura 2-1 Modul de lucru cu i fr conexiune

    ISSistem intermediar; SN - subreea

    - COfiecare IS joncioneaz ntre ele dou segmente de circuit virtual ( Ex. ATM, MPLS)

    - CL - fiecare IS ia pentru fiecare PDU o decizie de dirijare ( forwarding n mod independentde cele anterioarenu se garanteaz pstrarea secvenei datelor

    -

    Interneti poate baza transportul sau pe suporturi fizice ale altor reele der telecomunicatii (PSTN, ISDN, CATV, etc.) sau pe suportul unor reele publice de pachete de arie mare

    - elemente interconectabile: sisteme de capt (hosts) , sisteme intermediare (puni,comutatoare de nivel doi, comutatoare MPLS, rutere), subreele

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    29/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 30

    A B

    P2

    P3

    P1

    PPR

    R R

    A B

    P2

    P3

    P1

    PN

    PN

    PN

    Telco

    Figura 2-2 a. Reea public cu comutaie de pachete b. Reea Internet

    PNPacket Network

    2.2 Cerinele unui serviciu de interconectare (la nivel trei)- s asigure link-uri ntre reele diferite

    - adresare i rutare/dirijare prin reele diferite

    - contabilizarea utilizrii rersurselor pentru a ti starea fiecrui element de interconectare ( lanivel de element de reea; la nivel de domeniu administrativ)

    - s furnizeze serviciile de mai sus astfel nct s se poat interconecta la reele de tipuri diferitefr a modifica infrastructura intern a fiecreia; deci trebuie rezolvate problemele:

    - scheme de adresare diferite

    - dimensiuni maxime diferite ale unitilor de date (este necesarsegmentatare/reasamblare)

    - mecanisme de acces la reea diferite

    - valori diferite de expirare pentru diverse temporizatoare ( timers )

    - diferite metode (sau inexistente) de recuperare a erorilor

    - rapoarte de stare

    - tehnici de rutare diferite

    - controlul accesului utilizatorilormecanisme diferite

    - mod de lucru CO/CL

    NSAP_1

    SNICP

    SNDCP

    SNDAP

    DL

    PHY

    SNDCP

    SNDAP DL

    PHY

    SNDCPSNDAPDL

    PHY

    Releu + rutare: SNICP

    T

    IS

    ES/H

    Nivel

    N = 3

    Retea 1 Retea 2

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    30/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 31

    Figura 2-3 Architectura generic anivelului de reea

    soluie pentru acomodarea diferitelor reele: divizarea nivelului reea n trei subnivele:

    SNICP, SNDCP, SNDAP

    SNICP Subnetwork Independent Convergence Protocol

    SNDCP - Subnetwork Dependent Convergence Protocol

    SNDAP - Subnetwork Dependent Access Protocol (can be void)

    2.3 Modul de lucru CO ( conexiune la nivel reea)

    - faze: stabilire, meninere, eliberare de VC

    - este nevoie ca toate subreelele sa cunoasc acelai protocol CO pentru a putea construi VCmulti-reea

    - deci presupunem c fiecare subreea ofer acelai serviciu de conectivitate (de nivel trei!)

    de tip CO; rezultatul final este concatenarea unor segmente de VC (virtual circuits)

    - Figura 2-4.a: - mod de lucru CO - accesul la subreele se face prin intermediul aceluiaiprotocol de reea nu este nevoie de mai multe subnivele

    - funciunile unui ruter CO :

    o funcie de releu pentru unitile de date de la o reea la alta ( forwarding)

    o selectarea iniial a rutei (nod cu nod) are loc n faza de stabilire a conexiunii

    o fiecare ruter jonctioneaz ntre ele segmente de VC (conexiuni logice)

    2.4 Modul de lucru CL (fara conexiune la nivel reea)

    - tratare independent a fiecarei uniti de date n fiecare nod de reea (ruter)

    - este util a defini un protocol de reea comun, independent de diferite tipuri de subreeaparticulare: IP = SNICP (RFC 791) ; ISO 8473 Connectionless Network Protocol (CLNP) -

    are funciuni similare

    - accesul la subreele particulare se face prin subnivelul de adaptare dependent de tehnologiaspecific (SNDAP= N1, N2, N3; SNDCP poate fi necesar sau nu, depinde de caz)

    - Figura 2-4.bexemplu de stiv

    - Avantaje CL:

    - robustete (datorit tratrii independente a unitilor de date - datagrame); flexibilitate (poate

    lucra peste subreele CO sau CL); ofer cel mai potrivit serviciu pentru un nivel transport detip CL

    - Dezavantaje CL:

    - servicu nativ fr garanii ( best effort )relativ la band, pierderi, ntrzieri de transfer,fluctuaia de intrziere, secvenialitate

    2.5 Interconectarea de tip punte (Bridge approach)

    - Punte = bridge = releu de nivel MAC lucrnd n mod CL

    - Nu se analizeaz adresele de nivel trei

    - Utilizate de regul pentru interconectare de LAN-uri

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    31/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 32

    A BSN2SN1 SN3

    T

    N

    L1

    P1

    RN N

    L1 L2

    P1 P2

    RN N

    L2 L3

    P2 P3

    T

    N

    L3

    P3

    T

    I

    N1

    L1

    P1

    I

    N1 N2

    L1 L2

    P1 P2

    I

    N2 N3

    L2 L3

    P2 P3

    T

    I

    N3

    L3

    P3

    T

    I

    LLC

    MAC1

    P1

    Relay

    MAC1 MAC2

    P1 P2

    T

    I

    LLC

    MAC3

    P3

    Relay

    MAC2 MAC3

    P2 P3

    a

    c

    b

    ISbISa

    Figura 2-4 Arhitecturi de interconectare

    a. mod CO b. mod CL c. Mod de lucru de tip punte ( Bridge operation)

    2.6 Exemple de interconectri

    Examplu 1: Conexiune FTP client-server

    Client

    FTP

    TCP

    IP

    MAC1

    ETH

    PHY1

    IP

    MAC1

    ETH

    MAC2

    TR

    PHY1 PHY2

    Server

    FTP

    TCP

    IP

    MAC2

    TR

    PHY2

    Figura 2-5 Acces FTP acces ntre dou reele LAN via un ruter

    Examplu 2: IP peste o configuraie de subrutele: LAN-reea public de pachete -LAN

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    32/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 33

    TCP

    IP

    LLC

    MAC

    P1

    IPX.25-3

    LLC

    MAC

    X.25-2

    P1 P2

    A BLAN1 LAN2WAN

    X.25R1 R2

    IPX.25-3

    LLCX.25-2

    MAC

    P2 P3

    TCP

    IP

    LLC

    MAC

    P3

    12

    3 4

    786

    5

    1,6, 7 IP-H TCP-H Date

    2, 5 LLC1-H IP-H TCP-H Date

    MAC1-H LLC1-H IP-H TCP-H Date MAC1-T

    8 P-H IP-H TCP-H Date

    DL-H P-H IP-H TCP-H Date DL-T

    9

    3,4

    9

    Tunel X.25

    Figura 2-6 Operarea protocolului Internet via reea public de pachete (WAN ex.X.25)

    Note:- avem acelai nivel IP ( SNICP) n toate sistemele ( A, R1, R2, B)

    - au loc ncapsulri/decapsulri succesive n timp ce PDU traverseaz in sus i in jos nivelelefuncionale (vezi figura)

    - se face segmentare/reasamblare daca e necesar

    - informatie de rutare: necesara in R1 i R2- R1 sau R2 ofera un serviciu de conectivitate nefiabil (best effort)

    - congestii posibile (deoarece banda unui VC este limitat n reeaua X.25)- intarziere de transfer variabil

    Examplu 3: Interconectare de tip punte (distant) peste o reea de pachete

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    33/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 34

    \

    3

    LLC

    MAC

    P1

    Releu

    X.25-3

    MAC X.25-2

    P1 P2

    A BLAN1 LAN2WAN

    X.25B1 B2

    Releu

    X.25-3

    X.25-2 MAC

    P2 P3

    3

    LLC

    MAC

    P3

    1

    2

    3 4 6

    5

    1 Data

    2 LLC-H Data

    3,4 MAC-H LLC-H Data MAC-T

    5 X.25-H MAC-H P-H Data MAC-TDL-H X.25-H MAC-H P-H Data MAC-T DL-T6

    Figura 2-7Operarea protocolului Internet prin puni interconectate la nivel doi printr-o reeade pachete ( exemplu: X.25 WAN )

    - presupunem c avem n LAN1 si LAN2 acelai MAC dei nu este obligatoriu

    - diferena fa de interconectarea IP/WAN este ca in acest caz cadrele de nivel doi sunttransportate prin tunelul X.25 i nu datgramele IP

    2.6.1 Interconectarea de reele LAN prin puni (B)

    Interconectarea de nivel 1 ( prin repetor):

    o Permite extinderea distantei fizice

    o Stiva arhitectural este aceeai n toate sistemele (nivel 1- nivel 7)

    o Repetorul: obiect de interconectare de nivel fizic care regenereaza formatul electric al

    semnalului

    o Repetor: cost sczut, dar non-inteligent

    o

    Efect generalaceeai reea dar cu extindere pe dimensiuni fizice mai mario Exemplu clasic: reea Ethernet cu repetoare (Hub)

    Interconectarea la nivel 2 a retelelor locale (LAN ): prin punti (B =Bridge)

    - Interconectri pentru reele cu MAC diferit; LLC i nivele >2 aceleai

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    34/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 35

    Aplicatie

    TCP/UDP

    IP

    (LLC)*MAC1-ETH

    PHY1

    Aplicatie

    TCP/UDP

    IP

    (LLC)*MAC2TR

    PHY2

    Releu (LLC partial)

    MAC1-ETH MAC2-TR

    PHY1 PHY2

    LAN 1LAN 2

    Figura 2-8 Arhitectura de interconectare prin puni

    (*) n principiu LLC poate lipsi

    Cadrele recepionate de ctre B pe un port (de la un segment de LAN) : memorate, verificate

    CRC, convertite la formatul noului MAC, redirijate Are loc o filtrare a adreselor locale (adrese MAC)

    Avantaje ale punilor (sunt mai importante dect dezavantajele)

    o Memorare + retransmisie MAC1 poate fi diferit de MAC2. Exemplu : 802.3 802.5posibile extensii gradate spre tehnologii diferite

    o Elimin constrngerile de distan fizic (repetorul interconectare de nivel 1 nu faceasta)

    o B este releu pe baz de adres MAC- transparent la nivele superioare

    o Uureaz gestionarea reelelor mai mari (dac n B se include SW de management)

    o Crete securitatea reelelor (datorit filtrrii traficului local/extern)

    o Creste fiabilitatea /disponibilitatea segmentelor

    o Conceptul de B se extinde imediat la comutatoare de nivel 2 ( Layer 2 switch)

    o Permit crearea de LAN-uri virtuale (VLAN)foarte important in practic

    Dezavantaje ale punilor (Problemele de principiu greu rezolvabile/netriviale)

    o Lungime diferit de cadre

    o Lucru diferit cu prioriti

    o Incompatibilitate ntre valorile timerelor utilizate

    o probleme de gestiune a configuraiei mixte

    Alte probleme:

    - lipsa de control de flux la nivel MAC posibilitatea suprancrcrii memoriei din B

    - memorare + retransmisie ntrzieri mai mari dect la interconectarea repetoare

    - probleme cu expirri de timere n MAC-uri diferite dac distana este mare

    - modificarea cadrelor la traversarea B + calculul pentru noul CRC erori eventuale n timpultranslatrii (releu) care rmn nedetectate

    Concluzii : avantajele sunt mai mari dect dezavantajele B utilizate foarte frecvent ( azi sub

    form de comutatoare de nivel 2)Exemple de standarde:

    IEEE 802.1 -puni transparente

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    35/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 36

    IEEE 802.5conine o parte referitoare la B cu rutare de tip surs

    2.6.1.1 Puni transparente (Transparent Bridges- TB)

    Caracteristici generale

    prezena n reea a (n>1) puni - transparena pentru staiile ce intercomunic

    TB- se iniializeaz i configureaz automat la introducerea n reea (fr o intervenie special

    din partea restului reelei)

    reconfigurarea dinamic n timpul funcionrii

    sunt prevzute cu n 2 porturi pentru n 2 LAN-uri

    fiecare port are chip-set-uri MAC corespunztoare tipului de LAN i SW de gestiunecorespunztor

    ( SW initializeaz chip-set-ul; gestioneaz memoria (buffere) aloc buffere pentru chip-setMAC dinMAC de recepie ; paseaz buffere pline spre chip-setMAC de transmisie ).

    Extensie 1: comutatoare de nivel 2 ( punti cu n > 2 porturi) eventual cu tehnologii diferite

    Extensie 2 : VLAN

    2.6.1.2 Punti cu rutare de tip sursa

    Punti transparente : B participa in mod colectiv la rutare intr-un mod transparent pentru

    statii . Statiile comunica intre ele ca i cum ar fi pe acelasi LAN.

    Punti cu rutare sursa : statia src include in cadrele emise informatii de rutare pana la

    destinatie . Info- rutare in antetul cadrului folosita de punti pentru rutare (fiecare Bdetermina daca acel cadru trebuie dirijat spre alt segment sau nu)

    Informatia de rutare = secventa de perechi ( S- B ) unde S= segment ( adresa LAN) B= id

    punte

    Observatie Rutarea sursa se utilizeaza in special in IEEE 802.5 ( fiind o parte a acestuistandard) Exemplu cadru 802.5

    3 ROUTING ALGORITHMS AND PROTOCOLS

    (Romanian)

    Not complete

    3.1 GeneralitatiProtocol de rutare +algoritm + mecanism de schimb de nesaje intre nodurile retelei

    Retea-abstractizata printr-un graf orientat/neorientat

    A

    D

    C

    B2

    12

    1

    3

    1

    asimetric

    asimetric

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    36/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 37

    Figura 3-1 Exemplu simplu de graf orientat

    G(V,E); V- set de noduri; Eedge set set de link-uri

    Ponderi/costuri asociate link-urilor

    Problema de rutare: gasirea unui arbore cu cost minm de la un nod sursa catre orice destinatie

    - costul oricarei cai = minim ( SPT = Shortest path tree)

    - cost total al arborelui = minim (arbori Steiner)

    Clasificarea algoritmilor de rutare

    - Centralizati /distribuiti de tip mixt

    Criterii de cost/metrica:

    - metrica simpla ( 1 criteriu)

    - compusamai multe criterii

    Exemple de metrici: nr. de noduri traversate, intarziere ( dinamic) , 1/B, cost admin., grad de incarcarea unui link (dinamic), cost total al unui arbore, etc.

    Obs: n>1 metrici => problemne NP-hard; se cauta solutii aproximante quasi-optime

    Se poate dem. in unele cazuri care este departarea fata de optimul teoretic

    Exemple:

    2 5 8 11

    3

    7

    9

    10

    4

    6

    M= {1,5,6,9,11}

    Cost/link =1

    S

    a.

    Network graph

    1

    2 5 8 11

    3

    7

    9

    10

    4

    6

    M= {1,5,6,9,11}

    Cost/link =1

    S

    b.

    Shortest Path Tree (SPT)Source Specific Tree

    C = 8

    Dmax = 3

    Dav =2.5

    1

    Figura 3-2 Exemplu de graf si SPT

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    37/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 38

    2 5 8 11

    3

    7

    9

    10

    4

    6

    M= {1,5,6,9,11}

    Cost/link =1

    S

    Group Shared Tree

    Example of Steiner Tree

    1

    Figura 3-3 Arbore Steiner- exemplu

    Steiner Tree Problem in Networks (SPN) - NP-complete problem

    Given: G = (V,E)undirected M = multicast group included in V cuv = cost of link (u,v); u,v V Required: t = (VT, ET), which spans M so that

    imumc

    T

    uv

    Evu

    min),(

    Steiner nodes = nodes u,v VT but they do not belong to MExample

    Steiner nodes= {4,7} M = {1,5,6,9,11}

    CT = 6 !! less than in SPT DSav = (2 + 3 + 4 + 3)/4 = 12/4 = 3

    Constrangeri:

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    38/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 39

    Constraints to a link (e.g bandwidth, available buffer, etc.). to a path or to the whole tree,

    Tree constraints can be ( m = metric) additive (e.g. E2E delay on every path from source to destination)

    m(u,v) = m(u,i) + m(i,j) + m(pv), for a path P( u,i,j, ..v) Sum of the costs on all edges of the tree

    multiplicative ( e.g the probability that a packet will reach the destination,being given the loss probability on each link)

    m(u,v) = m(u,i) *m(i,j) * m(pv), for a path P( u,I,j, ..v) concave (e.g. minimum bandwidth on a chain of links on a path)

    m(u,v) = Min{ m(u,i), m(i,j), m(pv)}, for a path P( u,I,j, ..v)

    Moduri de lucru ale protocolului:

    - Proactiv/reactiv/mixt

    Clasificare d.p.d.v cunoasterea topologiei:

    - vectori de distanta

    - link state

    Probleme suplimentare:

    - mobilitatea; inteferentein radio; refacerea rutelor deteriorate

    - problema link-urilor asimetrice

    - problema cailor diferite in cele doua sensuri.

    Caracteristici dorite ale protocolului: convegenta, optimalitate, complexitate redusa, robustete,

    extensibilitate, echitate, fiabilitate, etc. (unele sunt contradictorii)

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    39/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 40

    S2

    S1

    R4

    R3R2

    R1 R5

    RP

    S2

    S1

    R4

    R3R2

    R1 R5

    S2

    S1

    R4

    R3R2

    R1 R5

    Unidirectional treeOne tree per source

    S1 rooted tree (SPT)S2 rooted tree (SPT)

    Optimised for source specific mccommunication

    Unidirectional Shared(by all sources) tree

    Components:Shared tree

    Data path S1RP

    Data path S2 RP

    Bidirectional Shared TreeDistribution of S1 data

    Distribution of S2 data

    Figura 3-4 Tipuri de arbori

    3.2 Algoritmi de cautare a celui mai scurt drum

    - Retea- echiv cu un graf

    - Caut drumul cel mai scurt intre doua noduri d.p.d.v cost

    - Cost cu : nr. Noduri/dist./t. intarziere/ inversul benzii

    i

    k1

    k2

    Fig 1. Cautarea drumului minim intre nodurile I si j

    dij min = min { dik+ dkj}k

    unde k este un nod oarecare prin careexista drum spre nodul j.

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    40/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 41

    3.2.1 Algoritmul Dijkstra (centralizat)

    Se cauta toate drumurile minime de la un nod sursa catre toate celelalte. Rezulta un arbore cu

    radacina in nodul sursa. Se repeta alg. ptr. fiecare nod al retelei.

    - date: lista nodurilor, lista interconectarilor, costurile link-urilor.

    Alg.: Fie un nod A

    Se construieste arborele drumurilor minime cu radacina in A extinzandu-l succesiv pana ce

    toate nodurile apartin arborelui.

    Notatii:

    Fie v, w, noduri ale grafului

    D(v) = distanta intre A si nodul v ( suma costurilor pe un drum intre A si v)

    l (v, w) = distanta ( costul arcului) intre v si w

    N = multimea nodurilor din arbore

    1. Initializare:

    N={A}

    Ptr. v N se eticheteaza nodul v astfel : v(A,D(v)), unde A este nodul din arbore prin care

    v are acces spre A.

    In particular avem: v(A, D(v)) pentru nodurile legate direct la A

    v(-, ) pentru nodurile care nu sunt legate direct la A

    2. Se completeaza arborele cu un nod nou , astfel:

    - se cauta w N, pentru care D(w) = minim

    - N= N {w}se include in arbore nodul w- Se reeticheteaza fiecare vecin v (care nu apartine lui N) al lui w, prin recalcularea dist. la

    A tinand seama de noul nod inclus in arbore , astfel:

    D(v) = min{ D(v), D(w) + l(w, v)},

    v N, v V(w)

    unde V(w) este multimea vecinilor lui w. Ca urmare a reetichetarii, A din eticheta v(A,D(v)), varamane A sau va deveni w daca prin w se obtine un nou drum mai scurt spre A.

    3. Se repeta etapa 2 pana ce toate nodurile apartin arborelui.

    Exemplu:

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    41/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 42

    A

    B(A,1)

    D(A,3)

    C(A,6)

    E(-,)

    1 1

    3

    6

    3

    1

    24

    Initial: N={A}

    A

    B(A,1)

    D(B,2)

    C(D,4)

    E(D,5)

    1 1

    3

    6

    3

    1

    24

    Pas (2): N= {A,B,D}

    Se adauga D

    A

    B(A,1)

    D(B,2)

    C(B,5)

    E(-,)

    1 1

    3

    6

    3

    1

    2

    4

    Pas 1: N={A,B}

    Se adauga B

    = dist. recalculate

    V(B) C (N)C (N)= complement al

    lui N

    A

    B(A,1)

    D(B,2)

    C(D,4)

    E(D,5)

    1 1

    3

    6

    3

    1

    24

    Pas (3): N= {A,B,D,C}

    Se adauga C

    A

    B(A,1)

    D(B,2)

    C(D,4)

    E(D,5)

    1 1

    3

    6

    3

    1

    24

    Pas (4): N= {A,B,D,C, E}Se adauga E

    Arbore de drumuri minime

    de la A la B,C,D,E

    costuri

    Fig.1.1 Exemplu de calcul pentru algoritmul Dijkstra

    Arborele de rutare pentru nodul A va fi cel din tabelul de mai jos :

    Destinatia Nodul urmator

    B B

    C B

    D B

    E B

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    42/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 43

    3.2.2 Algoritmul Ford (Fulkerson)

    - cauta drumurile de cost minim

    - nodul radacina ( fie A) este considerat ca destinatie

    - rularea algoritmului este gata dupa etichetarea tuturor nodurilor cu dist. fata de A si cu

    eticheta nodului urmator pe drumul minim catre A

    - constructia tab. rutare = repetarea alg. pentru fiecare nod destinatie.

    Eticheta are aceeasi forma ca la alg Dijkstra . Ex B(5, D) este eticheta nodului B care arata cadistanta pana la A este 5, via nodul vecin D

    1. Initializare

    Fie nodul A = destinatie, D(A) = 0.

    Se eticheteaza toate celelelte noduri cu ( -, ).

    1. Etichetarea tuturor nodurilor cu distantele minime pana la A

    Pentru nod v A executa:

    - actualizeaza distantele D(v) pana la destinatia A, pentru fiecare nod , prin utilizarea

    valorilor curente D(w) ale tuturor vecinilor w ai lui v, adica pentru toti w V(v). Se faceatribuirea:

    D(v) = min{D(w) + l(w,v)}

    w V(v)

    - se actualizeaza eticheta de nod cu nr. nodului vecin care minimizeaza expresia de

    mai sus si cu noua distanta D(v).

    2. Repeta etapa 2 pana cand nu mai apar modificari.

    v

    w

    t

    u

    A

    duA

    dtA

    dwA

    lau

    lat

    law

    Comparison:(lau + duA) < > (lat + dtA) < > (law + dwA)

    Vv

    Figure 3-1 Actualizarea distantelor lui v fata de A

    Exempluproblema.

    1.Sa se determine arborele drumurilor minime in raport cu nodul A ptr. reteaua din fig.

    1. Sa se scrie tab de rutare din nodul A pentru host-urile Hi, I < > 1.

    2. Folosind drumurile de lungime minima sa se aloce numere de circuite virtuale pentru

    conexiunile ( solicitate temporal in ordinea data) H1 - H7, H3 - H7, H2 - H6, H1H6,H1H5.

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    43/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 44

    B

    A

    C

    D F

    G

    E

    H1

    `

    H3

    `

    H6

    `

    H7

    `

    H2

    H4

    12

    1

    2 2 3

    4

    4

    8

    3

    7

    H4

    V( B)

    Figure 3-2 Configuratia retelei. Nodul A este destinatie.

    Lista etichetelor initiale

    B C D E F G

    (-, ) (-, ) (-, ) (-, ) (-, ) (-, )

    Pasul 1.1 : v = B

    Nod w D(w) l (v,w) D(w) + l (v,w) Noua eticheta

    ptr. nodul B

    A 0 1 1 (A, 1)

    C 1

    D 2

    Lista etichetelor dupa pasul 1.1

    B C D E F G

    (A,1) (-, ) (-, ) (-, ) (-, ) (-, )

    Pasul 1.2 : v = C

    Nod w D(w) l (v,w) D(w) + l (v,w) Noua eticheta

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    44/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 45

    ptr. nodul C

    A 0 2 2 (A, 2)

    B 1 1 2

    D 3 *

    F 3 *

    G 2 *

    * = se poate inlocui cu x ( nu conteaza)

    Lista etichetelor dupa pasul 1.2

    B C D E F G

    (A,1) (A,2) (-, ) (-, ) (-, ) (-, )

    Pasul 1.3 : v = D

    Nod w D(w) l (v,w) D(w) + l (v,w) Noua eticheta

    ptr. nodul D

    B 1 2 3 (B,3)

    C 2 3 5

    G x

    Lista etichetelor dupa pasul 1.3

    B C D E F G

    (A,1) (A,2) (B,3) (-, ) (-, ) (-, )

    Pasul 1.4 : v = E

    Nod w D(w) l (v,w) D(w) + l (v,w) Noua eticheta

    ptr. nodul E

    A 0 7 7 (A,7)

    G x

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    45/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 46

    Lista etichetelor dupa pasul 1.4

    B C D E F G

    (A,1) (A,2) (B,3) (A,7) (-, ) (-, )

    Pasul 1.5 : v = F

    Nod w D(w) l (v,w) D(w) + l (v,w) Noua eticheta

    ptr. nodul F

    C 2 3 5 (C,5)

    G x

    Lista etichetelor dupa pasul 1.5

    B C D E F G

    (A,1) (A,2) (B,3) (A,7) (C,5 ) (-, )

    Pasul 1.6 : v = G

    Nod w D(w) l (v,w) D(w) + l (v,w) Noua etichetaptr. nodul G

    C 2 2 4 (C,4)

    D 3 8 11

    E 7 4 11

    F 5 4 9

    Lista etichetelor dupa pasul 1.6

    B C D E F G

    (A,1) (A,2) (B,3) (A,7) (C,5) (C,4)

    Repetand pasul doi se constata ca nu mai apar modificari.

    Atentie: rezolvarea completa presupune si terminarea pasului 2 ( adica 2.12.6).

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    46/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 47

    B

    A

    C

    D F

    G

    E

    H1

    H3

    H6

    H7

    `

    H2

    H4

    12

    1

    2 2 3

    4

    4

    8

    3

    7

    H4

    Figure 3-3 Arborele drumurilor minime pana la nodul A

    Tabelul de rutare pentru nodul A este :

    Destinatia Ruta ( via) Cost

    H2 B 1

    H3 C 2

    H4 B 3

    H5 E 7

    H6 C 5

    H7 C 4

    Algoritmul se repeta pentru fiecare nod pentru care se construieste tabelul de rutare.

    3.3 IP Routing Protocols

    3.3.1 Internet Protocol reminder

    - connectionless style, RFC 791- official specification of IP

    - best effort protocolno guarantees- problems for real time traffic

    - if problems appearrejection of datagrams (IP-DGs)

    - functions:

    - segmentation / reassembly (segmentation at the input of

    first subnetwork and reassembly only at the end destination

    machine)- routinghop-by-hop principle

    -error reporting

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    47/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 48

    IP services

    - two service primitives : send( ), deliver( )

    - primitive parameters:

    - source and destination IP addresses ( IPa_src, IPa_dst)

    -protocol ( recipient of IP-DGs)- type of serviceindicatorspecifies data treatment

    - identifierused in combination with IPa_src, IPa_dstand

    protocol field to uniquely identify data unit

    - dont fragmentsegmentation indication

    - time to livelife time of DGmeasured in network hops

    - data lengthlength of data being transmitted

    - option dataoption request by the IP user- securityallow a security label attached to IP-DG

    - source routinglist of routers

    - route recordingfield allocated to record the sequence of

    routers

    - stream identificationnames reserved used for stream

    service

    - time-stamping source IP entity and some or all intermediate routers add atimestamp ( precision - ms) to the data unit

    - datadata to be transmitted

    IP Service quality options

    - precedenceeight level of importance

    - reliabilitytwo levels (normal / high)

    - delaytwo levels ( normal/high)

    - throughput two levels ( normal/high)

    IP Datagram format

    - versionindicates version number

    -Internet header length (IHL) in 32 bits words

    (minimum IP-H20 octets)

    - type of servicereliability, precedence, delay, throughput

    - identifier( 16 bits)together with IPa_src, IPa_dstuniquely

    identifies the IP-DG

    - flags ( more bit, dont fragment bit)used in segmentation-fragment offset( measured in 64 bit units)used in segmentation

    - time to live (TTL) measured in router hops

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    48/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 49

    0 4 8 16 31

    Version IHL Type of service Total length ( in octets)

    Identification Flags Fragment offset

    Time to live (TTL) Protocol Header checksum

    Source IP adress (x1.y1.z1.w1)

    Destination IP adress (x2.y2.z2.w2)

    Options

    Information

    20

    oct.

    Figure 3-4 IP datagram format

    - protocolindicates the higher level protocol

    - header checksum- error detecting code for header only

    re-verified at each router (1 complement addition of all 16 bit words

    in IP-H)

    - options (variable) encodes the options requested by the user

    -paddingto assure multiple of 32 bits

    - data fieldinteger multiple of 32 bits, 65 535 octets

    3.3.2 Principles of IP routing

    - if source and destination are on same local network then IP-DG sent arrives directly to the

    destination ( broadcast medium or serial line)

    - if not, the IP-DG is sent to a router charged to forward the IP-DG (based on routing tables) (

    to another router) up to the destination

    - routing table consulted for each IP-DG

    - routing protocols are executed to build the routing tables

    - hop by hop routing principle

    - one machine can be configured to function as a router also ( that is to retransmit the received

    IP-DGs which are not addressed to itself)

    one entry in the routing table (RT) :

    -IPa_dst- destination IP address (machine addr. or network addr.)

    - next hop router address or an address of a network directly

    connected

    - flags - indicates ifIPa_dstbelongs to a machine or a network, etc.

    - interfacespecification where the IP_DG must be sent

    IP forwarding operation

    - search in RT (ActuallyFT) of an entry corresponding to:

    - full destination address (if found then route to next hop

    router or to I/F directly connected ( depending on flags)

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    49/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 50

    - or, destination network address - similar actions

    - or default entry

    UDP TCPnetstat

    commandroute

    command

    routing

    demon

    packet for

    this dest?

    ICMP

    IP process

    options

    forwarding

    ( compute

    the next

    hop)

    Routing

    table

    Source routing

    yes

    Retransmission

    (if valid)

    no

    update

    redirection

    Network interfaceIP layer

    Figure 3-5 IP actions on the received datagrams

    3.3.3 Network hierarchies

    The current Internet is a decentralized collection of computer networks from all around the world.

    Each of these networks is typically known as a domain or an autonomous system (AS)

    AS = network or group of networks under a common routing policy, and managed by a single

    authority.

    Today, the Internet is basically the interconnection of more than 20,000 ASes [4].

    Intradomain routing: Every one of these ASes usually uses one or more interior gateway protocols

    (IGPs), such as Intermediate System to Intermediate System (IS-IS) or Open Shortest Path First

    (OSPF), to exchange routing information within the AS.

    Interdomain routing focuses on the exchange of routes to allow the transmission of packets between

    different ASes.

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    50/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 51

    Figure 3-6 A simplified inter-domain scenario

    When an AS is connected to multiple different ASes, it is referred to as a multihomedAS.

    Types: single-homed, multi-homed, transit AS. Note a transit AS could be sometimes considered as

    multi-homed stub AS. ( e.g. AS 2).

    Todays Internet : hierarchy of transit ASes [5].This hierarchical structure is rooted in the two different types of relationships that could exist between

    ASes

    - customer-provider- peer-to-peer).

    Thus, for each transit AS any directly connected AS is either a customer or peer.

    Level 1: the top of this hierarchy we found the largest ISPs, (Tier-1 ISPs).

    - There are about 20 Tier-1s at present which represents less than 0.1 percent of the total

    number of ASes in the Internet

    - Tier-1s are directly interconnected in almost a full mesh and compose the Internet core. In

    the core all relationships between Tier-1s are peer-to-peer, so a Tier-1 is any ISP lacking

    an upstream provider.

    Second level of the hierarchy is composed ofTier-2 ISPs.- A Tier-2 is any transit AS that is a customer of one or more Tier-1 ISPs

    - A representative example of a Tier-2 ISP is a national service provider. Tier-2 ISPs tend

    to establish peer-to-peer relationships with other neighboring Tier-2s for both

    economical and performance reasons (SLA-s can be negotiated)

    - This is typically the case for geographically close Tier-2 ISPs that exchange large

    amounts of traffic.

    -

    Tier-3 ISPs : those transit ASes in the hierarchy that are customers of one or more Tier-2 ISP, such

    as regional ISPs within a country.

    - Stub ASes are non-transit ASes that are customers of any ISP (Tier-1, Tier-2, or Tier-3)

    - In Fig. 1-31 ISPs such as AS11, AS12, AS21, AS23, and AS31 would be classified

    as Tier-2 ISPs, while AS22 represents a Tier-3 ISP.- An important corollary of this hierarchical structure is that the diameter of the Internet is

    very small in terms of AS hops.

    Single-homed

    stub AS

    Multi-homed

    stub AS

    Transit AS

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    51/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 52

    General definitions

    Hierarchy: - backbone network, - autonomous systems, - networks, subnetworks, hosts

    - Autonomous System (AS) ( Domain) logical portion of larger IP networks administeredby a single authority. The AS would normally comprise the internetwork within an

    organization, and would be designated as such to allow communication over public IPnetworks with ASs belonging to other organizations. It is mandatory to register an

    organization's internetwork as an AS in order to use these public IP services.

    - Gateways (Routers): IGInterior Gateway( Router), EG - Exterior(Border) Gateway

    - Protocols: IGP, EGP - Interior Gateway Protocol, Exterior Gateway Protocol (e.g.

    Border Gateway Protocol- BGP)

    - AS-s can be organised on more than one level ( nets, subnets, etc.)

    - IP addressglobal address equivalent to NSAP addressesdifferent from Network Point ofAttachment (NPA) which depends on particular subnetwork mapping: IP_addr NPA

    - routing based on IP_addr requires finding the NPA (MAC address) which corresponds

    to IP_addr

    - Adress Resolution Protocol (ARP) , Reverse Address Resolution Protocol (RARP) solve

    the problem

    Backbone net

    EG

    EG

    EG

    EG SN1

    IG

    IG IG

    N2

    SN1

    N1 N3

    AS1

    EGP

    IGPIGP

    second level IG router

    AS2

    AS3

    EGP

    host

    Figure 3-7 Generic hierarchical Internet topology

    Protocol scopes

    - ARP used in one network to find the NPA_dst address corresponding to IPa_dst

    HiARP Hk

    HiARP IGj ARP Hk

    - IGP, EGP used between routers

    IGiIGP IGjIGP EGk EGP EGn

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    52/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 53

    Demon Interior Gateway Protocol (IGP) Exterior Gateway Protocol EGP

    HELLO RIP OSPF EGP BGP

    routed V1

    gated V.2 V1 V1

    gated V.3 V1, V2 V2 V2, V3

    Table 3-1 Routing protocols supported by routedand gateddaemons

    [Note: In Unix and other computer multitasking operating systems, a daemon is a computer program

    that runs in the background, rather than under the direct control of a user; they are usually initiated as

    background processes. Typically daemons have names that end with the letter "d": for example,

    syslogd, the daemon that handles the system log, or sshd, which handles incoming SSH connections.]

    In TCP/IP software operating systems, routing protocols are often implemented using one of two

    daemons:

    Routed: Pronounced routeD. : basic routing daemon for interior routing supplied with the majorityof TCP/IP implementations. It uses the RIP protocol

    GatedPronounced gate D. : more sophisticated daemon on UNIX-based systems for interior and exteriorrouting. It can support a number of additional protocols such as OSPF, BGP

    In TCP/IP the routing protocols are implemented in the operating system.

    3.3.4 Address Resolution Protocol (ARP), Reverse ARPRARP

    -RFC 826ARP specifications

    - ARP, RARP - integral part of IP

    IP_addr

    (32 bits)

    NPA_addr

    (e.g. MAC_addr 48 bits)

    ARP

    RARP

    Figure 3-8 ARP and RARP actions

    ARP

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    53/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 54

    driver

    Ethernet

    ARP

    driver Ethernet

    ARP

    TCP

    IP

    driver

    Ethernet

    ARP

    TCP

    IP

    FTPDNS

    machine name

    (1)

    machine name

    IP address (IP_a)

    (0)

    (2) setup connection

    with IP addr = IP_a

    (3) sendIP dg(IP_a) (conn-req)(4)

    (5)

    (6) (7) (8) send

    IP dg(IP-a, MAC_a)

    (conn-req)

    ARP_req(IP_a)

    source

    (client)

    destination

    (server)

    Ethernet LAN

    Figure 3-9 Example of ARP role in sending IP datagrams

    - ARP of a host maintains a table hostid/NPA address pairs for all hosts connected to this

    network with which host communicates

    - IP-DGs comes from upper layer, ARP table is consulted

    - ifIPa_dstentry exists then NPA_addris red and a pointer to address of IP-DGs is passed

    (together withNPA_addr) to SNDAP sublayer protocol

    - if not, then anARP_reqt(IPa_src, NPA_src, IPa_dst) is broadcasted or sent to the default IG

    - in the second case the ARP in IG relays theARP_requestto the destination host- the destination host replies withARP_reply(NPA_addr), using the

    NPA_addrof source to return the result

    - the source host stores the result ofARP_reply and sends IP-DG to SNDAP

    - cache ARPincrease efficiency, limited life time of entries

    - proxy ARP IGP responds on behalf and instead of some machines linked behind it ; thesource does not see the real configuration

    RARP

    - obtains the IP_addr associated to a given NPA_addr

    - useful in diskless machines at start-up

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    54/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 55

    3.3.5 Interior Gateway Protocols

    - function: finding the routing information within an AS

    - distributed protocolsmessages between routers ( nodes)

    - dynamic routing

    -proactive/on-demand protocols

    Distance Vector Algorithm (DVA) based protocols - examples

    - most used: Routing Information Protocol (RIP)each node bases its routing decisionsonly on neighbours information on distances (one node does not know the whole domain

    topology)

    - AODV ( Adhoc on demand Distance vector protocol)used on WLANS- MANET

    - DVMRPDistance Vector Multicast Routing Protocolextension to mcast

    Link state Protcol

    - Open Shortest Path First (OSPF)link-state algorithm - examples

    - each node gets messages from neighbours ( info about links, costs) and

    builds a network graph

    - on this graph it determines the shortest path to the destination by applying

    some shortest path algorithm (Dijkstra, Ford, etc.) using a given metric

    - Optimized Link State Routing Protocol (OLSR)- used in MANET

    - Multicast OSPF (MOSPF)extension of OSPF multicast

    Control PlaneRouting

    Protocols

    Switch( bus, matrix,

    etc.)Packets

    .

    .

    I/F

    I/F

    Figure 3-10 Generic Router diagram

    3.3.5.1 Routing Internet Protocol (RIP)

    Distance vector-based protocol:

    The distances in the tables are computed from information provided by neighbor routers.

    Each router transmits its own distance vector table across the shared network.

    The sequence of operations :

    Each router is configured with an identifierand a costfor each of its network links. The cost is

    normally fixed at 1, reflecting a single hop, but can reflect some other measurement taken for

    the link such as the traffic, speed, etc.

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    55/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 56

    Each router initializes with a distance vector table containing zero for itself, one for directly

    attached networks, and infinity for every other destination.

    Each router periodically (typically every 30 seconds) transmits its distance vector table to

    each of its neighbors. It can also transmit the table when a link first comes up or when the

    table changes (event triggered updates).

    Each router saves the most recent table it receives from each neighbor and uses the

    information to calculate its own distance vector table (Ford distributed algorithm).

    The total cost to each destination is calculated by adding the cost reported in a neighbor's

    distance vector table to the cost of the link to that neighbor.

    The distance vector table (the routing table) for the router is then created by taking the lowest

    cost calculated for each destination

    a

    w

    v

    u

    D

    duD

    dvD

    dwD

    lau

    lav

    law

    Comparison:(lau + duD) < > (lav + dvD) < > (law + dwD)

    Message : Routing table of w:

    (D, dWD)

    Figure 3-11 Principle of RIP distance vector based counting of costs

    - RFC 1058/1988official specification of RIP

    - very used as a simple distributed intra-domain routing protocol

    - RIP messages between nodes are transported in UDP datagrams (Non reliable):

    IP-H, UDP-H, RIP_message = IP-DG format for RIP

    Destination Next hop Distance Timers Flags

    NetB Router 2 3 (in hop count) t1, t2, t3 x,y

    NetA Router1 5 t1, t2, t3 x,y

    Table 3-2 Typical RIP Routing Table

    Note: in RIP the RT is the same as Forwarding Table

    - RIP maintains only the best route to a destination

    - messages exchanged at request or periodically ( e.g. 30 sec)- newer implementations- event triggered updates

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    56/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 57

    RIP packet format

    - command - specifies a request or response message

    - version number- specifies RIP implementation

    - up to 25 routes having the format:

    - address family IDshows the address family used (e.g. IP_addr)

    - addressIP destination address (4 octets),- metricHop count ( how many routers) up to the destination

    - a RIP message can contain the whole or part of the source RT

    - update timer30 sec ( each router sends its RT to neighbours each 30 sec)

    - route invalid timerwhen expires a route is marked invalid ( e.g. 90 sec), neighbours arenotified of this fact

    - route flush timerwhen expires route is erased from RT

    Figure 3-12 RIP packet format

    Stability features

    -Hop count limit( < 16) prevents count to infinity routing loops

    -Hold downrouters hold down any changes reported by neighbours regarding a route which

    was just removed route (prevent oscillations)

    - Split horizonavoids loops

    - Poison reverse updates increasing metric indicates loops; therefore a node detecting thissends a reverse messages to remove that route

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    57/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -2011-2012 58

    R1Net A

    directions to which R2 may forward

    and advertiseits route to NetA via R1

    R2

    (Net A, cost)

    Figure 3-13 Split horizon-prevent loops between adjacent routers

    RIP Extensions

    RIP-2RIP-2 is a draft standard protocol. Its status is elective (RFC 1723).

    RIP-2 extends RIP-1. It is less powerful than OSPF but it has the advantages of easy implementation

    and lower overheads.It can replace for RIP that can be used on small to medium-sized networks

    - can be employed in the presence of variable subnetting Classless Inter-Domain Routing(CIDR)

    - can interoperate with RIP-1

    RIPng for IPv6: intended to allow routers to exchange information for computing routes

    through an IPv6-based network (RFC2080 )

    3.3.5.2 Ad hoc On-Demand Distance Vector (AODV)AODV RFC 3561- is originally a reactive ( i.e. on demand) distance-vector routing protocol for

    mobile ad hoc networks (MANETs) and other wireless ad-hoc networks. AODV is capable of bothunicast and multicast routing. The usual metric is hop count.

    Other usage: in mesh networks.

    WLANS and Mesh networks

    - Technology: 802.11, 802.16, 802.15

    Figure 3-14 WLANs and Meshnetworks: a) WLAN-infrastructure; b) WLAN-ad hoc; c)

    mixedmode; d) mesh network.

  • 7/31/2019 RS-2011-2012-v0.1-15 feb -2012

    58/82

    RS-Sem IIRST

    Prof. E.Borcoci- UPB -20