Professional Documents
Culture Documents
Lec 15
Lec 15
Computer Networks
Lecture 15: Network Layer – Part 6
Mina Tahmasbi Arashloo
Fall 2023
A note on the slides
Computer Networking: A
Top-Down Approach
8th edition
Jim Kurose, Keith Ross
Pearson, 2020
Network layer: roadmap
§ Network layer: overview §Destination-based forwarding
• Routing and forwarding §Software-defined networking
• Service model • SDN overview
§ IP: the Internet Protocol • Generalized forwarding
§ Routing protocols • OpenFlow
• Link state §What should/does go in the
• Distance vector network?
§ Making routing scalable • End-to-end argument
• Intra-ISP routing: OSPF • Middleboxes
• Routing among ISPs: BGP
Where’s the intelligence?
application
application
transport
transport
network hop-by-hop (in-network) implementation of reliable data transfer network
data link
data link
physical network
physical
network network network network network link
link link link link link physical
physical physical physical physical physical
The end-to-end argument
§ some network functionality (e.g., reliable data transfer, congestion)
can be implemented in network, or at network edge
?
physical physical
?
?
?
? ?
application
?
application
transport
transport
network hop-by-hop (in-network) implementation of reliable data transfer network
data link
data link
physical network
physical
network network network network network link
link link link link link physical
physical physical physical physical physical
The end-to-end argument
§ some network functionality (e.g., reliable data transfer, congestion)
can be implemented in network, or at network edge
We call this line of reasoning against low-level function implementation the “end-
to-end argument.”
Saltzer, Reed, Clark 1981
The end-to-end argument
§ some network functionality (e.g., reliable data transfer, congestion)
can be implemented in network, or at network edge
👍
transport transport
network network
data link data link
physical physical
application
application
transport
👎
transport
network hop-by-hop (in-network) implementation of reliable data transfer network
data link
data link
physical network
physical
network network network network network link
link link link link link physical
physical physical physical physical physical
The IP hourglass
should go to
enterprise
network
Middleboxes (or Network Functions)
§ initially: proprietary (closed) hardware solutions
§ move towards “whitebox” hardware
§ Hardware providing an open API (programming interface)
§ Sometimes, SDN-like APIs are enough
§ e.g., simple firewalls
§ Sometimes, more specialized hardware, still programmable
§ Sometimes, high-speed implementation in software
§ network functions virtualization (NFV): specialized packet
processing in a VM.
The (more realistic) IP hourglass
20th century phone net: Internet (until early 2000s) Internet (now)
• intelligence/computing at • intelligence, computing at edge • Middleboxes/NFV
network switches • programmable network devices
Make sure you know
§ What a middleboxes is
§ Know some example middleboxes and what they do
§ How the functionality inside the network has changed since its early
days.
3 probes
managed device
managed device
request
Sounds
web server
simple!
Google’s network
64.233.169.105 64.233.160.0/19
router has
ARP server
Comcast network
68.80.0.0/13
§ IP datagram
§ IP datagram forwarded from campus
containing DNS query
forwarded via LAN network into Comcast network, routed
(tables populated by RIP, OSPF, IS-IS
switch from client to
and/or BGP routing protocols, or SDN
1st hop router
controller) to DNS server
Link Layer: 6-42
A day in the life…TCP connection carrying HTTP
HTTP
HTTP § to send HTTP request,
SYNACK
SYN TCP
SYNACK
SYN IP client first opens TCP
SYNACK
SYN Eth
Phy Comcast network
socket to web server
68.80.0.0/13
§ TCP SYN segment (step 1 in
TCP 3-way handshake) inter-
domain routed to web server
§ web server responds with
SYNACK
SYN
SYNACK
SYN
TCP
IP
TCP SYNACK (step 2 in TCP 3-
SYNACK
SYN Eth way handshake)
Phy