CS 520: Network Architecture I Winter Lecture 11: NAT and IPv6
|
|
- Caroline Rice
- 5 years ago
- Views:
Transcription
1 CS 520: Network Architecture I Winter 2007 Lecture 11: NAT and IPv6 The previous lecture discussed how subnetting and supernetting (CIDR) can be used to make better use of global IP addresses. This lecture provides discussion of a stopgap approach that is commonly used (NAT), and a solution that will end the addressing problem for good (IPv6). Chapter 20 - Private Network Interconnection (VPN, NAT) I. Network Address Translation (Section 20.6 and RFC 3022) Private networks can use their own addressing schemes Do not need globally unique addresses inside the network. Do not need to use up IPv4 addresses inside the network. To interact outside the network, a private network could use a small set of addresses. Which must be globally unique. And can use as many addresses as they wish inside a private network. Can use all 32 bits. But normally use the CIDR private address ranges. Can avoid any address renumbering inside a network. Hosts inside the network only need a globally unique address when they wish to communicate outside the network. Assumption: Only a few globally unique addresses are needed at any one time. Can be shared and reallocated as needed. But addresses do not even really need to be allocated. Lecture 11, Page 1 of 9
2 All that is really needed is a translation function. Each host uses a private address inside the network. Formally called Network Address Translation (NAT) All datagrams pass through a device informally called a to go to the global Internet. The NAT box changes the address to be appropriate for the global Internet. The SOURCE ADDRESS in the IP datagram is now assigned by the NAT box. - A globally unique address. - A NAT box could have a set of addresses it could use. - The host sets the address, but the NAT box changes the address. Normally a source address does not change. To the rest of the world, it looks like all packets come from the NAT box. For outgoing datagrams: Replace the source address with a globally unique address. Easy. For incoming datagrams Replace the NAT box address with the internal private address. Not so easy. How does NAT know which internal address applies to a datagram it receives from the Internet? In general, a NAT box must have a translation table. Translate from information in a received datagram to an internal private address. If there is no entry in the translation table for a datagram, the datagram cannot be delivered. Can use a manually configured table. With static translations that are always used. If no entry in the table, some hosts will not be able to send outgoing datagrams or receive incoming datagrams. More than one end host would be mapped to the same external IP address. - Otherwise the benefit of NAT is completely lost. Lecture 11, Page 2 of 9
3 But what must the NAT box do to prevent a problem with this approach? The NAT box must make sure that more than one end host is not using the same external address at the same time. - Some end hosts would need to be blocked from communicating if that were the case. Another approach is to fill the table based on outgoing datagrams. Any host can send an outgoing datagram. The NAT box will assign an address and remember the address it uses. With this approach, communication cannot be initiated from a host the network. - Why? It would not know which address to use. Another approach would be to fill the table based on other information. Like web addresses. Most implementations use outgoing datagrams to initialize the table. Lecture 11, Page 3 of 9
4 Port-mapped NAT Upper layer protocols use the concept of ports in addition to the IP address. Like with UDP and TCP (discussed in a later lecture). IP only specifies the destination host for a datagram. - But a host may be executing multiple processes simultaneously. The real destination of a datagram is to one of those processes. But it is difficult to send a datagram to a process. - Processes are created and destroyed dynamically. - We would like to replace processes and still receive datagrams. - We need to identify destinations by the functions they implement without needing to know the specific process. Therefore, each machine contains a set of abstract destination points called protocol ports. - Identified by a positive integer. - The local operating system provides an interface mechanism to those ports. In general, ports are buffered. - Packets for a particular port are buffered. - A process extracts packets when it is ready. So, to conduct communication between applications, the sending application needs to know both the IP address and the port number. NAT can use TCP or UDP port numbers as well as addresses. Sometimes called Network Address Port Translation (NAPT). Can have 16 bits worth of port numbers. Simple example. A network could have one globally unique IP address. Say: And each host application could have a port. - Say is using port for a particular application. ( / 21023) Then NAT chooses to send this packet out onto the global Internet with source address and source port as ( / 14003) Packets that arrive to for port would be sent to / A unique port number would have to be assigned for each communication on the external Internet (in this case it was 14003). So, a NAT box will assign an IP address and a port number to outgoing packets. Lecture 11, Page 4 of 9
5 Advantages of port-mapped NAT. Can conceptually use only a single global IP address. - Without port-mapped NAT, the number of computers that could be accessing the Internet is limited to the number of addresses that can be used by the NAT box. - With port-mapped NAT, there is no practical limit (16 bits for port numbers). Disadvantage Depends on TCP and UDP. Complications in implementing NAT Error messages must be handled properly. NAT will not work with applications that send IP addresses or protocol ports as data. Maybe if it is a standard application, like the File Transfer Protocol (FTP), a special translator can be created. But then the packets could not be encrypted by the end host. - Since NAT would need to be able to read the packet and change it. - So a security weakness exists that does not allow end-to-end encryption. - Or the NAT box must temporarily undo the encryption to change the address, which makes the NAT box a vulnerable point. NAT also compromises the robustness, security, performance, and manageability of the Internet. More difficult to coordinate control and error messages with hosts behind a NAT box. Since NAT usually uses outgoing datagrams to initialize the table, some applications cannot be executed that are initiated from the outside. Unless allowed on an exceptional basis using manually configured permanent address maps for pre-selected hosts/host ports. Lecture 11, Page 5 of 9
6 What are examples of applications where unsolicited incoming datagrams are common and where NAT will not work without special functionality? IP Telephony, peer-to-peer games, home servers, file sharing. - This special functionality may involve devices behind the NAT box to subscribe to a directory before they can receive outside requests. So, how does one summarize the effectiveness of NAT at slowing down the exhaustion of IPv4 addresses? Can use one address for many hosts. Very good so far. But less effective for peer-to-peer applications. Chapter 31 - The Future of TCP/IP (IPv6) Also: From a very good overview of IPv6 by Steve Deering of Cisco, coauthor of the RFC and co-chair of WG. He gave this presentation at UMKC. c2_ipv6.pdf II. The Future of TCP/IP IPv4 has operated well since the late 1970's. Lecture 11, Page 6 of 9
7 But the 32 bit address space is being exhausted. Comer predicts all addresses will be gone by Even with CIDR. Even with NAT. Even with some organizations, like Stanford, reallocating their addresses and giving back unused addresses. (See: where Stanford gave back its Class A address). Even with 4 billion possible addresses, only about 250 million are usable (see RFC 3194). Today there are 100~150 million devices. Address allocations must still be very conservative. Most existing address allocations will not likely be given back. - See for the list of how the address space is currently allocated. - Especially look at the /8 addresses for specific organizations. (General Electric, IBM, AT&T Bell Laboratories, Xerox, Ford, MIT, and MERIT) - MERIT is an educational network in Michigan analogous to MOREnet in Missouri million addresses for these organizations!? Steve Deering says the ONLY compelling reason for IPv6 is more addresses! Billions of new users in Japan, China, India, etc. Billions of new IP-enabled devices mobile phones, cars, appliances, etc. Always-on access for home devices through DSL, cable modems, etc. To phase out NAT, because of its limitations that were discussed above. Business demands the only demands that really mean anything Demand for cellular wireless services around the world. Demand for Internet gaming (peer-to-peer). Microsoft includes IPv6 in Windows XP (by default it is not enabled). Lecture 11, Page 7 of 9
8 If IP is to be replaced, we can implement new features as well. IPv6 Processing power is much different in routers than in the 1970 s. New types of capabilities: Support for real-time applications. Network resource reservations. Electronic commerce. Built-in security. Started under the IPng effort (Next Generation IP). Version 5 was taken by an experimental protocol. Due to a misunderstanding. Designers call IPv6 basically the same as IPv4 with a few modifications. Not a radical change. No changes to IPv4 QoS and routing. Features Larger addresses bits - From 2 32 (4 x 10 9 ) to (256 x ) possible hosts. - addresses for each square meter of the Earth's surface. - Address representation can be done several ways. Additional levels of addressing hierarchy are possible (multiple levels of subnetting). Flexible header formats. - Entirely new datagram format. Improved options fields. Ability to extend the protocol in the future. Support for autoconfiguration and renumbering. Support for QoS resource allocations. Lecture 11, Page 8 of 9
9 The protocol spec puts more functions into options fields. IPv6 calls these options extension headers. For example, fragmentation information would be put in an extension header. - By default, fragmentation is not allowed, unless the extension header is used. - Can either use a guaranteed minimum MTU of 1280 octets or use MTU probing. - The source will make sure datagrams are the correct size before they are sent out. No header checksum Expensive to compute - 50% of the instructions in current IPv4 routers that are executed are for checksums. Assumes TCP/UDP and Layer 2 devices check for errors. The header length field eliminated. The transition to IPv6 is a big issue. IPv6 has been slow to catch on. Requires a costly and time-consuming upgrade to the Internet's backbone and edge systems. Can operate IPv4 and IPv6 at the same time. Can send IPv6 packets in IPv4 packets through IPv4-only areas. Can translate IPv6 packets to IPv4 packets. Demand for IPv6 gear is small. Vendors are starting to supply more products, however. But vendor products in many cases are missing pieces for a full IPv6 implementation. IPv4 and supporting technologies already can do a lot of what IPv6 does, but without larger addresses. Status of IPv6 The U.S. government wants civilian and defense agencies to adapt their networks by mid-2008 to support IPv6-based traffic. The transition to an IPv6-based world has not yet gathered steam. Stay tuned for another day: IPv6 is still for tomorrow. Daniel Minoli, Network World, 03/06/07. Next lecture: Internet control messages. Lecture 11, Page 9 of 9
CS 520: Network Architecture I Winter Lecture 11: IP Address Conservation
CS 520: Network Architecture I Winter 2006 Lecture 11: IP Address Conservation This lecture provides discussion of several approaches that are used to make better use of the IP address space. Subnetting
More informationECE 435 Network Engineering Lecture 14
ECE 435 Network Engineering Lecture 14 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 October 2018 Announcements HW#6 was due HW#7 will be posted 1 IPv4 Catastrophe 2 Out of
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationIPv6. Internet Technologies and Applications
IPv6 Internet Technologies and Applications Contents Summary of IPv6 core features Auto-configuration IPv4-IPv6 transition techniques IPv6 networks today ITS 413 - IPv6 2 Motivation Current version of
More informationIPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationCS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3
CS 356: Computer Network Architectures Lecture 15: DHCP, NAT, and IPv6 [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 Xiaowei Yang xwy@cs.duke.edu Dynamic Host Configuration Protocol (DHCP) Dynamic Assignment
More informationComputer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 10: IP Routing and Addressing Extensions
CS 5520/ECE 5590NA: Network Architecture I Spring 2009 Lecture 10: IP Routing and Addressing Extensions This lecture provides discussion of the mechanisms used to route IP datagrams (Chapter 7). It also
More informationCSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough
CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything
More informationLOGICAL ADDRESSING. Faisal Karim Shaikh.
LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationAn Industry view of IPv6 Advantages
An Industry view of IPv6 Advantages March 2002 Yanick.Pouffary@Compaq.Com Imagine what IPv6 can do for you! 1 Where we are Today IPv4 a victim of its own success IPv4 addresses consumed at an alarming
More informationLecture 8. Network Layer (cont d) Network Layer 1-1
Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationIP Addresses. IP Addresses
IP Addresses Introductory material. IP Addressing Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses ting CIDR IP Version 6 addresses An entire module
More informationIPv6 Tutorial: Introduction, Background and Standardization Status
IPv6 Tutorial: Introduction, Background and Standardization Status Jordi Palet (jordi.palet@consulintel.es) Education, Promotion, Public Relations and Awareness Working Group Co-Chair IPv6 Forum CEO/CTO,
More informationECE 435 Network Engineering Lecture 13
ECE 435 Network Engineering Lecture 13 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 19 October 2016 Announcements HW#5 posted, due next Wednesday 1 ARP address resolution protocol
More informationAsst. Prof. Chaiporn Jaikaeo, Ph.D.
IP Version 6 Asst. Prof. Chaiporn Jaikaeo, Ph.D. chaiporn.j@ku.ac.th http://www.cpe.ku.ac.th/~cpj Computer Engineering Department Kasetsart University, Bangkok, Thailand Adapted from the notes by Lami
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More information1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?
95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model
More informationIPv6: An Introduction
Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with
More informationCSF645 Mobile Computing 行動計算. IPv6. (Internetworking With TCP/IP vol Part 31) 吳俊興國立高雄大學資訊工程學系
CSF645 Mobile Computing 行動計算 IPv6 (Internetworking With TCP/IP vol. 1 -- Part 31) 吳俊興國立高雄大學資訊工程學系 IPv6: Motivation Initial motivation: 32-bit address space soon to be completely allocated Additional motivation:
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More informationIPv6: Introduction, Background and Deployment Status
IPv6: Introduction, Background and Deployment Status Jordi Palet (jordi.palet@consulintel.es) Education, Promotion, Public Relations and Awareness Working Group Co-Chair IPv6 Forum CEO/CTO, Consulintel
More informationNETWORK LAYER: IP Addressing
NETWORK LAYER: IP Addressing McGraw-Hill The McGraw-Hill Companies, Inc., 2004 2000 Position of network layer McGraw-Hill The McGraw-Hill Companies, Inc., 2004 Network layer duties McGraw-Hill The McGraw-Hill
More informationIPv6 Next generation IP
Seminar Presentation IPv6 Next generation IP N Ranjith Kumar 11/5/2004 IPv6 : Next generation IP 1 Network Problems Communication Problem Identification Problem Identification of Networks Logical Addressing
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationInitial motivation: 32-bit address space soon to be completely allocated. Additional motivation:
IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:
More informationWhere we are in the Course
Network Layer Where we are in the Course Moving on up to the Network Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Network Layer How to connect different link layer
More informationIntroduction to Network Address Translation
Introduction to Network Address Translation Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationNetwork Layer Part A (IPv6) Network Layer 4-1
Network Layer Part A (IPv6) Network Layer 4-1 Chapter 4: outline 4.1 Overview of Network layer data plane control plane 4.2 What s inside a router 4.3 IP: Internet Protocol datagram format fragmentation
More informationIntroduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁
I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network
More informationCommunication Systems DHCP
Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal
More informationIP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Module Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Discover the Binary counting
More informationCSC Introduction to Computers and Their Applications. Background
CSC 170 - Introduction to Computers and Their Applications Lecture 7 The Internet Background The history of the Internet begins in 1957. In a response to the Soviet Union launching Sputnik, the first man-made
More informationIntroduction to Computer Science 2017 Networking. Sören Schwertfeger
Sören Schwertfeger Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network of networks
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More informationLayering and Addressing CS551. Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers.
Protocols CS551 Layering and Addressing Bill Cheng Set of rules governing communication between network elements (applications, hosts, routers) Protocols define: Format and order of messages Actions taken
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationCSCD 330 Network Programming Spring 2018
CSCD 330 Network Programming Spring 2018 Lecture 14 Network Layer IP Addressing Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 2017 Network
More informationInternet Protocol version 6
Internet Protocol version 6 Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 IP version 6 The Internet is growing extremely rapidly. The
More informationIntroduction to Internetworking
Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any
More informationChapter 6 The Internet
Chapter The Internet Computer Concepts 2014 Chapter Contents Section A: Internet Technology Section B: Fixed Internet Access Section C: Portable and Mobile Internet Access Section D: Internet Services
More informationThis talk will cover the basics of IP addressing and subnetting. Topics covered will include:
This talk will cover the basics of IP addressing and subnetting. Topics covered will include: What is an IP Address? What are Classes? What is a Network Address? What are Subnet Masks and Subnet Addresses?
More informationCSCI-1680 Network Layer: IP & Forwarding John Jannotti
CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github
More informationDepartment of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri
Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions
More informationEITF25 Internet Techniques and Applications L7: Internet. Stefan Höst
EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationNAT, IPv6, & UDP CS640, Announcements Assignment #3 released
NAT, IPv6, & UDP CS640, 2015-03-03 Announcements Assignment #3 released Overview Network Address Translation (NAT) IPv6 Transport layer User Datagram Protocol (UDP) Network Address Translation (NAT) Hacky
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 26: Transport layer I 1 Transport Layer In the remaining lectures, we will discuss several issues that are commonly addressed at the transport
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #4 preview ICMP ARP DHCP NAT
More informationBusiness Data Networks and Security 10th Edition by Panko Test Bank
Business Data Networks and Security 10th Edition by Panko Test Bank Chapter 2 Network Standards 1) Internet standards are published as. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Question: 1a Objective:
More informationCMPE 80N: Introduction to Networking and the Internet
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 17 CMPE 80N Spring'10 1 Announcements Next class: Presentation of fun projects
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationCS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018
CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing
More informationIPv4 Lecture 10a. COMPSCI 726 Network Defence and Countermeasures. Muhammad Rizwan Asghar. August 14, 2017
IPv4 Lecture 10a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 14, 2017 Source of some slides: Princeton University Also thanks to J.F Kurose and K.W. Ross IPv4 Internet
More informationCSCI-1680 Network Layer:
CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can
More informationNetwork Layer: Control/data plane, addressing, routers
Network Layer: Control/data plane, addressing, routers CS 352, Lecture 10 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors)
More information23 August Introduction
Network Working Group Request for Comments: XXXX W. Chimiak Laboratory for Telecommunication Sciences 23 August 2010 IPvX: IPv4 with 128 bit Address Space An informationally assured way to expedite AAAA
More informationLast time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access
Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading
More informationPlanning for Information Network
Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of
More informationIPv6 tutorial. RedIRIS Miguel Angel Sotos
IPv6 tutorial RedIRIS Miguel Angel Sotos miguel.sotos@rediris.es Agenda History Why IPv6 IPv6 addresses Autoconfiguration DNS Transition mechanisms Security in IPv6 IPv6 in Windows and Linux IPv6 now 2
More informationNetwork and Broadband Systems IPv6 What s new? Andreas Hofmeier
Network and Broadband Systems IPv6 What s new? Andreas Hofmeier Contents 1 IPv6, What s New? 1 1.1 Introduction.............................. 1 1.2 Address Space............................. 1 1.3 Address
More informationIntroduction to Wireless Networking ECE 401WN Spring 2008
Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.
More informationNetwork Layer PREPARED BY AHMED ABDEL-RAOUF
Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport
More informationChapter 2 Advanced TCP/IP
Tactical Perimeter Defense 2-1 Chapter 2 Advanced TCP/IP At a Glance Instructor s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional
More informationFull file at
ch02 True/False Indicate whether the statement is true or false. 1. IP addresses have links to domain names to make it possible for users to identify and access resources on a network. 2. As a frame moves
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationIP - The Internet Protocol
IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:
More informationIPv6 Basics. APNIC Training Bali, Indonesia February, Jordi Palet - 1
IPv6 Basics APNIC Training Bali, Indonesia February, 2007 Jordi Palet (jordi.palet@consulintel.es) - 1 Why a New IP? Only compelling reason: more addresses! for billions of new devices, e.g., cell phones,
More informationCSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca
CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement
More informationCSCD 330 Network Programming Spring 2017
CSCD 330 Network Programming Spring 2017 Lecture 14 Network Layer IP Addressing Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-2007 1
More informationWhy IPv6? Roque Gagliano LACNIC
Why IPv6? Roque Gagliano LACNIC Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Some initial concepts. IPv6 is the
More informationECE 158A: Lecture 7. Fall 2015
ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers
More informationNetwork Protocols - Revision
Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4
More informationHierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy
Hierarchical Routing Our routing study thus far - idealization all routers identical network flat no true in practice scale: with 50 million destinations: can t store all dest s in routing tables! routing
More informationCS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.
CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch
More informationThe internet What is it??
The internet What is it?? The internet is a global system of interconnected computer network that use the standard internet protocol suit (TCP/IP) to serve billions of users word wide. In other word it
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG
Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data
More informationCC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite
CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.
More informationIP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching
IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery
More informationLab10: NATing. addressing conflicts, routers must never route private IP addresses.
Introduction These are reserved private Internet addresses drawn from the three blocks shown in the figure. These addresses are for private, internal network use only. Packets containing these addresses
More informationComputer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Good day, we will talk about IP version 4 that is the internet
More informationAthanassios Liakopoulos Slovenian IPv6 Training, Ljubljana, May 2010
Introduction ti to IPv6 (Part A) Athanassios Liakopoulos (aliako@grnet.gr) Slovenian IPv6 Training, Ljubljana, May 2010 Copy Rights This slide set is the ownership of the 6DEPLOY project via its partners
More informationThe Network Layer and Routers
The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in
More informationUnit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask
1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe
More informationNetwork Interconnection
Network Interconnection Covers different approaches for ensuring border or perimeter security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Lecture
More informationNetworking Potpourri: Plug-n-Play, Next Gen
Networking Potpourri: Plug-n-Play, Next Gen 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia
More informationChapter 18. Introduction to Network Layer
Chapter 18. Introduction to Network Layer 18.1 Network Layer Services 18.2 Packet Switching 18.3 Network Layer Performance 18.4 IPv4 Addresses 18.5 Forwarding of IP Packets Computer Networks 18-1 Communication
More informationIP Version 6 (IPv6) Past, Present, and Future. Bob Hinden / Check Point Fellow
IP Version 6 (IPv6) Past, Present, and Future Bob Hinden / Check Point Fellow 1 IPv6 Background In the early 1990s it was not clear that TCP/IP was going to be successful There were many competitors OSI
More informationCSCD 433/533 Advanced Networks
CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing
More informationAccess Control Lists and IP Fragments
Access Control Lists and IP Fragments Document ID: 8014 Contents Introduction Types of ACL Entries ACL Rules Flowchart How Packets Can Match an ACL Example 1 Example 2 fragments Keyword Scenarios Scenario
More informationChapter 18 and 22. IPv4 Address. Data Communications and Networking
University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing
More information