100 likes | 235 Vues
Explore fundamental concepts in networking, focusing on routing tables, subnetting, Dijkstra’s algorithm, and NAT. Understand destination address ranges, link interfaces, and the longest prefix matching. Learn about subnetting techniques with examples, and how to find the number of addressable hosts using bits. Delve into link-state routing, reverse path forwarding techniques, and controlled flooding in networks. For additional questions or extra credit inquiries, don't hesitate to reach out at ramya@cs.ucsb.edu.
E N D
Network Layer CS176A Ramya Raghavendra
Routing table [Q1] Destination Address Range Link Interface 10000000 00000000 00000000 00000000 Through 0 10000000 11111111 11111111 11111111 1000001000000000 00000000 00000000 Through 1 10000010 00000000 11111111 11111111 10000010 00000001 00000000 00000000 Through 2 10000010 11111111 11111111 11111111 Otherwise 3
Subnetting [Q2] A F D E B C
Subnetting 214 97 254 /23 11010110 01100001 11111110 00000000 9 N bits – 2n addresses : 8 bits – 256 etc Each router: subnet (A,B or C) + 2 of (D, E, F) • Longest Prefix matching (Examples) • 11010110 01100001 11111111 : A • 11010110 01100001 11111110 0000000 : D
Dijkstra’s Algorithm Have some fun: http://www-b2.is.tokushima-u.ac.jp/~ikeda/suuri/dijkstra/Dijkstra.shtml
Link State Routing [Q6] u 5 6
Reverse Path Forwarding [Q7] • Controlled flooding • Router receives a broadcast packet • Checks if the packet came on the “shortest unicast link” to the source • Path used to send a unicast packet to source • If so, forwards it on all other links • Else discards it
Questions on Extra Credit?- Is it easy? YesEmail me!ramya@cs.ucsb.edu