Fumio Teraoka. April 15, 1992

Size: px
Start display at page:

Download "Fumio Teraoka. April 15, 1992"

Transcription

1 Host Migration in Virtual Internet Protocol Fumio Teraoka SCSL-TR April 15, 1992 Sony Computer Science Laboratory Inc Higashi-gotanda, Shinagawa-ku, Tokyo, 141 JAPAN Copyright c 1992 Sony Computer Science Laboratory Inc

2 In Proceedings of the 1st International Networking Conference, June, 1992

3 Host Migration in Virtual Internet Protocol Fumio Teraoka Sony Computer Science Laboratory Inc Higashigotanda, Shinagawa-ku, Tokyo 141, Japan Abstract In the near future, a user will carry his portable computer and access the wide area network regardless of location In such an environment, host migration transparency is an essential feature of the wide area network Virtual Internet Protocol (VIP) is a network layer protocol providing host migration transparency, which is derived from Internet Protocol (IP) Currently, VIP is running on Unix based workstations This paper describes the procedures of VIP focusing on host connection/disconnection to/from a subnetwork We implemented two daemon processes and two new commands to support the migration procedures In VIP, applications can specify a migrating host by its VIP address regardless of location Examples show that a TCP connection is preserved while a host is disconnected from the network Measured overhead of connection/disconnection procedures is also shown 1 Introduction The conventional protocol suites, such as OSI [5] and TCP/IP, do not consider host mobility As an exception, XNS [11] can keep track of migrating hosts by using a name server mechanism However, current name servers and directory services in a wide area network environment, such as network directory [1] and domain name system [6], are not suitable to handle dynamic data such as location of migrating hosts There are some proposed protocols to support host mobility In [4], host migration is supported by IPwithin-IP datagram This method uses a radio network interface to support a set of mobile hosts within a campus Each mobile host (MH) has a unique IP address which never changes even if the host moves Each mobile support station (MSS) has a service area of a radio subnetwork and keeps track of MHs All MHs must have the same (sub)network number as a part of IP address for packet routing from a 'regular' host to an MH When an MSS relays a packet to an MH which does not exist in the service area of the MSS, the MSS must search for the location of the MH by querying other MSSs Thus, this method seems to have a problem with scalability We claimed that the network layer must provide host migration transparency and proposed the concept of virtual network [10] A virtual network is a logical network Each host in the wide area network is logically always connected to its home network even if it physically migrates so that it has a migration independent network address Such a migration independent network address is called a virtual network address or a VN-address Since the transport and higher layer protocols specify the target host by a VN-address, higher protocols are not aware of host migration The conventional network address of a host indicates its physical location or the subnetwork in which the host exists We call the conventional network address a physical network address or a PN-address Thus, a host has two network addresses in the virtual network environment To deliver a packet to a host, the PN-address of the target host must be resolved from its VN-address To incorporate such function into the network layer, we divided the conventional network layer into two sublayers: the virtual network sublayer or the VN-sublayer and the physical network sublayer or the PN-sublayer The VN-sublayer converts the VN-address specied by the transport layer into the corresponding PN-address by the propagating cache method [10] In the propagating cache method, each host and gateway has a cache for address conversion This cache is called the Address Mapping Table or the AMT Cache entries propagate across the wide area network as communication progresses Virtual Internet Protocol (VIP) is derived from Internet Protocol (IP) by applying the concept of virtual network and the propagating cache method [8] In [8], measured communication performance in stable state is also shown This paper focuses on the transit state, ie connection/disconnection of a host to/from a subnetwork When a host is connected to a subnetwork, it must be 1

4 assigned a temporary IP address and send a control packet When a host is about to disconnect from a subnetwork, it must release the temporary IP address VIP does not include such IP address management functions To support such functions, we introduced two daemon processes: migd and vipd One migd is running per subnetwork and one vipd is running on each migrating host They communicate with each other to execute the host migration procedures such as IP address allocation/release Section 2 presents the overview of Virtual Internet Protocol In tion 3, we dene the procedures required on host connection and disconnection, which are not included in VIP Section 4 gives our implementation of the migration procedures Examples are also shown in this tion Section 5 presents measured overhead of VIP Section 6 concludes this paper 2 Virtual Internet Protocol This tion gives an overview of Virtual Internet Protocol (VIP) VIP is derived from Internet Protocol (IP) by applying the concept of virtual network and the propagating cache method According to the protocol hierarchy described in the previous tion, the conventional IP layer is divided into two sublayers: the VIP sublayer and the IP sublayer 21 IP address and VIP address Since the IP address represents the location of a host, it is thought of as a PN-address We introduced the VIP address as a VN-address The VIP address of a host never changes A host is assigned a VIP address in the VIP sublayer and an IP address in the IP sublayer Both addresses have the same format If a host exists in its home network, both addresses have the same value There are two implementation approaches for VIP: the sublayer approach and the IP option approach According to the protocol hierarchy, the former is preferable However, the latter is preferable in terms of backward compatibility [9] The VIP header in the IP option approach is shown in Figure 1 In the gure, the upper half is the conventional IP header The lower half is the VIP header as an IP option The VIP header consists of eight elds: option type (V IP OptT ype ) and option length (V IP OptLen ): these two elds are dened in IP [7] type (V IP type ): there are six types: { V ipdata: data { V ipconn: connection notication { V ipconnack: acknowledgment of V ipconn { V ipdisc: disconnection notication ver ttl ihl opt type id tos proto source IP address destination IP address opt len source VIP address destination VIP address source address timestamp destination address timestamp f total length fragment oset header checksum type hold Figure 1: VIP header format { V ipdelamt: AMT entry deletion { V iperrobs: obsolete AMT entry error hold time (V IP hold ): initial value of the AMT idle eld (see below) of the AMT entry for the source host of this packet source and destination VIP addresses (V IP SrcAddr and V IP DstAddr ) source and destination address timestamps (V IP SrcT S and V IP DstT S ): the version number of the source IP/VIP address pair and the destination IP/VIP address pair, respectively An AMT entry for VIP consists of four elds, each of which is 4 bytes long: VIP address (AMT V IP ): acts as key of this entry IP address (AMT IP ): the requested value address timestamp (AMT AddrT S ): version number of the IP/VIP address pair of this entry idle timer (AMT idle ): used for aging of this entry 22 Data Communication Protocol On a source host, TCP/UDP issues a transmission request to the VIP sublayer with the VIP address of the destination host The VIP sublayer searches for the AMT entry for the destination host to resolve the destination IP address If the entry is found, the VIP sublayer issues a transmission request to the IP sublayer with the destination IP address Otherwise, the VIP sublayer assumes that the destination host exists in its home network, ie destination IP address is equal 2

5 to its VIP address, and then the VIP sublayer issues a transmission request to the IP sublayer Upon receiving a VIP packet on an intermediate gateway, it creates or updates the AMT entry for the source host of the received packet and searches for the AMT entry of the destination host If the entry is found and it holds newer data than the packet has, the destination IP address eld in the IP header is modied On the destination host, the AMT entry for the source host is created or updated as same as on a gateway Finally, the received data is passed to TCP/UDP Thus, as communication progresses, the AMT entry of a migrating host propagates across the wide area network Address conversion for the rst packet sent to a migrating host might be done by an intermediate gateway on the path to the home network of the migrating host In the worst case, address conversion is done by the home gateway of the migrating host However, once a host receives a VIP packet from a migrating host, it can directly send packets to the migrating host since it makes the AMT entry of the migrating host 23 Host Migration Protocol When a migrating host is connected to a subnetwork, it is assigned a temporary IP address Next, it sends a VipConn packet to its home network and waits for a VipConnAck packet The VipConn packet is relayed by gateways Since the VipConn packet includes the VIP and IP addresses of the source host, intermediate gateways can learn the relation of these two addresses and create or update the AMT entry for the source host The home gateway, which is the gateway in the home network of the migrating host, receives the Vip- Conn packet, creates the AMT entry for the migrating host, and returns the VipConnAck packet The home gateway also broadcasts the VipConn packet within the home network of the migrating host if the home network is a broadcast type network such as Ethernet In addition, the home gateway creates an entry in the ARP table for the migrating host to answer the ARP request for that host Note that on the home gateway, AMT entries for hosts for which it is the home gateway are never timed out When a migrating host is about to disconnect from a subnetwork, it sends a VipDisc packet to its home gateway When the home gateway receives the VipDisc packet, it broadcasts the VipDelAmt packet to all subnetworks to which it is connected Gateways in the subnetwork receive the VipDelAmt packet If a gateway has the AMT entry for the migrating host, it deletes the entry and also broadcasts the packet to any other connected subnetworks If a gateway does not have an AMT entry for the migrating host, the gateway does nothing Thus, most AMT entries of the migrating host are deleted when the host is about to disconnect from a subnetwork 3 Procedures for Host Migration There are two types of host migration: o-line and online In o-line migration, a host is disconnected from the network during moving whereas in on-line migration, a host can access the network during moving In the conventional wired network, only o-line migration is possible If wireless network such as cellular telephony and radio LAN systems becomes widely available, on-line migration becomes feasible In this paper, we focus on o-line migration 31 Connection Procedure The connection procedure is executed when a host is connected to a subnetwork It is also executed in booting process In this paper, we assume that a host has 1 Activate the Ethernet interface 2 Get the network number of the current subnetwork to know whether the current subnetwork is its own home network an Ethernet interface When a host is connected to a subnetwork, it has no IP addresses, routing information, nor idea whether the subnetwork is its home network In the connection procedure, a host must get such information The connection procedure is as follows: 3 If the current subnetwork is its own home network, execute the 'regular' booting procedure Otherwise, execute the procedure below 4 Notify the operating system of its VIP address 5 Get a temporary IP address and assign it to the Ethernet interface 6 Get the IP address of the default gateway in the current subnetwork and add it to its routing table 7 Execute the connection protocol described in Section 23 After this procedure is done, the migrating host has a temporary IP address The relation between its VIP address and the temporary IP address is registered in the home gateway of the migrating host as well as intermediate gateways on the transmission path of the VipConn packet The cache of this relation will propagate across the wide area network as communication with this host progresses 32 Disconnection Procedure The disconnection procedure is executed when a host is about to disconnect from a subnetwork The disconnection procedure is as follows: 3

6 1 If the current subnetwork is its own home network, nothing to do Otherwise, execute the procedure below 2 Execute the disconnection protocol described in Section 23 3 Release the temporary IP address 4 Deactivate the Ethernet interface After this procedure is done, the home gateway of the migrating host has deleted the entry for the host Since the home gateway broadcasts the VipDelAmt packet, most AMT entries for the host in the wide area network are deleted 33 Temporary IP Address As described above, when a migrating host is connected to a subnetwork other than its home network, the host must be assigned a temporary IP address There are three temporary IP address allocation strategies: 1 dynamic: any migrating hosts can be connected to the subnetwork A temporary IP address is allocated to a migrating host from the temporary IP address pool in turn The temporary IP addresses allocated to migrating hosts must be recalled when hosts disconnect from the subnetwork 2 dynamic & registered: only registered migrating hosts can be connected to the subnetwork A temporary IP address is allocated to a registered migrating host from the temporary IP address pool in turn The temporary IP addresses allocated to migrating hosts must be recalled when hosts disconnect from the subnetwork Although the number of migrating hosts which can be connected to the subnetwork simultaneously is limited to the number of temporary IP addresses, the number of registered hosts is unlimited 3 static: only registered migrating hosts can be connected to the subnetwork The relation between the VIP address and the IP address is registered in advance The number of registered migrating hosts is limited to the number of temporary IP addresses The recall of allocated temporary IP addresses is not necessary Although the third strategy might be easiest to implement among them, it has a problem with scalability The number of migrating hosts which can be connected to a subnetwork is limited to a small number From view point of network management, the ond strategy is preferable to the rst because the ond strategy can avoid connection of unknown hosts Due to ease of implementation, we chose the rst strategy in the current implementation 4 Implementation 41 Daemons To support the host migration procedures, we introduced two daemons: migd (migration support daemon) and vipd (vip daemon) Migd is running per subnetwork whereas vipd is running on each migrating host They communicate with each other when a migrating host is connected/disconnected to/from a subnetwork We reserve two IP addresses, INADDR MIGD and IN- ADDR VIPD, for the communication between migd and vipd There are some protocols for hosts which do not have an IP address initially, such as RARP [3] and BOOTP [2] RARP is a protocol specic to Ethernet whereas BOOTP runs on UDP Although the current implementation of VIP assumes Ethernet as the data link media, we chose BOOTP as the protocol between migd and vipd because BOOTP is independent of data link media Our protocol exploits the vender dened area of the BOOTP packet format When a migrating host is connected to a subnetwork, it has no IP addresses At rst, it assigns its network interface the IP address INADDR VIPD and sends a request packet to migd with the destination address INADDR MIGD by using Ethernet broadcast Since a request packet includes the VIP address of the migrating host as the source address, migd can uniquely identify the source host of a request packet The host on which migd is running receives this request packet and returns a reply packet with destination address INADDR VIPD by using Ethernet broadcast Since a reply packet also includes the VIP address of the migrating host as the destination address, the migrating host can receive correct packets The reason why migd returns a reply packet by using Ethernet broadcast is that there might be two or more migrating hosts waiting for a reply simultaneously If the normal method is used, ie the host on which migd is running sends an ARP request for INADDR VIPD, a reply packet might be delivered to an incorrect host Migd is started by the command line below: migd netif [conf-le] (eg migd en0 /migdconf) where netif is the network interface name to be used and conf-le is a conguration le specifying available IP addresses and the IP address of the default gateway When migd terminates due to shutdown, etc, it saves the mapping between IP addresses and VIP addresses to the conguration le in order to restore the mapping after restart Figure 2 shows an example of the conguration le In this example, ten available IP addresses are registered and none of them are currently allocated Vipd is started by the command line below: 4

7 # default gateway gateway # # ip vip Figure 2: an example of migd conguration le vipd [-b] netif my-vipaddr home-gw (eg vipd -b en ) where netif is the network interface to be used, myvipaddr is the VIP address assigned to the host, and home-gw is the (V)IP address of the home gateway of the host Vipd starts the connection procedure if the switch -b] is specied Vipd also starts the connection procedure when receiving a signal SIGUSR1 and starts the disconnection procedure when receiving a signal SIGUSR2 or SIGTERM 42 Command Modication In the BSD kernel, each network interface such as Ethernet is managed by the structure in ifaddr An entry was added to the structure in ifaddr in order to hold the VIP address of the host To set and get the VIP address of a host, we modied the command ifcong Upon showing the interface status, the VIP address is preceded by a new keyword vnet See Section 45 To set the network interface the VIP address, the same keyword is also used, eg ifcong en0 vnet wwxxyyzz We implemented two new commands: plugin and unplug The command plugin has vipd start the connection procedure by sending a signal SIGUSR1 to vipd The command unplug has vipd start the disconnection procedure by sending a signal SIGUSR2 to vipd Both the commands have no arguments We also implemented two commands, vipconn and vipdisc, for debugging The commands vipconn and vipdisc only send a VipConn and VipDisc packet to the specied home gateway, respectively The command syntax of these commands is as follows: vipconn netif home-gw vipdisc netif home-gw where netif and home-gw have the same meaning as those in the command line of vipd 43 Migd Enhancement There are three points to be improved in the current migd implementation The rst point is the lack of a procedure to recall unused IP addresses In the current IP address allocation strategy, migd must recall an allocated IP address when a migrating host is disconnected from a subnetwork Although the command unplug triggers the disconnection procedure, some migrating hosts might not execute this command In the current migd implementation, if a migrating host is disconnected without the command unplug, the IP address allocated to the host cannot be recalled Thus, migd must examine whether the host to which a temporary IP address is allocated exists in the subnetwork by methods such as polling The ond point is reliability If migd crashes, migrating hosts cannot get a temporary IP address To avoid this, we plan to introduce master migd and slave migd In each subnetwork, one master migd and one or more slave migds are running All migds receive a request packet destined to INADDR MIGD, however, only master migd replies it Master migd and slave migd(s) periodically communicate with each other to examine whether master migd is available If master migd crashes, one of slave migds becomes temporary master migd When master migd comes back, temporary master migd returns to slave state The third point is to support various types of links In the current implementation, we assume Ethernet as the data link media Migd and vipd should support various types of links such as point-to-point link 44 Packet Flow Figure 3-(a) shows packet ow when a host is connected to a subnetwork other than its home network First, vipd on a migrating host sends a request packet Get- NetNum to migd in order to know whether the current subnetwork is its home network Migd running on a host in the subnetwork receives the packet and returns the network number and netmask to the migrating host The migrating host knows that the current subnetwork is not its home network and then sends a request packet GetIP and GetDefGw in order to get a temporary IP address and the IP address of the default gateway in the subnetwork Migd assigns the migrating host a temporary IP address and noties it of the IP address of the default gateway Finally, the migrating host sends a VipConn packet to its home gateway and receives a VipConnAck packet Figure 3-(b) shows packet ow when a host is connected to its home network A migrating host knows that the current subnetwork is its home network by the query GetNetNum 5

8 If necessary, the migrating host gets the IP address of the default gateway in the subnetwork Figure 4 shows packet ow when a host is disconnected from a subnetwork At rst, a migrating host sends a VipDisc packet to its home gateway Upon receiving this packet, the home gateway broadcasts the VipDelAmt packet to all connected subnetwork in order to delete the AMT entry for that host Next, the migrating host release the temporary IP address migrating host VipDisc FreeIP home migd gateway VipDelAmt migrating host migd home gateway ok GetNetNum net number & netmask GetIP & GetDefGw IP addr & Gw IP addr in foreign subnetwork Figure 4: packet ow on host disconnection line vnet is added to the normal output This output means that this host is assigned a temporary IP address whereas its VIP address, ie , is unchanged VipConn VipConnAck crux% plugin crux% ifconfig en0 en0: flags=63<up,broadcast,notrailers,running> inet netmask ffffff00 broadcast crux% (a) in foreign subnetwork migrating host migd GetNetNum net num & netmask Figure 5: ifcong output in home network crux% plugin crux% ifconfig en0 en0: flags=63<up,broadcast,notrailers,running> inet netmask ffffff00 broadcast vnet crux% GetDefGw Figure 6: ifcong output in a foreign network Gw IP addr (b) in home subnetwork Figure 3: packet ow on host connection 45 Examples Figure 5 shows the output of the command ifcong after a host is connected to its home network This output is the normal output of ifcong The IP address of this host is This output implies that the VIP address of this host is the same as its IP address Figure 6 shows the output of ifcong when a host is connected to other than its home network A Figure 7 shows the output of the command telnet In this example, a host named aquila, whose IP and VIP addresses are , executes telnet to a migrating host named crux, whose VIP address is When telnet starts, it resolves the address of crux by a query to the name server The name server returns the VIP address of crux, ie Telnet then establishes a TCP connection to that address The rst ifcong output on crux indicates that crux is currently connected to a network whose network number is Crux then moves to its home network so that the ond ifcong output does not include the line vnet wwxxyyzz Note that the telnet connection is preserved during crux moves if the time in which crux is disconnected from the network is not so long The third ifcong output indicates that crux moves to a network 6

9 aquila% ifconfig en0 en0: flags=63<up,broadcast,notrailers,running> inet netmask ffffff00 broadcast aquila% telnet crux Trying Connected to cruxcslsonycojp Escape character is '^]' NEWS-OS Release 41C (cruxcslsonycojp) login: tera crux% ifconfig en0 en0: flags=63<up,broadcast,notrailers,running> inet netmask ffffff00 broadcast vnet crux% crux% ifconfig en0 en0: flags=63<up,broadcast,notrailers,running> inet netmask ffffff00 broadcast crux% crux% ifconfig en0 en0: flags=63<up,broadcast,notrailers,running> inet netmask ffffff00 broadcast vnet crux% crux% logout Connection closed by foreign host aquila% Figure 7: telnet output whose network number is Performance Currently, VIP is running on SONY NEWS workstations based on 43BSD UNIX We implemented VIP by modifying the operating system kernel A special timer board with a 1 granularity allowed us to evaluate VIP 51 Data Packet Handling Table 1 presents the time required for transmission, relay, and reception for a data packet in stable state in both IP and VIP+IP [8] Stable state means that the source host has the AMT entry for the destination host, the gateway has the AMT entries for both the source and destination host, and the destination host has the AMT entry for the source host Therefore, address conversion for the destination host is done at the source host before sending According to the result, if the processing power of each host or gateway is equal to that of SONY NEWS workstations, host-to-host overhead of VIP in comparison to IP can be formulated by a function of hop count (N hop ) as follows: host-to-host overhead = 100N hop () VIP overhead will be 07 m if N hop is 5 and 12 m if N hop is 10 Since IP transmission in the Internet takes time in 100 m order, host-to-host VIP overhead is negligible Tables 2 to 4 show the transmission, relay, and reception overhead in detail In transmission, the function ip insertoptions is called to insert the VIP header to the IP header because VIP is implemented by exploiting an IP option eld The function requires 28 % of the transmission overhead Due to the same reason, in relay and reception, the function ip dooptions is called and requires 27 % and 32 % of the overhead, respectively, although ip dooptions does nothing for VIP 52 Control Packet Handling When a host is connected to a subnetwork, it sends a VipConn packet to its home gateway This packet is relayed to the home gateway and it returns a VipConnAck packet to the source host Thus, the overhead of host connection at an intermediate gateway is the relay time of the VipConn and VipConnAck packets At a home gateway, it is the handling time of a Vip- Conn packet When a host is about to disconnect from a subnetwork, it sends a VipDisc packet to its home gateway This packet is also relayed to the home gateway and it broadcasts a VipDelAmt packet to all subnetworks to which it it connected Thus, the overhead of host disconnection at an intermediate gateway is the relay time of the VipDisc packet and handling time of the VipDelAmt packet At the home gateway, it is the handling time of a VipDisc packet The overhead of VipDelAmt handling also incurs at a gateway if it has the AMT entry of the disconnecting host even if it is not on the VipDisc transmission path Tables 5 and 6 show the time required for transmission of the VipConn and VipDisc packets at a migrating host These results are larger than that of VIP data because they include the processing time in the network interface layer In both cases, although the function vip output and ip insertoptions are not called, the function ip output consumes approximately 100 more than transmission time for an IP data packet This overhead is derived from route nding In case of IP data packet transmission, TCP/UDP usually species the output network interface In case of transmission of the VIP control packets, however, the IP layer must search for the output network interface by looking up the routing table In addition, VipConn transmission calls the function m copy to save the packet for retransmission Handling time of the VipConn and VipDisc packets on a home gateway is shown in Tables 7 and 8 These results are much larger than others because these results include packet transmission time Upon receiving 7

10 Table 1: data packet handling time IP VIP overhead transmission (154 %) relay (33 %) reception (127 %) Table 2: VIP overhead on transmission transmission overhead: 120 vip output: 77 vip setsrc ip insertoptions check header conv others Table 3: VIP overhead on relay relay overhead: 100 vip forward: 66 ip dooptions others vip modamt vip mapdst others Table 4: VIP overhead on reception reception overhead: 84 vip input: 57 ip dooptions vip modamt check others a VipConn packet, the home gateway broadcasts it in the home network and returns a VipConnAck packet to the source host of the VipConn packet Upon receiving a VipDisc packet, the home gateway broadcasts a VipDelAmt packet to all subnetworks to which it is connected In VipConn handling, the home gateway creates an AMT entry for the source host in the function vip modamt This handling time requires 265 and seems too large We plan to improve the performance of this function Required time for VIP control packet relay is shown in Table 9 Relay of the VipConnAck and VipDisc packets requires less time than normal VIP data packet because these packets do not cause AMT entry manipulation In case of VipDelAmt packet relay, the AMT entry for a disconnecting host is deleted and the packet is relayed to all subnetworks except the incoming one 6 Conclusion In the near future, host migration transparency will be an essential feature of the wide area network We proposed the concept of virtual network and the propagating cache method to achieve this VIP is a virtual network protocol derived from IP In a VIP environment, the VIP sublayer hides host migration entirely so that it is not necessary to modify TCP/UDP and application programs including name servers, that is, name servers return the VIP address, not IP address, of a requested host name, TCP/UDP issues a transmission request to the VIP sublayer with the VIP address of the destination host, the VIP sublayer converts the VIP address to the corresponding IP address, and then the IP sublayer delivers a packet to the destination host In this paper, we described the procedures for host migration in detail We implemented two daemons, migd and vipd, and two new commands, plugin and unplug, to execute the connection/disconnection procedures The command ifcong was modied to set/get the VIP address of a host Examples showed that an application program can specify a migrating hosts by its name regardless of its location and that a TCP connection is preserved while the host is moving We also presented the measurement results of required time for normal data transfer and control packet transfer In stable state, VIP can achieve host migration transparency in the Internet with negligible overhead in comparison to IP We also plan to implement VIP on the MuseOS [12], an object-oriented distributed operating system being developed at SonyCSL 8

11 Table 5: VipConn transmission time on a migrating host VipConn transmission: 574 vip txvipconn: 151 ip output ether, etc copyin check header m copy Table 6: VipDisc transmission time on a migrating host VipDisc transmission: 502 vip txvipdisc: 109 ip output ether, etc copyin check header Table 7: VipConn handling time on a home gateway VipConn: 1756 ipintr vip input: 1658 vip modamt check vip setarptab vip bcastconn vip txconnack others vip bcastconn: 695 header ip output ether, etc vip txconnack: 473 header ip output ether, etc Table 8: VipDisc handling time on a home gateway VipDisc: 1625 ipintr vip input: 1527 delete AMT entry delete ARP tab entry vip bcastvipdel others vip bcastdel: 1437 (2 ethers) header 1st loop 2nd loop others one loop: 676 header ip output ether, etc Table 9: control packet handling time on an intermediate gateway VipConn VipConnAck VipDisc VipDelAmt VipDelAmt: 855 ipintr delete AMT entry vip sendvipdel others

12 Acknowledgment I give my thanks to Dr Mario Tokoro of Sony CSL/Keio University, Dr Hideyuki Tokuda of Carnegie Mellon University/Keio University, Dr Jun Murai of Keio University, Ms Kim Clay of University of California, San Diego, the members of the WIDE project, and the members of Sony Computer Science Laboratory Inc Discussions with them helped me re- ne the concept of virtual network and its adaptation to IP I also give my thanks to Mr Hiroshi Tezuka and the members of Super Micro Group of SONY Corporation, who made the customized timer board which allowed me to evaluate VIP [12] Yasuhiko Yokote, Fumio Teraoka, Atsushi Mitsuzawa, Nobuhisa Fujinami, and Mario Tokoro The Muse Object Architecture: A New Operating System Structuring Concept Operating Systems Review, 25(2), February 1991 References [1] CCITT The Directory { Overview of Concepts, Models and Services November 1988 X500 [2] Bill Croft and John Gilmore Bootstrap Protocol (BOOTP) September 1985 RFC951 [3] R Finlayson, T Mann, J C Mogul, and M Theimer Reverse Address Resolution Protocol June 1984 RFC903 [4] John Ioannidis, Dan Duchamp, and Gerald Q Maguire Jr IP-based Protocols for Mobile Internetworking In Proceedings of ACM SIG- COMM 91, September 1991 [5] ISO Information processing systems { Open Systems Interconnection { Basic Reference Model 1984 ISO7498 [6] P V Mockapetris Domain Names { concepts and facilities November 1987 RFC1034 [7] J B Postel Internet Protocol September 1981 RFC791 [8] Fumio Teraoka, Kim Clay, and Mario Tokoro Design, Implementation, and Evaluation of Virtual Internet Protocol In Proceedings of the 12th International Conference on Distributed Computing Systems, June 1992 [9] Fumio Teraoka and Mario Tokoro Host Migration Transparency in IP Networks: The VIP Approach Technical Report, SCSL-TM , Sony Computer Science Laboratory Inc, December 1991 [10] Fumio Teraoka, Yasuhiko Yokote, and Mario Tokoro A Network Architecture Providing Host Migration Transparency In Proceedings of ACM SIGCOMM 91, September 1991 [11] Xerox Internet Transport Protocols XEROX CORPORATION, December 1981 XSIS

Host Migration Transparency in IP Networks: The VIP Approach. Fumio Teraoka and Mario Tokoro 3. Sony Computer Science Laboratory Inc.

Host Migration Transparency in IP Networks: The VIP Approach. Fumio Teraoka and Mario Tokoro 3. Sony Computer Science Laboratory Inc. Host Migration Transparency in IP Networks: The VIP Approach Fumio Teraoka and Mario Tokoro 3 Sony Computer Science Laboratory Inc 3-14-13 Higashigotanda, Shinagawa-ku, Tokyo 141, Japan tel: +81-3-3448-4380,

More information

Ubiquitous Mobile Host Internetworking

Ubiquitous Mobile Host Internetworking Ubiquitous Mobile Host Internetworking David B. Johnson School of Computer Science Carnegie Mellon University Pittsburgh, PA 152 13-389 1 dbj Qcs. cmu. edu 1. Introduction With the increasing popularity

More information

1:32 2: : :

1:32 2: : : Naming and Addressing of Objects without Unique Identiers Nobuhisa Fujinami Yasuhiko Yokote Sony Computer Science Laboratory Inc. Takanawa Muse Building 3-14-13 Higashi-gotanda, Shinagawa-ku, Tokyo, 141

More information

A Mobile Networking System based on Internet. Computer Science Department IBM, T.J. Watson Research Center. University of Maryland Hawthorne, NY 10562

A Mobile Networking System based on Internet. Computer Science Department IBM, T.J. Watson Research Center. University of Maryland Hawthorne, NY 10562 A Mobile Networking System based on Internet Protocol(IP) Pravin Bhagwat Charles E. Perkins pravin@cs.umd.edu perk@watson.ibm.com Computer Science Department IBM, T.J. Watson Research Center University

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

< INC-PROJECT, WINSTON-RFC.NLS.6, >, 11-Jun-85 21:31-PDT JBP ;;;;

< INC-PROJECT, WINSTON-RFC.NLS.6, >, 11-Jun-85 21:31-PDT JBP ;;;; --------- < INC-PROJECT, WINSTON-RFC.NLS.6, >, 11-Jun-85 21:31-PDT JBP ;;;; Winston [Page 0] Network Working Group Request for Comments: 948 Ira Winston University of Pennsylvania June 1985 TWO METHODS

More information

4. Basic IP Support Protocols

4. Basic IP Support Protocols 4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols

More information

February BOOTP Vendor Information Extensions. Status of this Memo

February BOOTP Vendor Information Extensions. Status of this Memo Network Working Group Request for Comments: 1048 P. Prindeville McGill University February 1988 BOOTP Vendor Information Extensions Status of this Memo This memo proposes an addition to the Bootstrap Protocol

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

Request for Comments: 1497 Obsoletes: 1395, 1084, 1048 August 1993 Updates: 951

Request for Comments: 1497 Obsoletes: 1395, 1084, 1048 August 1993 Updates: 951 Network Working Group J. Reynolds Request for Comments: 1497 ISI Obsoletes: 1395, 1084, 1048 August 1993 Updates: 951 Status of this Memo BOOTP Vendor Information Extensions This memo is a status report

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Lecture 11: Networks & Networking

Lecture 11: Networks & Networking Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Packet Header Formats

Packet Header Formats A P P E N D I X C Packet Header Formats S nort rules use the protocol type field to distinguish among different protocols. Different header parts in packets are used to determine the type of protocol used

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02 TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

(ICMP), RFC

(ICMP), RFC Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

TCP/IP and the OSI Model

TCP/IP and the OSI Model TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol

More information

Columbia University Department of Computer Science June 1991

Columbia University Department of Computer Science June 1991 Network Working Group Request for Comments: 1235 J. Ioannidis G. Maguire, Jr. Columbia University Department of Computer Science June 1991 Status of this Memo The Coherent File Distribution Protocol This

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Chapter 3 Protocols and the TCP/IP Suite

Chapter 3 Protocols and the TCP/IP Suite Chapter 3 Protocols and the TCP/IP Suite 3.1 The Need for a Protocol Architecture need for a standard communication tasks by layers architecture peer protocol: a set of rules or conventions to exchange

More information

Telecommunication Protocols Laboratory Course. Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 3 Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

by Douglas Comer, Purdue University

by Douglas Comer, Purdue University One Byte at a Time Bootstrapping with BOOTP and DHCP by Douglas Comer, Purdue University The process of starting a computer system is known as bootstrapping. In most systems, the initial bootstrap sequence

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

Using the Command Line Interface

Using the Command Line Interface CHAPTER 2 Using the Command Line Interface 2.1 Commonly Used Commands This section documents the Cisco Broadband Operating System (CBOS) commands and command arguments that manage the Cisco 67x. CBOS runs

More information

Internet protocols, TCP/IP suite

Internet protocols, TCP/IP suite Internet protocols, TCP/IP suite S-72.353 March 20, 2000 L353_8.shw Slide 1 of 23 Layered structure of TCP/IP /D\HU 6HUYL FHV 6073 '16 KWWS )73 7(/1(7 7 &3 8 '3 193,3,& 03,3 $53 5$53 &60$&' 7RNHQ ULQJ

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

Toward a New Computing Model. Mario Tokoro 3. Keio University Hiyoshi, Yokohama 223 JAPAN. November 26, Abstract

Toward a New Computing Model. Mario Tokoro 3. Keio University Hiyoshi, Yokohama 223 JAPAN. November 26, Abstract Toward a New Computing Model for an Open Distributed Environment Mario Tokoro 3 Department of Computer Science Keio University 3-14-1 Hiyoshi, Yokohama 223 JAPAN Tel: +81-44-63-1926 Telefax: +81-44-63-3421

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Chapter 1 Configuring TCP/IP

Chapter 1 Configuring TCP/IP Chapter 1 Configuring TCP/IP 1 This chapter describes the TCP/IP protocol, and specifically, how Cisco Systems implements this protocol on its protocol translators. Topics in this chapter include: Configuring

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

An Adaptive Routing Scheme for Wireless Mobile Computing

An Adaptive Routing Scheme for Wireless Mobile Computing An Adaptive Routing Scheme for Wireless Mobile Computing Ruixi Yuan C&C Software Technology Center, NEC Systems Laboratory, Inc. 1901 Gateway Drive, Irving, TX 75038 yuan@syl.dl.nec.com Abstract This paper

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

Address Management in IP Networks

Address Management in IP Networks Address Management in IP Networks - Address Resolution Protocol (ARP) - Reverse Address Resolution Protocol (RARP) - Dynamic Host Configuration Protocol () IP Addresses and Physical Addresses o The Forwarding

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

Table of Contents. Cisco TCP/IP

Table of Contents. Cisco TCP/IP Table of Contents TCP/IP Overview...1 TCP/IP Technology...1 TCP...1 IP...2 Routing in IP Environments...4 Interior Routing Protocols...5 RIP...5 IGRP...6 OSPF...6 Integrated IS IS...6 Exterior Routing

More information

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite Need For Protocol Architecture E.g. File transfer Source must activate comms. Path or inform

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Chapter 4 Software-Based IP Access Control Lists (ACLs)

Chapter 4 Software-Based IP Access Control Lists (ACLs) Chapter 4 Software-Based IP Access Control Lists (ACLs) This chapter describes software-based ACLs, which are ACLs that processed traffic in software or CPU. (This type of ACL was also referred to as flow-based

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

Chapter 1 TCP/IP Configuration and Management

Chapter 1 TCP/IP Configuration and Management Chapter 1 TCP/IP Configuration and Management 1 This chapter describes how to configure the TCP/IP protocol, and specifically, how Cisco Systems implements this protocol on its protocol translators. You

More information

Network and Security: Introduction

Network and Security: Introduction Network and Security: Introduction Seungwon Shin KAIST Some slides are from Dr. Srinivasan Seshan Some slides are from Dr. Nick Mckeown Network Overview Computer Network Definition A computer network or

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 15 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

IP/MAC Address Translation

IP/MAC Address Translation IP/MAC Address Translation -Go over quiz answers -ARP -DHCP -NAT Today Transition from Network to Datalink How do we get datagrams to the right physical host? Tricky part comes when a router is forwarding

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Mobility Support in Internet and Mobile IP. Gianluca Reali

Mobility Support in Internet and Mobile IP. Gianluca Reali Mobility Support in Internet and Mobile IP Gianluca Reali 1 Problem We have seen that mobile users can change point of attachment In a WLAN, a mobile may change access point. In a cellular network, a mobile

More information

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018 CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

IP Internet Protocol. Agenda. IP on everything everything on IP. TCP/IP and Internet. An internet. Request For Comments (RFC)

IP Internet Protocol. Agenda. IP on everything everything on IP. TCP/IP and Internet. An internet. Request For Comments (RFC) Agenda IP Internet Protocol Network and Information Center Beijing University of Posts and Telecommunications Oct. 2017 TCP/IP and Internet Internet Address Internet Layer Protocols IP Protocol ICMP Protocol

More information

Imi :... Data:... Nazwisko:... Stron:...

Imi :... Data:... Nazwisko:... Stron:... Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols

More information

What is a Network? TCP / IP. The ISO OSI Model. Protocols. The TCP/IP Protocol Suite. The TCP/IP Protocol Suite. Computer network.

What is a Network? TCP / IP. The ISO OSI Model. Protocols. The TCP/IP Protocol Suite. The TCP/IP Protocol Suite. Computer network. What is a Network? TCP / IP Computer network a set of computers using common protocols to communicate over connecting transmission media. Protocol a formal description of message formats and the rules

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information

CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS

CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS OBJECTIVES Provide a high-level overview of distributed systems and the networks that interconnect them Discuss the general structure of distributed operating

More information

CE3005: Computer Networks Laboratory 3 SNIFFING AND ANALYSING NETWORK PACKETS

CE3005: Computer Networks Laboratory 3 SNIFFING AND ANALYSING NETWORK PACKETS SNIFFING AND ANALYSING NETWORK PACKETS 1. OBJECTIVE To further understand how the Internet really works and how the concept of encapsulation is being implemented in the different layers of the TCP/IP protocol

More information

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (7 points) Anonymous ID: stick number HERE

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (7 points) Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term App ARes/ComNet 2015-2016 Midterm exam : Version A in English Duration: 2h00 Allowed: One

More information

Category: Standards Track A. Malis Ascend Communications, Inc. September Inverse Address Resolution Protocol. Status of this Memo

Category: Standards Track A. Malis Ascend Communications, Inc. September Inverse Address Resolution Protocol. Status of this Memo Network Working Group Request for Comments: 2390 Obsoletes: 1293 Category: Standards Track T. Bradley Avici Systems, Inc. C. Brown Consultant A. Malis Ascend Communications, Inc. September 1998 Status

More information

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p.

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p. Preface to the First Edition p. xv Preface to the Second Edition p. xvii Acknowledgments p. xix UNIX Operating System Environment p. 1 UNIX: Past and Present p. 2 History and Growth of UNIX p. 2 Flavors

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

Static NAT Mapping with HSRP

Static NAT Mapping with HSRP This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient IP networks. This network resiliency is required where application

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax. The Network Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW The Internet Protocol IP addresses, address resolution

More information

Mobile host protocols support host

Mobile host protocols support host INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2000; 10:191 214 Location update and routing scheme for a mobile computing environment By Anna Hać Ł and Yujing Huang We present a new hierarchical

More information

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address Outline IP The Internet Protocol o IP Address IP subnetting CIDR o ARP Protocol o IP Function o Fragmentation o NAT o IPv6 2 IP Address o Hostname & IP Address IP Address o The Address ping www.nu.ac.th

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Chapter 7. ARP and RARP MGH T MGH C I 20

Chapter 7. ARP and RARP MGH T MGH C I 20 Chapter 7 ARP and RARP ARP ARP PACKAGE RARP CONTENTS Figure 7-1 ARP and RARP Figure 7-2 Position of ARP and RARP in TCP/IP protocol suite 7.1 A R P Figure 7-3 ARP operation Figure 7-4 ARP packet Figure

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy Primer IP Technology L2 Ethernet Switching versus L3 routing IP Protocol, IP Addressing, IP Forwarding ARP and ICMP IP Routing, OSPF Basics First Hop Redundancy (HSRP) Agenda L2 versus L3 Switching IP

More information

Link download full: Test Bank for Business Data Networks and Security 9th Edition by Panko https://digitalcontentmarket.org/download/business-data-networks-and-security-9thedition-by-panko/ Business Data

More information