Professional Documents
Culture Documents
Victor Moraru
Chapter 4
Network Layer
Computer
Networking: A
Top Down
Approach
6th edition
Jim Kurose, Keith
Ross
Addison-Wesley
March 2012
delivers segments to
physical physical
network
data link
transport layer physical
application
network layer protocols network
data link network
transport
network
value in arriving
packet’s header
0111 1
3 2
call setup, teardown for each call before data can flow
each packet carries VC identifier (not destination host
address)
every router on source-dest path maintains “state” for
each passing connection
link, router resources (bandwidth, buffers) may be
allocated to VC (dedicated resources = predictable
service)
1 3
2
VC number
interface
forwarding table in number
northwest router:
Incoming interface Incoming VC # Outgoing interface Outgoing VC #
1 12 3 22
2 63 1 18
3 7 2 17
1 97 3 87
… … … …
VC routers maintain
connection state information! Network Layer 4-15
Virtual circuits: signaling
protocols
used to setup, maintain teardown VC
used in ATM, frame-relay, X.25
not used in today’s Internet
application
6. receive data application
transport 5. data flow begins transport
network 4. call connected 3. accept call
network
data link 1. initiate call 2. incoming call
data link
physical physical
application application
transport transport
network 1. send datagrams 2. receive datagrams network
data link data link
physical physical
IP destination address in
arriving packet’s header
1
3 2
otherwise 3
examples:
DA: 11001000 00010111 00010110 10100001 which interface?
DA: 11001000 00010111 00011000 10101010 which interface?
Network Layer 4-20
Datagram or VC network: why?
Internet (datagram) ATM (VC)
data exchange among evolved from
computers telephony
“elastic” service, no human conversation:
strict timing req. strict timing, reliability
requirements
many link types need for guaranteed
different characteristics service
uniform service difficult “dumb” end systems
“smart” end systems telephones
(computers) complexity inside
can adapt, perform network
control, error recovery
simple inside network,
complexity at “edge”