throbber
324
`
`THE NETWORK LAYER
`
`CHAP. 5
`
`can assume that the subnet provides OSI service, even if it does not. Since internet(cid:173)
`working frequently involves connecting one or more nonstandard networks, having
`a structural way to deal with strange subnets is essential.
`In the previous example, the subnet service was not good enough (it lacked
`NSAP addressing). It can also happen that the subnet service is too good, and must
`be de-enhanced (degraded?) to match up to what the internet sublayer requires.
`One example is a relay between a datagram subnet and a virtual circuit subnet.
`The internet sublayer can be designed with either type of service in mind. If
`datagram service has been chosen, then it is up to the subnet enchancement layer on
`the virtual circuit side to hide the virtual circuits and just provide datagram service
`to the internet sublayer. If it cannot devise any better strategy, for every datagram
`offered to it, it can establish a virtual circuit, send the datagram, and then release
`the virtual circuit. In practice, the subnet enhancement sublayer would not release
`the virtual circuit until it had been idle for several minutes because there is a high
`probability it could be used again.
`The principal task of the internet sublayer is end-to-end routing. When a packet
`arrives at a relay, it works its way up to the internet sublayer, which examines it
`and decides whether to forward it, and if so, using which subnet (a multilateral
`relay may have several subnets to choose from). To a first approximation, routing
`across multiple subnets is similar to routing within a single subnet, and the tech(cid:173)
`niques we have studied earlier are relevant. For a large internet, hierarchical rout(cid:173)
`ing is an obvious candidate, since it frees the relays from having to know about the
`internal structure of distant subnets.
`The relay of Fig. 5-27 extends up as far as layer 3 and moves packets between
`networks in that layer. In the general (non OSI) case, relaying can be done in any
`layer. Four common types of relays are as follows:
`
`Layer 1: Repeaters copy individual bits between cable segments.
`
`Layer 2: Bridges store and forward frames between LANs.
`
`Layer 3: Gateways store and forward packets between dissimilar networks.
`
`Layer 4: Protocol converters provide interfacing in higher layers.
`
`Repeaters are low-level devices that amplify just electrical signals. They are
`needed to provide current to drive long cables. In 802.3, for example, the timing
`properties of the MAC protocol (the value of 't chosen) allow cables up to 2.5 km,
`but the transceiver chips can only provide enough power to drive 500 meters. The
`solution is to use repeaters to extend the cable length where that is desired.
`Unlike repeaters, which copy the bits as they arrive, bridges are store-and(cid:173)
`f orward devices. A bridge accepts an entire frame and passes it up to the data link
`layer where the checksum is verified. Then the frame is sent down to the physical
`layer for forwarding on a different subnet. Bridges can make minor changes to the
`
`Ex.1067.121
`
`DELL
`
`

`

`SEC. 5.4
`
`INTERNETWORK.ING
`
`325
`
`frame before forwarding it, such as adding or deleting some fields from the frame
`header. Since they are data link layer devices, they do not deal with headers at
`layer 3 and above, and cannot make changes or decisions that depend on them.
`Gateways are conceptually similar to bridges, except that they are found in the
`network layer. The relay of Fig. 5-27 is a gateway. Some people use the term gate(cid:173)
`way in a generic sense, applicable to any layer, and the term router for a network
`layer gateway. In this chapter "gateway" will refer to the network layer.
`As a general rule, the networks connected by a gateway can differ much more
`than those connected by a bridge. In Fig. 5-26, the LANs are connected by a
`bridge; the LAN-WAN and WAN-WAN relays are gateways. A major advantage
`of gateways over bridges is that they can connect networks with incompatible
`addressing formats, for example, an 802 LAN using 48-bit binary addresses and an
`X.25 network using 14 decimal digit X.121 addresses.
`At the transport layer and above, the relays are usually called protocol convert(cid:173)
`ers, although the term "gateway'' is used by some people, as mentioned above.
`The job of a protocol converter is much more complex than that of a gateway. The
`protocol converter must convert from one protocol to another without losing too
`much meaning in the process. An example of a protocol converter is a relay that
`translates the OSI transport protocol to the protocol used in the ARP A Internet
`(TCP). Another example of protocol conversion is converting OSI mail messages
`(MOTIS) to ARPA Internet format (RFC 822).
`Regardless of which layer the relaying is done in, the complexity of the job
`depends mostly on how similar the two networks are in terms of frames, packets,
`messages, and protocols. Some of the ways networks can differ are frame, packet,
`and message size, checksum algorithms, maximum packet lifetimes, connection(cid:173)
`oriented vs. connectionless protocols, and timer values. Sometimes the conversion
`is not even possible, for example, when trying to forward expedited data (someone
`hit the DEL key) through a network not having any concept of expedited data.
`
`5.4.2. Bridges
`
`In this section we will look at bridge design. In the following ones we will
`study gateways. In a sense, the material about bridges might logically have been
`covered in Chapter 3 or Chapter 4, but as a convenience to the reader, we have
`decided to put all the material on internetworking in one place. Most bridges con(cid:173)
`nect 802 LAN s, so we will concentrate primarily on 802 bridges.
`Before getting into the technology of bridges, it is worthwhile taking a look at
`some common situations in which bridges are used. We will mention six reasons
`why a single organization may end up with multiple LAN s. First, many university
`and corporate departments have their own LAN s, primarily to connect their own
`personal computers, workstations, and minicomputers. Since the goals of the vari(cid:173)
`ous departments differ, different departments choose different LANs, without
`regard to what other departments are doing. Sooner or later, there is a need for
`
`Ex.1067.122
`
`DELL
`
`

`

`

`

`

`

`

`

`SEC. 5.4
`
`INTERNETWORKING
`
`329
`
`the configuration, but for the standard 10-Mbps system it is 1518 bytes. For 802.4
`it is fixed at 8191 bytes. For 802.5 there is no upper limit, except that a station may
`not transmit longer than the token holding time. With the default value of 10 msec,
`the maximum frame length is 5000 bytes.
`The obvious problem is what happens when a long frame must be forwarded
`onto a LAN that cannot accept it? Splitting the frame into pieces is out of the ques(cid:173)
`tion in this layer. All the protocols assume that frames either arrive or they do not.
`There is no provision for reassembling frames out of smaller units. This is not to
`say that such protocols could not be devised. They could be and have been. It is
`just that 802 does not provide this feature. Basically, there is no solution. Frames
`that are too large to be forwarded must be discarded. So much for transparency.
`Now let us briefly consider each of the nine cases of 802.x to 802.y bridges to
`see what other problems are lurking in the shadows. From 802.3 to 802.3 is easy.
`The only thing that can go wrong is that the destination LAN is so heavily loaded
`that frames keep pouring into the bridge, but the bridge cannot get rid of them. If
`this situation persists long enough, the bridge might run out of buffer space and
`begin dropping frames. Since this problem is always potentially present when for(cid:173)
`warding onto an 802.3 LAN, we will not mention it further. With the other two
`LANs, each station, including the bridge is guaranteed to acquire the token periodi(cid:173)
`cally, and cannot be shut out for long intervals.
`From 802.4 to 802.3 two problems exist. First, 802.4 frames carry priority bits
`that 802.3 frames do not have. As a result, if two 802.4 LAN s communicate via an
`802.3 LAN, the priority will be lost the intermediate LAN.
`The second problem is caused by a specific feature in 802.4: temporary token
`handoff. It is possible for an 802.4 frame to have a header bit set to 1 to tem(cid:173)
`porarily pass the token to the destination, to let it send an acknowledgement frame.
`However, if such a frame is forwarded by a bridge, what should the bridge do? If it
`sends an acknowledgement frame itself, it is lying because the frame really has not
`been delivered yet. In fact, the destination may be dead.
`On the other hand, if it does not generate the acknowledgement, the sender will
`almost assuredly conclude that the destination is dead and report back failure to its
`superiors. There does not seem to be any way to solve with this problem.
`From 802.5 to 802.3 we have a similar problem. The 802.5 frame format has A
`and C bits in the frame status byte. These bits are set by the destination to tell the
`sender whether the station addressed saw the frame, and whether it copied it.
`Again here, the bridge can lie and say the frame has been copied, but if it later turns
`out that the destination is down, serious problems may arise. In essence, the inser(cid:173)
`tion of a bridge into the network has changed the semantics of the bits.
`From 802.3 to 802.4 we have the problem of what to put in the priority bits. A
`good case can be made for having the bridge retransmit all frames at the highest
`priority, because they have probably suffered enough delay already.
`From 802.4 to 802.4 the only problem is what to do with the temporary token
`handoff. At least here we have the possibility of the bridge managing to forward
`
`Ex.1067.126
`
`DELL
`
`

`

`330
`
`THE NETWORK LA YER
`
`CHAP. 5
`
`the frame fast enough to get the response before the timer runs out. Still it is a
`gamble. By forwarding the frame at the highest priority, the bridge is telling a little
`white lie, but it thereby increases the probability of getting the response in time.
`From 802.5 to 802.4 we have the same problem with the A and C bits as before.
`Also, the definition of the priority bits is different for the two LAN s, but beggars
`can't be choosers. At least the two LANs have the same number of priority bits.
`All the bridge can do is copy the priority bits across and hope for the best.
`From 802.3 to 802.5 the bridge must generate priority bits, but there are no
`other special problems. From 802.4 to 802.5 there is a potential problem with
`frames that are too long and the token handoff problem is present again. Finally,
`from 802.5 to 802.5 the problem is what to do with the A and C bits again. Figure
`5-31 summarizes the various problems we have been discussing.
`Destination LAN
`802.4 (Token bus)
`
`802.5 (Token ring)
`
`802.3(CSMA/CD)
`
`802.3
`
`802.4
`
`Source
`LAN
`
`1,5,9,8,10
`
`1, 4
`
`9
`
`1, 2, 4, 8
`
`1, 2, 3, 8, 9, 10
`
`802.5
`
`1,2,5,6, 7, 10
`
`1, 2, 3, 6, 7
`
`6, 7
`
`Actions:
`1. Reformat the frame and compute new checksum.
`2. Reverse the bit order.
`3. Copy the priority, meaningful or not.
`4. Generate a ficticious priority.
`5. Discard priority.
`6. Drain the ring (somehow).
`7. Set A and C bits (by lying).
`8. Worry about congestion (fast LAN to slow LAN).
`9. Worry about token handoff ACK being delayed or impossible.
`10. Panic if frame is too long for destination LAN.
`
`Parameters assumed:
`802.3:
`1518-byte frames, 10 Mbps (minus collisions)
`802.4:
`8191-byte frames 10 Mbps
`802.5:
`5000-byte frames
`4 Mbps
`
`Fig. 5-31. Problems encountered in building bridges from 802.x to 802.y.
`
`When the IEEE 802 committee set out to come up with a LAN standard, it was
`unable to agree on a single standard, so it produced three incompatible standards, as
`we have just seen in some detail. For this failure, it has been roundly criticized.
`When it was later assigned the job of designing a standard for bridges to intercon(cid:173)
`nect its three incompatible LAN s, it resolved to do better. It did. It came up with
`two incompatible bridge designs. So far nobody has asked it to design a gateway
`standard to connect its two incompatible bridges, but at least the trend is in the right
`direction.
`This section has dealt with the problems encountered in connected two LAN s
`
`Ex.1067.127
`
`DELL
`
`

`

`

`

`332
`
`THE NETWORK LA YER
`
`CHAP. 5
`
`which the bridge is connected except the one it arrived on. As time goes on, the
`bridges learn where destinations are, as described below. Once a destination is
`known, frames destined for it are put on only the proper LAN, and are not flooded.
`The algorithm used by the transparent bridges is Baran' s backward learning.
`As mentioned above, the bridges operate in promiscuous mode, so they see every
`frame sent on any of their LANs. By looking at the source address, they can tell
`which machine is accessible on which LAN. For example, if bridge 1 in Fig. 5-32
`sees a frame on LAN 2 coming from C it knows that C must be reachable via LAN
`2, so it makes an entry in its hash table noting that frames going to C should use
`LAN 2. Any subsequent frame addressed to C coming in on LAN 1 will be for(cid:173)
`warded, but a frame for C coming in on LAN 2 will be discarded.
`The topology of the internetwork can change as machines and bridges are
`powered up and down and moved around. To handle dynamic topologies, when(cid:173)
`ever a hash table entry is made, the arrival time of the frame is noted in the entry.
`Whenever a frame that is already in the table arrives, its entry is updated with the
`current time. Thus the time associated with every entry tells the last time a frame
`from that machine was seen.
`Periodically, a process in the bridge scans the hash table and purges all entries
`more than a few minutes old. In this way, if a computer is unplugged from its
`LAN, moved around the building, and replugged in somewhere else, within a few
`minutes it will be back in normal operation, without any manual intervention. This
`algorithm also means that if a machine is quiet for a few minutes, any traffic sent to
`it will have to be flooded, until it next sends a frame itself.
`The routing procedure for an incoming frame depends on the LAN it arrives on
`(the source LAN) and the LAN its destination is on (the destination LAN), as fol(cid:173)
`lows:
`
`1. If destination and source LAN s are the same, discard the frame.
`
`2. If the destination and source LAN s are different, forward the frame.
`
`3. If the destination LAN is unknown, use flooding.
`
`As each frame arrives, this algorithm must be applied. Special purpose VLSI chips
`exist to do the lookup and update the table entry, all in a few microseconds.
`To increase reliability, some sites use two or more bridges in parallel between
`pairs of LANs, as shown in Fig. 5-33. This arrangement, however, also introduces
`some additional problems because it creates loops in the topology.
`A simple example of these problems can be seen by observing how a frame, F,
`with unknown destination is handled in Fig. 5-33. Each bridge, following the nor(cid:173)
`mal rules for handling unknown destinations, uses flooding, which in this example,
`just means copying it to LAN 2. Shortly thereafter, bridge 1 sees F 2, a frame with
`an unknown destination, which it copies to LAN 1, generating F 3. Similarly, bridge
`
`Ex.1067.129
`
`DELL
`
`

`

`

`

`334
`
`THE NETWORK LA YER
`
`CHAP. 5
`
`much too long to run. An algorithm that can handle large networks by partitioning
`them into multiple communicating spanning trees is described by Sincoskie and
`Cotton (1988).
`
`Source Routing Bridges
`
`Transparent bridges have the advantage of being easy to install. You just plug
`them in and walk away. On the other hand, they do not make optimal use of the
`bandwidth, since they only use a subset of the topology (the spanning tree). The
`relative importance of these two (and other) factors led to a split within the 802
`committees (Pitt, 1988). The CSMNCD and token bus people chose the trans(cid:173)
`parent bridge. The ring people (with encouragement from IBM) preferred a
`scheme called source routing, which we will now describe. For addition details,
`see (Dixon and Pitt, 1988; Hamner and Samsen, 1988; and Pitt and Winkler, 1987).
`Reduced to its barest essentials, source routing assumes that the sender of each
`frame knows whether or not the destination is on its own LAN. When sending a
`frame to a different LAN, the source machine sets the high-order bit of the destina(cid:173)
`tion address to 1, to mark it. Furthermore, it includes in the frame header the exact
`path that the frame is to follow.
`This path is constructed as follows. Each LAN has a unique 12-bit number, and
`each bridge has a 4-bit number that uniquely identifies it in the context of its LAN s.
`Thus, two bridges far apart may both have number 3, but two bridges on the same
`LAN must have different bridge numbers. A route is then a sequence of bridge,
`LAN, bridge, LAN, ... numbers. Referring to Fig. 5-32, the route from A to C
`would be (Bl, L2, B2, L3), where we have added the codes B and L for conve(cid:173)
`nience, to show which items are bridges and which are LAN s.
`A source routing bridge is only interested in those frames with the high-order
`bit of the destination set to 1. For each such frame that it sees, it scans the route
`looking for the number of the LAN on which the frame arrived. If this LAN
`number is followed by its own bridge number, the bridge forwards the frame onto
`the LAN whose number follows its bridge number in the route. If the incoming
`LAN number is followed by the number of some other bridge, it does not forward
`the frame.
`This algorithm lends itself to three possible implementations:
`
`1. Software: the bridge runs in promiscuous mode, copying all frames to
`its memory to see if they have the high-order destination bit set to 1. If
`so, the frame is inspected further, otherwise it is not.
`
`2. Hybrid: the bridge's LAN interface inspects the high-order destination
`bit and only gives it frames with the bit set. This interface is easy to
`build into hardware and greatly reduces the number of frames the
`bridge must inspect.
`
`Ex.1067.131
`
`DELL
`
`

`

`SEC. 5.4
`
`INTERNETWORK.ING
`
`335
`
`3. Hardware: the bridge's LAN interface not only checks the high-order
`destination bit, but it also scans the route to see if this bridge must do
`forwarding. Only frames that must actually be forwarded are given to
`the bridge. This implementation require the most complex hardware,
`but wastes no bridge CPU cycles because all irrelevant frames are
`screened out.
`
`These three implementations vary in their cost and performance. The first one has
`no additional hardware cost for the interface, but may require a very fast CPU to
`handle all the frames. The last one requires a special VLSI chip, but offloads much
`of the processing from the bridge to the chip, so that a slower CPU can be used, or
`alternatively, the bridge can handle more LANs.
`Implicit in the design of source routing is that every machine in1 the internet(cid:173)
`work knows the exact path to every other machine. How these routes are
`discovered is an important part of the source routing algorithm. The basic idea is
`that if a destination is unknown, the source issues a broadcast frame asking where it
`is. This discovery frame is copied by every bridge so that it reaches every LAN on
`the internetwork. When the reply comes back, the bridges record their identity in
`it, so that the original sender can see the exact route taken and ultimately choose the
`best route.
`While this algorithm clearly finds the best route (it finds all routes), it suffers
`from a frame explosion. Consider the configuration of Fig. 5-34, with N LANs
`linearly connected by triple bridges. Each discovery frame sent by machine A is
`copied by each of the three bridges on LAN 1, yielding three discovery frames on
`LAN 2. Each of these is copied by each of the bri;es on LAN 2, resulting in nine
`frame on LAN 3. By the time we reach LANN, 3 -1 frames are circulating. If a
`dozen sets of bridges are traversed, more than half a million discovery frames will
`have to be injected into the last ring, causing severe congestion.
`
`Bridge
`
`LAN
`
`~ ~
`
`A--
`
`2
`
`3
`
`4
`
`N
`
`Fig. 5-34. A series of LANs connected by triple bridges.
`
`A somewhat analogous process happens with the transparent bridge, only not
`nearly so severe. When an unknown frame arrives, it is flooded, but only along the
`spanning tree, so the total volume of frames sent is linear with the size of the net(cid:173)
`work, not exponential.
`
`Ex.1067.132
`
`DELL
`
`

`

`336
`
`THE NETWORK LA YER
`
`CHAP. 5
`
`Once a host has discovered a route to a certain destination, it stores the route in
`a cache, so that the discovery process will not have to be run next time. While this
`approach greatly limits the impact of the frame explosion, it does put some admin(cid:173)
`istrative burden on all the hosts, and the whole algorithm is definitely not trans(cid:173)
`parent.
`
`Comparison of 802 Bridges
`
`The transparent and source routing bridges each have advantages and disadvan(cid:173)
`tages. In this section we will discuss some of the major ones. They are summa(cid:173)
`rized in Fig. 5-35 and covered in more detail in (Soha and Perlman, 1988; and
`Zhang, 1988). Be warned, however, that every one of the points is highly con(cid:173)
`tested.
`
`Issue
`
`Transparent bridge
`
`Source routing bridge
`
`Orientation
`Transparency
`
`Connectionless
`
`Connection-oriented
`
`Fully transparent
`
`Not transparent
`
`I I
`l
`
`Manual
`
`Optimal
`
`Configuration
`
`Automatic
`
`Suboptimal
`
`Routing
`
`Locating
`
`Failures
`
`Backward learning
`
`Discovery frames
`
`Handled by the bridges
`
`Handled by the hosts
`
`Complexity
`
`In the bridges
`
`In the hosts
`
`Fig. 5-35. Comparison of transparent and source routing bridges.
`
`At the heart of the difference between the two bridge types is the distinction
`between connectionless and connection-oriented networking. The transparent
`bridges have no concept of a virtual circuit at all, and route each frame indepen(cid:173)
`dently from all the others. The source routing bridges, in contrast, determine a
`route using discovery frames and then use that route thereafter.
`The transparent bridges are completely invisible to the hosts and are fully com(cid:173)
`patible with all existing 802 products. The source bridges are neither transparent
`nor compatible. To use source routing, hosts must be fully aware of the bridging
`scheme, and must actively participate in it.
`When using transparent bridges, no network management is needed. The
`bridges configure themselves to the topology automatically. With source routing
`bridges, the network manager must manually install the LAN and bridge numbers.
`Mistakes, such as duplicating a LAN or bridge number, can be very difficult to
`detect, as they may cause some frames to loop, but not others on different routes.
`Furthermore, when connecting two previously disjoint internetworks, with trans(cid:173)
`parent bridges there is nothing to do except connect them, whereas with source
`routing, it may be necessary to manually change many LAN numbers to make them
`unique in the combined internetwork.
`
`Ex.1067.133
`
`DELL
`
`

`

`. SEC. 5.4
`
`INTERNETWORK.ING
`
`337
`
`One of the few advantages of source routing is that, in theory, it can use optimal
`routing, whereas transparent bridging is .testricted to the spanning tree. Further(cid:173)
`more, source routing can also make good use of parallel bridges between two LAN s
`to split the load. Whether actual bridges will be clever enough to make use of these
`theoretical advantages is questionable.
`Locating destinations is done using backward learning in the transparent bridge
`and using discovery frames in source routing bridges. The disadvantage of back(cid:173)
`ward learning is that the bridges have to wait until a frame from a particular
`machine happens to come along in order to learn where that machine is. The disad(cid:173)
`vantage of discovery frames is the exponential explosion in moderate to large inter(cid:173)
`networks with parallel bridges.
`Failures handling is quite different in the two schemes. Transparent bridges
`learn about bridge and LAN failures and other topology changes quickly and
`automatically, just from listening to each other's control frames. Hosts do not
`notice these changes at all.
`With source routing, the situation is quite different. When a bridge fails,
`machines that are routing over it initially notice that their frames are no longer
`being acknowledged, so they time out and try over and over. Finally, they conclude
`that something is wrong, but they still do not know if the problem is with the desti(cid:173)
`nation itself, or with the current route. Only by sending another discovery frame
`can they see if the destination is available. Unfortunately, when a major bridge
`fails, a large number of hosts will have to experience timeouts and send new
`discovery frames before the problem is resolved, even if an alternative route is
`available. This greater vulnerability to failures is one of the major weaknesses of
`all connection-oriented systems.
`Finally, we come to complexity and cost, a very controversial topic. H source
`routing bridges have a VLSI chip that reads in only those frames that must be for(cid:173)
`warded, these bridges will experience a lighter frame processing load and deliver a
`better performance for a given investment in hardware. Without this chip they will
`do worse because the amount of processing per frame (searching the route in the
`frame header) is substantially more.
`In addition, source routing puts extra complexity in the hosts: they must store
`routes, send discovery frames, and copy route information into each frame. All of
`these things require memory and CPU cycles. Since there are typically one to two
`orders of magnitude more hosts than bridges, it may be better to put the extra cost
`and complexity into a few bridges, rather than in all the hosts.
`
`5.4.3. Gateways
`
`In contrast to bridges, gateways operate at the network level. This gives them
`more flexibility, for example, in translating addresses between very dissimilar net(cid:173)
`works, but it also makes them slower. As a consequence, gateways are commonly
`
`Ex.1067.134
`
`DELL
`
`

`

`338
`
`THE NETWORK LAYER
`
`CHAP. 5
`
`used in WAN s, where no one expects them to handle more than 10,000 packets/sec,
`a common requirement for LAN bridges.
`Two styles of gateways are common, one for connection-oriented networks and
`one for connectionless networks. We will study both of these in turn below.
`
`Connection-Oriented Gateways
`
`The OSI model permits two styles of internetworking: a connection-oriented
`concatenation of virtual circuit subnets, and a datagram internet style. In this sec(cid:173)
`tion we will look at the virtual circuit approach; in the next one we will examine
`the datagram method.
`The virtual circuit method differs from interconnection using bridges in that it
`happens in the network layer (see Fig. 5-27) rather than the data link layer, but it
`also differs in other ways. One of these differences stems from the nature of a
`bridge. It is a small minicomputer or microcomputer. When the bridge and all the
`LAN s are owned by the same organization, ownership and operation of the bridge
`do not generate any special problems. However, when a gateway is between two
`WAN s run by different organizations, possibly in different countries, the joint
`operation of a small minicomputer can lead to a lot of finger pointing.
`To eliminate these problems, a slightly different approach is taken. The relay
`of Fig. 5-27 is effectively ripped apart in the middle and the two parts of 3c are
`connected with a wire, as shown in Fig. 5-36. Each of the halves is called a half(cid:173)
`gateway and each one is owned and operated by one of the network operators. The
`whole problem of gatewaying then reduces to agreeing to a common protocol to use
`on the wire. As long as both parties use the common protocol on the wire, they can
`arrange their sublayers 3a, 3b, and 3c any way that is convenient for them.
`The protocol that the half-gateways speak over the wire is CCITT's X.75 proto(cid:173)
`col, which is almost identical to X.25 (discussed later in this chapter). The X.75
`model is based on the idea of building up an internetwork connection by con(cid:173)
`catenating a series of intranetwork and half-gateway to half-gateway virtual cir(cid:173)
`cuits. The model is shown in Fig. 5-37(a) The connection between the source host,
`in one network, and the destination host, in another network, is composed of five
`adjacent virtual circuits, marked VC 1-5. VC 1 goes from the source host to a
`half-gateway (called a signaling terminal or STE by CCITT), in its own network.
`VC 2 goes from the half-gateway in the source network to a half-gateway in an
`intermediate network, assuming that there is no direct connection between the
`source and destination networks. VCs 3 and 5 are also intranet, like VC 1, and VC
`4 is internet, like VC 2.
`In this model a connection to a host in a distant network is set up the same way
`normal connections are established. The subnet sees that the destination is remote,
`chooses an appropriate (half-) gateway and builds a virtual circuit to the gateway.
`The first gateway records the existence of the virtual circuit in its tables and
`
`Ex.1067.135
`
`DELL
`
`

`

`

`

`

`

`

`

`

`

`SEC. 5.4
`
`INTERNETWORKING
`
`343
`
`1. HDLC: in principle infinite.
`
`2. 802.4: 65,528 bits.
`
`3. X.25: 32768 bits.
`
`4. ARP A Packet Radio Network: 2032 bits.
`
`5. ARPANET: 1008 bits.
`
`6. University of Hawaii ALOHANET: 640 bits.
`
`An obvious problem appears when a large packet wants to travel through a net(cid:173)
`work whose maximum packet size is too small. This problem has received a great
`deal of attention in the literature and some proposals for solving it have been made.
`One solution is to make sure the problem does not occur in the first place. In
`other words, the internet should use a routing algorithm that avoids sending packets
`through networks that cannot handle them. However, this solution is no solution at
`all. What happens if the original source packet is too large to be handled by the
`destination network? The routing algorithm can hardly bypass the destination.
`Nevertheless, intelligent routing can minimize the extent of the problem.
`Basically, the only solution to the problem is to allow gateways to break pack(cid:173)
`ets up into fragments, sending each fragment as a separate internet packet. How(cid:173)
`ever, as every parent of a small child knows, converting a large object into small
`fragments is considerably easier than the reverse process. (Physicists have even
`given this effect a name: the second law of thermodynamics.) Packet-switching net(cid:173)
`works, too, have trouble putting the fragments back together again.
`Two opposing strategies exist for recombining the fragments back into the orig(cid:173)
`inal packet. The first strategy is to make fragmentation caused by a "small-packet"
`network transparent to any subsequent networks through which the packet must
`pass on its way to the ultimate destination. This option is shown in Fig. 5-40(a).
`When an oversized packet arrives at a gateway, the gateway breaks it up into frag(cid:173)
`ments. Each fragment is addressed to the same exit gateway, where the pieces are
`recombined. In this way passage through the small-packet network has been made
`transparent. Subsequent networks are not even aware that fragmentation has
`occurred.
`Transparent fragmentation is simple but has some problems. For one thing, the
`exit gateway must know when it has received all the pieces, so that either a count
`field or an "end of packet" bit must be included in each packet. For another thing,
`all packets must exit via the same gateway. By not allowing some fragments to fol(cid:173)
`low one route to the ultimate destination, and other fragments a disjoint route, some
`performance may be lost. A third problem is possible reassembly lockup at the exit
`gateway. A last problem is the overhead required to repeatedly reassemble and
`then refragment a large packet passing through a series of small-packet networks.
`The other fragmentation strategy is to refrain from recombining fragments at
`
`Ex.1067.140
`
`DELL
`
`

`

`

`

`SEC. 5.4
`
`INTERNETWORK.ING
`
`345
`
`duplicates generated anywhere, this scheme is sufficient to ensure that all the pieces
`can be correctly reassembled at the destin

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket