Network Layer Protocols.ppt

Embed Size (px)

Citation preview

  • 7/27/2019 Network Layer Protocols.ppt

    1/22

    Network Layer Protocols

    Network Layer Protocols are of two types:

    1. Connection Oriented Protocols

    Eg. X.25

    2. Connectionless Protocols

    Eg. IP

  • 7/27/2019 Network Layer Protocols.ppt

    2/22

    Network Layer Protocols (cotd.)

    Connection Oriented Protocols:

    Employ virtual circuits

    Routing is decided at the VC setup time

    Provides End-to-End Flow and Error Control

    Delivers all packets in proper order

    Less overhead in packets

    Loss of node/VC causes loss of all packets in VC

    Unable to adapt to network traffic conditions

  • 7/27/2019 Network Layer Protocols.ppt

    3/22

    Network Layer Protocols (contd.)

    Connectionless Protocols

    No end to end connectivity

    No flow control or error control by network layer. (It is

    left to the Transport layer.)

    Each packet is independent and each finds its route.Packet header must carry full information.

    Packets can arrive at the destination out of order.

    No circuit set up time involved.

    More robust.

    Can adapt to network changing network traffic

    conditions.

    Loss of a node causes only the loss of packets there.

  • 7/27/2019 Network Layer Protocols.ppt

    4/22

    Network Layer Protocols (contd.)

    X.25 Protocol

    Connection Oriented Protocol

    ITU-T Recommendation Introduced in 1976.

    Defined ad the interface between DTE and DCE. i.e. theinterface between Packet Mode Terminal and Packet

    Switching Exchange.

    DTE Data Terminal Equipment

    DCE Data Circuit-terminating Equipment

    Employs Virtual Circuits (either Switched Virtual Circuit (SVC)

    or Permanent Virtual Circuit (PVC)).

  • 7/27/2019 Network Layer Protocols.ppt

    5/22

    X.25 (contd.)

    X.25 Layers

    Physical layer X.21 or X.21 bis (EIA RS232 equivalent)

    Link Layer LAP B (HDLC in ABM)

    Network Layer X.25 LAP B

    I frames to send data

    S frames for flow and error control

    U frames to setup and manage connection

    Eg. SABM followed by UA followed by several I frames and

    then a DISC and UA to terminate.

  • 7/27/2019 Network Layer Protocols.ppt

    6/22

    X.25 (contd.)

    X.25 Packet Layer

    Called the Packet Layer Protocol (PLP)

    Responsible for (a) Establishing connection, (b) Transferringdata, and (c) Terminating connection.

    Responsible for creating the virtual circuit and negotiatingservice options between DTEs.

    Note:

    Frame layer (i.e. link layer) is responsible for making

    connection between DTE and DCE.Packet layer (X.25) is responsible for making connectionbetween Two DTEs. (i.e. end-to-end connection.)

  • 7/27/2019 Network Layer Protocols.ppt

    7/22

    X.25 (Contd.)

    X.25 Flow and Error Control

    Done at both frame and network layers

    Frame layer does it across a link

    Network layer does it end-to-endNote:

    X.25 Virtual Circuit is created at the network layer and not at

    the link layer.

    (In contrast, the Frame Relay and ATM are created at the linklayer.)

    X.25 Packet Format

  • 7/27/2019 Network Layer Protocols.ppt

    8/22

    X.25 (Contd.)

    X.25 Packet Format

    General Format Identifier

    Identifies packet parameters i.e., data or controlinformation, what kind of window flow control, whether

    delivery confirmation is required. Logical Channel Identifier

    Identifies the virtual circuit across the local DTE/DCEinterface.

    Packet Type Identifier

    Identifies the packet type if it is a control packet.

    User Data

    This field carries the user data.

  • 7/27/2019 Network Layer Protocols.ppt

    9/22

    X.25 (Contd.)

    X.25 Disadvantages

    Was designed for PSTN which was slow at the time.

    Max. speed available is 48 kbps. This is insufficient for modern

    day data transactions. Addressing scheme (X.21) is based on the telephone

    numbering system.

    Has superfluous error control that makes the throughput

    small. Some X.25 provisions (such as the operation of Character

    Mode Terminals) have become obsolete.

  • 7/27/2019 Network Layer Protocols.ppt

    10/22

    X.25 Related Other Protocols

    X.121

    Provides the global addressing scheme used in X.25 packet

    addressing.

    Address Format:DNIC (4 digits) NTN (10 digits)

    DNIC Data Network Identification Code defines the specific

    network. First 3 digits define the country and the 4th defines

    the network inside that country.NTN National Terminal Number defines the DTE inside the

    particular network.

  • 7/27/2019 Network Layer Protocols.ppt

    11/22

    Frame Relay Networks

    Frame Relay Features and Advantages

    Operates at the link layer

    Virtual circuit mode operation

    No flow control or error controlFrame error check done only to see if the frame should be passed on

    or dropped.

    Less overhead compared to X.25 in frame format

    Relies on improved transmission media, such as fiberIt particularly suits for protocols like TCP/IP since there is no

    duplication at the network layer

  • 7/27/2019 Network Layer Protocols.ppt

    12/22

    Frame Relay Networks (Contd.)

    Frame relay doesnt need fixed bit rate (like X.25) and thus is

    more suitable for bursty data.

    Frame relay frame size can be up to 9000 bytes and thus can

    accommodate all LAN frames.

    Frame Relay Disadvantages

    Frame relay can operate at bit rates up to 44.376 Mbps. But

    this is not enough for some services.

    Frame relay allows variable frame lengths. This can createunfair delays for some users.

    Because of the variable delay (due to variable frame length)

    frame relay is not suitable for real time traffic.

  • 7/27/2019 Network Layer Protocols.ppt

    13/22

    Frame Relay Operation

    FR provides both switched and permanent VCs

    FR provides connection of LANs or Main Frame Computers to

    each other in a WAN.

    The facility that provides the connection on the LAN or Main

    Frame side is the DTE, and could be a Router, a Bridge, or a

    Man Frame Computer.

    The facility that provides switching of Frames in the WAN is

    the DCE, and is a switching centre.

    Since Frame relay operates with VCs, the packets carry VC

    identifiers and not addresses. This identifier is called the Data

    Link Connection Identifier (DLCI).

  • 7/27/2019 Network Layer Protocols.ppt

    14/22

    Frame Relay Layers

    Physical Layer

    No specific protocol is specified for the physical layer of the

    Frame Relay. Frame relay supports any of the protocols

    recognized by ANSI.

    Data Link Layer

    At the data link layer FR employs a simplified version of HDLC

    called LAP F.

    Flag Address Information FCS Flag

    Note that the Control field is missing

    The Address field is divided into several subfields:

  • 7/27/2019 Network Layer Protocols.ppt

    15/22

    Frame Relay Data Link Layer (contd.)

    Address Field Format:

    DLCI C/R EA DLCI FECN BECN DE EA

    6 bits 1 bit 1 bit 4 bits 1 bit 1 bit 1 bit 1 bit

    DLCI (6+4=10 bits) gives the VC identifier.Command/Response bit is for the use of the upper layer.

    EA is Extended Address bit. If it is 0 then the address field has

    another byte to follow. If it is 1 the current byte is the last.

    FECN is Forward Explicit Congestion Notification.BECN is Backward Explicit Congestion Notification.

    DE is Discard Eligibility bit. If 1 do not discard.

  • 7/27/2019 Network Layer Protocols.ppt

    16/22

    Congestion Control in Frame Relay

    Congestion occurs when inflow data at a node exceeds its

    handling capacity. Congestion can bring down a network quite

    rapidly.

    X.25 has flow control at both link and network layers. At link

    level it controls the flow of data across a link. At network layer

    it provides end-to-end flow control.

    Frame Relay has no flow control.

    Frame Relay allows the user to send bursty data. This makes

    Frame Relay networks vulnerable for traffic congestion.

    Therefore some congestion control mechanism at frame level

    is required. Two bits, BECN and FECN, do this.

  • 7/27/2019 Network Layer Protocols.ppt

    17/22

    Congestion Control in Frame Relay (Contd.)

    BECN warns the sender about the congestion in the network. Thiswarning can come (from the receiver) as a separate (special) frame,or in another receiving frame if it is a full-duplex link.

    FECN warns the receiver that congestion has occurred in thenetwork. Frame relay it self cannot do anything about it but it cancommunicate with the sender and seek assistance from higher layerprotocols.

    When senders are not responding to congestion notifications theFrame Relay switches will discard frames, depending on the statusof the Discard Eligibility bit.

    Senders are informed by the upper layers (such as Transport layerwhich will recognize the congestion) about the discarded frames,and will be requested to resend those discarded frames.

  • 7/27/2019 Network Layer Protocols.ppt

    18/22

    Frame Relay Congestion Control

    Leaky Bucket Algorithm

    Behavior of Frame Relay Switch is similar to a leaky bucket

    that has a small hole at the bottom.

    The water leaks from the bucket at a constant rate

    irrespective of the inflow to the bucket (as long as the bucket

    is not empty).

    If the inflow to bucket is too rapid the bucket may overflow.

    Each Frame Relay Switch can be set to send data at a certain

    rate. If data is received at a rate faster than the sent out rate

    the switch is congested and the data frames will have to be

    discarded.

  • 7/27/2019 Network Layer Protocols.ppt

    19/22

    Frame Relay Congestion Control

    Ex. A one inlet one outlet frame relay switch with buffer has aninput data stream that comes in bursts at a rate of 40 Mbps.The burst duration is 100 ms. The gaps between data burstsare 1 min. long. If the switch has to avoid congestion, what

    should be the minimum buffer size?Minimum buffer size = 40 Mbps x 100 ms = 4 Mb

    Ex. If the output line has a capacity of 1.544 Mbps cancongestion be avoided with this buffer?

    Time taken to empty the buffer = 4/1.544 sec.

    Since this is less than 1 min. the congestion can be avoided.

  • 7/27/2019 Network Layer Protocols.ppt

    20/22

    Frame Relay Traffic Control

    Congestion strategies require Frame Relay to take Traffic

    Control measures to determine when to set BECN, FECN, DE,

    etc. and to discard frames.

    For this four different traffic attributes are taken into account.

    Access rate

    Committed Burst Size

    Committed Information Rate

    Excess burst rate These are set during the VC establishment phase after

    negotiations between the user and the network.

  • 7/27/2019 Network Layer Protocols.ppt

    21/22

    Frame Relay Traffic Control (contd.)

    Access Rate

    For each connection the access rate (bps) is defined.

    The value depends on the bandwidth of the channel connecting theuser to the network.

    User cannot exceed this rate.Eg.If the access is through a G703 link, then the access rate cannotexceed 2 Mbps.

    Committed Burst Size

    This is the maximum number of bits the network is committed to

    transfer in a predefined period, without discarding any frames (orsetting DE bit).

    Eg. 400 kb in 4 sec. (could be 300 kb in 1st sec. +100 kb in last sec.)

  • 7/27/2019 Network Layer Protocols.ppt

    22/22

    Frame Relay Traffic Control (contd.)

    Committed Information Rate

    This is the average rate of information the user can send to

    the network. As long as this is not exceeded the frames will

    not be discarded.

    The value of Committed Information Rate (CIR) is related to

    Committed Burst Size (CBS).

    CIR = CBS/Burst Time

    Excess Burst Size

    This is the maximum number of bits in excess of CBS that a

    user is allowed to send in a predefined period. Network will

    honor this if there is no congestion.