Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
29
Lecture Handout
Computer Networks
Lecture No. 29
CHAPTER 20
CONNECTIONLESS SERVICE:
End-to-end delivery service is connection less. The main features of
connectionless service are as follows:
It includes extension of LAN abstraction. It has universal addressing and the data
is delivered in packets (frames), each with a header. It combines collection of physical
networks into a single virtual network.
Transport protocols use this connectionless service to provide:
VIRTUAL PACKETS:
These packets serve same purpose in Internet as frames on LAN. Each packet has
a header. Routers, which are formally gateways, forward packets between physical
networks.
These packets have a uniform hardware-independent format. They include header
and data and can’t use format from any particular hardware. They are encapsulated in
hardware frames from delivery across each physical network.
IP DATAGRAM FORMAT:
Formally, the unit of IP data delivery is called a Datagram. It includes header area
and data area as shown in the figure below.
Figure 29.1
______________________________________________________________________________________
Page 1of 4
© Copyright Virtual University of Pakistan
CS610-Computer Networks Lecture No.29
IP DATAGRAM SIZE:
Datagrams can have different sizes i.e.
Header area is usually fixed (20 octets) but can have options. Data area can contain
between 1 octet and 65.535 octets (216-1).
Usually, data area is much larger than header.
FORWARDING DATAGRAMS:
Header contains all information needed to deliver datagram to the destination
computer. It contains:
• Destination address
• Source address
• Identifier
• Other delivery information
Router examines header of each datagram and forwards datagram along path to
destination.
ROUTING TABLE:
For efficiency, information about forwarding is stored in a routing table, which is
initialized at system initialization and must be updated as network topology changes.
The routing table contains list of destination networks and next hop for each destination.
An example routing table is shown in the figure below.
Figure 29.2
______________________________________________________________________________________
Page 2of 4
© Copyright Virtual University of Pakistan
CS610-Computer Networks Lecture No.29
Figure 29.3
ADDRESS MASKS:
To identify destination, network apply address mask to destination address and
compare to network address in routing table. It can use Boolean ‘and’ to compute the ith
entry in the table.
i.e.
if ((Mask[i] & D) == Dest[i] ) forward to NextHop[i]
• IP datagram
• Next-hop address
______________________________________________________________________________________
Page 3of 4
© Copyright Virtual University of Pakistan
CS610-Computer Networks Lecture No.29
BEST-EFFORT DELIVERY:
IP provides service equivalent to LAN. It does not guarantee to prevent duplicate
datagrams, delayed or out-of-order delivery, corruption of data and datagram loss.
Transport layer provides reliable delivery. Network layer – IP – can detect and
report errors without actually fixing them. It focuses on datagram delivery. Application
layer is not interested in differentiating among delivery problems at intermediate routers.
______________________________________________________________________________________
Page 4of 4
© Copyright Virtual University of Pakistan