Internetworking Part 2

Size: px
Start display at page:

Download "Internetworking Part 2"

Transcription

1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, /08/2018 1

2 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning networks based on any technology Problems: heterogeneity and scalability heterogeneity: need to support different LANs, point-to-point technologies, switched networks, different addressing formats scalability: addressing (management and configuration) and routing must be able to handle millions of hosts We will examine the (original) IP protocol (IPv4), IP addressing, packet forwarding, subnetting, and IPv6. 2

3 Outline Internet architecture IP service model IP forwarding Address translation (ARP) Automatic host configuration (DHCP) and error reporting (ICMP) Virtual Private Networks (VPNs) Subnetting Supernetting: Classless routing (CIDR) IPv6 3

4 Terminology The Internet and IP network = network based on one technology internet = network of networks The Internet = internet using IP routers = nodes connecting networks IP = Internet Protocol, current version IPv4 (IP Version 4) 4

5 What is internetwork Internetworking An arbitrary collection of networks interconnected to provide some sort of host-host to packet delivery service A simple internetwork where H represents hosts and R represents routers

6 What is IP Internetworking IP stands for Internet Protocol Key tool used today to build scalable, heterogeneous internetworks It runs on all the nodes in a collection of networks and defines the infrastructure that allows these nodes and networks to function as a single logical internetwork A simple internetwork showing the protocol layers

7 IP principles Each host has a globally unique IP address must be reachable by everyone and from everywhere Simple packet forwarding Network nodes simply forward packets Keeping the routers as simple as possible was one of the original design goals of IP 7

8 Internet architecture Recall Internet architecture from Chapter 1 Application layer: FTP, HTTP, (Last Chapter) Transport layer: TCP (reliable byte transfer) and UDP (unreliable datagram delivery) provide logical channels to applications (Next Chapter) Network or IP layer: IP protocol interconnects multiple networks into a single logical network (This Chapter) Link layer: wide variety of LAN and point-to-point protocols FTP HTTP NV TFTP TCP UDP IP NET 1 NET 2 NET n 8

9 IP Service Model Packet Delivery Model Connectionless model for data delivery Best-effort delivery (unreliable service) packets are lost packets are delivered out of order duplicate copies of a packet are delivered packets can be delayed for a long time Format of datagram (next slide) Global Addressing Scheme Provides a way to identify all hosts in the network

10 IP packet (datagram) format Format aligned at 32 bit words simplifies packet processing in software Header fields Version(4): version 4 (IPv4) or version 6 (IPv6) Hlen(4): header length, in 32-bit words (min 5) TOS(8): type of service (not widely used), used to give priorities to packets (QoS issue) Length(16): data+header length, in bytes Ident (16): used by fragmentation Flags/Offset (16): used by fragmentation TTL(8): time to live, no of times packet allowed to be forwarded (no of hops), default 64, detects packets caught in routing loop Protocol(8): identifies upper layer protocols, TCP=6, UDP =17 Checksum(16): header only, erroneous packets discarded DestAddr & SrcAddr (32): global Internet addresses Options: rarely used 10

11 Fragmentation/reassembly Each network has an MTU (Maximum Transmission Unit) e.g., Ethernet 1500 bytes, PPP 532 bytes Strategy Fragmentation occurs in a router when it receives a datagram that it wants to forward over a network which has (MTU < datagram. In general, try to avoid fragmentation: Hosts are encouraged to perform path MTU discovery Fragments are self-contained datagrams All the fragments carry the same identifier in the Ident field Flags (M-bit) and Offset used to guide fragmentation process Offset measured in 8 byte units Fragmented packet can be again re-fragmented Reassembly is performed only at destination host Reassembly does not try to recover lost fragments 11

12 Fragmentation/reassembly example Assume H5 wants to send a 1400 byte datagram to H8 (see slide 5): 1400 bytes + 20 bytes (IP header) MTU: and Ethernet 1500 bytes, PPP 532 bytes IP datagrams traversing the sequence of physical networks 12

13 Example (continued) Header fields used in IP fragmentation. (a) Unfragmented packet: H5 R1 R2 (b) Fragmented packets: R2 R3 H8 Can you think of a strategy that will abuse fragmentation to carry out a denial-of-service attack? How can one prevent such an attack? 13

14 IP global addressing Properties globally unique, 32 bits hierarchical: network part + host part address identifies interface end host has one interface router has many interfaces IP address domain name Original classful addressing class A, B and C networks defines different sized networks idea: small no of WANs, modest no of campus networks, large no of LANs Dotted Decimal Notation 32 bit addresses represented as groups of 8 bit integers e.g., Format A : to B : to C : to

15 Classful Adressing IP addr.= ; = Class: A (consider first bit - 0) Net ID: Host ID: IP addr.= ; = Class: C (consider first three bits 110) Net ID: Host ID: Class IP address Net Host Net Host # of PCs ID No bit # bit # in network A w x.y.z = 16,777,214 B w.x y.z =65534 C w.x.y z =

16 Network and Broadcast Numbers 0 indicates a network 255 broadcast address; all PCs in a network Class C address ; Network number: A device that wants to send a message to all the PCs in this network will use the following address; Class B address ; Network number: A device that wants to send a message to all the PCs in this network will use the following address;

17 Forwarding vs. routing Forwarding: Process of taking a packet from input interface, looking at its destination address, consulting a forwarding table, and sending the packet over an output interface determined by that table Routing: Process by which forwarding tables are constructed Routing must create optimal or efficient paths that the packets should follow 17

18 IP forwarding Preliminaries Every datagram contains destination s address Every router has a forwarding table Each host has a default router configured Routers maintain forwarding tables with multiple entries (constructed via routing process) Forwarding table maps network number into next hop router number or local interface number Strategy A router receiving a packet checks destination network address of datagram and if directly connected to destination network, then forwards directly to host need to map IP address to physical LAN address (ARP) if not directly connected to destination network, then forwards to next hop router 18

19 IP Datagram Forwarding Algorithm if (NetworkNum of destination = NetworkNum of one of my interfaces) then deliver packet to destination over that interface else if (NetworkNum of destination is in my forwarding table) then deliver packet to NextHop router else deliver packet to default router For a host with only one interface and only a default router in its forwarding table, this simplifies to if (NetworkNum of destination = my NetworkNum)then deliver packet to destination directly else deliver packet to default router

20 IP forwarding example 1 H1 H3: forwarding on the same network H5 H8: forwarding via R1 and R2 Router R2 20

21 IP forwarding example 2 Suppose, A wants to send a datagram to B. Thus, A knows I B = Step 1: A and B are on different networks, so to reach , A routes a datagram to R 1 (address ) Step 2: Router R 1 sees (from its table) that to reach , it is necessary to send a datagram to R 2 (address ). Step 3: Router R 2 sends to R 3 (address ). Step 4: Router R 3 is on the same network as B, so R 3 delivers the datagram to B directly. 21

22 Routers vs. bridges Bridges are used for interconnecting LANs of the same type whereas routers interconnect networks of different (or the same) types Bridge (+/-) + bridge operation is simple, requires less processing + transparent (no configuration needed when new nodes added to LAN) restricted topology (forwarding determined by a spanning tree) LANs use a flat addressing space (no hierarchical network structure) Router (+/-) + arbitrary topologies, enables use of efficient routing algorithms for distributing traffic (helps traffic management) + hierarchical addressing enables scalability: scalability requires minimization of address info stored in routers routing based on network numbers forwarding tables contain info on all networks, not all nodes requires IP address configuration packet processing more demanding Summary: bridges do well in small (~ 100 hosts) networks while routers are used in large networks (1000s of hosts) 22

23 Address translation What to do when router/host notes that it is connected directly to the network where an arriving packet is destined? Need to map IP addresses into physical LAN addresses destination host next hop router Techniques encode physical LAN address in host part of IP address not scalable! (not implemented) table-based (maintain IP address, PHY address pairs) ARP 23

24 Address translation Algorithm of direct routing Start Hosts A and B are on the same network. A wants to send a datagram to B. ARP is used here!! Knowing I B of B, learn P B Encapsulate the datagram in a data-link frame I B IP addr. of B P B phys. addr. of B Send the frame using P B End To know that A and B are on the same network: it is enough to compare netid s I A and I B. 24

25 ARP details ARP (Address Resolution Protocol) utilizes LAN s broadcast capabilities each node maintains table of IP to physical LAN address bindings broadcast request if address not in table table entries are discarded if not refreshed target machine responds with its physical LAN address ARP request contains also source addresses (physical and IP) all interested parties can learn the source address Node (host/router) actions: table entries timeout in about 10 minutes if node already has an entry for source, refresh timer if node is the target, reply and update table with source info if node not target and does not have entry for the source, ignore source info 25

26 ARP packet format HardwareType: type of physical network (e.g., Ethernet) ProtocolType: type of higher layer protocol (e.g., IP) HLen & PLen: length of physical and upper layer addresses Operation: request or response Physical/IP addresses of Source and Target 26

27 Mapping with ARP protocol A B IP = IP = MAC = 02C00011DE25 MAC=... Broadcast message 1.Who has IP = ? Frame from A Local Area Network Dest. MAC = FFFFFFFFFFFF Orig. MAC = 02C00011DE25 ARP Source MAC=02C00011DE25 Sorce IP = Target MAC =? Target IP = Unicast message C IP = MAC = 4B000D9182EA MAC address is a physical 2. IP address(unique locally). has MAC= 4B000D9182EA It is assigned to each network interface Frame from C card ( NIC ). Dest. MAC = 02C00011DE25 ARP features: 1. Works only in a LAN. 2. LAN must provide the broadcasting capability. 3. Broadcasting is used only to transmit ARP request messages, ARP reply messages are Orig. MAC = 4B000D9182EA ARP Source MAC=02C00011DE25 Sorce IP = Target MAC = 4B000D9182EA Target IP = unicast.

28 ARP Protocol Host 1 (datalink) Host 2 Host 3 Host N IP packet (datagram) to Host 3: phys. addr. of Host 3 -? ARP frame ARP frame (phys.addr. of Host3) Broadcast IP packet (in aframe) Time 28

29 Need for automatic host configuration! IP addresses need to be reconfigurable Ethernet addresses hardwired onto the network adapter. Ethernet addresses are configured into network by manufacturer and they are unique. IP addresses must be unique on a given internetwork but also must reflect the structure of the internetwork. IP address consists of network and host part. hosts can move between networks host gets new address in each network Need for automated host configuration hosts need other configuration info, e.g., the default router configuration manually impossible (too much work and errors) Automated Configuration Process is required Dynamic Host Configuration Protocol (DHCP) DHCP server is responsible for providing configuration information to hosts at least one DHCP server for each administrative domain DHCP server maintains a pool of available addresses centralized repository for configuration info two operation modes: administrator chooses host addresses and configures them to DHCP DHCP manages the addresses by allocating addresses dynamically 29 from a pool of available addresses (more sophisticated)

30 Server discovery: Newly booted or attached host sends DHCPDISCOVER message to IP broadcast address ( ) Message broadcasted only on same network If server on same network, host receives its IP address DHCP operation If not, message picked up by DHCP relay agent Relay agent knows address of DHCP server, forwards the message to DHCP server and host receives its IP address Use of DHCP relay agent makes it possible to have fewer DHCP servers (relay agent configuration simpler than DHCP server configuration) 30

31 Internet Control Message Protocol (ICMP) ICMP used for reporting errors in Internet Defines a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully Messages Echo (ping), Echo reply Redirect (from router to source host if router knows of a better route to packet s destination) Destination host unreachable due to link/node failure (protocol, port, or host) TTL had reached 0 - exceeded (so datagrams don t cycle forever) IP header checksum failed Reassembly failed Cannot fragment 31

32 Virtual private networks (VPN) Problem: group of isolated networks geographically distant from each other need to connect different networks together into a private network securely e.g., company with many branch offices Solution: VPN Methods Build a private network from leased lines (not shared) Create a virtual private network which is overlaid on top of public networks ATM and Frame Relay: Use virtual circuits IP: Use IP tunneling (usually coupled with secure IPsec) 32

33 VPN and IP tunneling Problem with IP: - not possible to connect to Internet via router without the whole Internet also knowing about your network. Tunneling virtual point-to-point link between two nodes separated by arbitrary no of networks created at R1 by providing it with address of R2 R1 encapsulates original packet in a new packet addressed to R2 packet forwarded normally inside IP network R2 receives packet and strips off packet header and notices payload contains an encapsulated packet addressed to some host inside network 2 33

34 Global Internet Scalability Issues IP hides hosts in address hierarchy, but... Inefficient use of address space class C network with 2 hosts (2/255 = 0.78% efficient) class B network with 256 hosts (256/65535 = 0.39% efficient) Too many networks today's Internet has tens of thousands of networks routing tables do not scale route propagation protocols do not scale 34

35 Subnetting Problem 1: Any network with more than 255 hosts, needs class B addresses, or should get many class C addresses Problem 2: Each new network implies additional entry in forwarding table large table Solution: Share one network number between several networks. another level is added to address/routing hierarchy : subnet 35

36 Network Mask (according to classes) The network mask is generally used to find the network and host bits of an IP address and thus determine the network address. Network mask allows the two computers on the network to understand that they are on the same network or not. class IP addr. Net Host Net Host Network No No bit # bit # Mask A w x.y.z B w.x y.z C w.x.y z ( ( (

37 Network Mask, example IP address: Network address: Host address: Network mask: Broadcast address: IP address: Network address: Network mask: Broadcast address: IP address: Network address: Network mask: Broadcast address:

38 Subnetting Makes most sense for large corporations or campuses Corporation networks share 1 network number Number of other networks within the corporation, using subnet masks E.g., a class B address, is shared among 8 networks (2 3 ), by using a 19-bit subnet mask ( = ) i.e., subnet addresses are defined by first 19 bits of the IP address. Host part now has a subnet part in it. Class B network address continues to be advertised to the rest of the Internet, subnetting only used within campus (i.e. Subnets visible only within site). 38

39 Subnetting Another example: a class B address, is shared among 256 networks (2 8 ), by using a 24-bit subnet mask : ( = ) 39

40 Subnet example Forwarding table at R1: 40

41 Forwarding algorithm with subnetting D = destination IP address for each entry < SubnetNum, SubnetMask, NextHop> D1 = SubnetMask & D if D1 = SubnetNum if NextHop is an interface deliver datagram directly to destination else deliver datagram to NextHop (a router) Q: Apply the algorithm when H1 is sending to H2 and H3. Notes: Would use a default router if nothing matches Not necessary for all ones in subnet mask to be contiguous Can put multiple subnets on one physical network Subnets not visible from the rest of the Internet 41

42 Subnetting Example Where does the router forward packets addressed to: > Interface > R > R > R > R4 Subnet Number Subnet Mask Next Hop Interface Interface R R3 <default> R4 42

43 Supernetting (CIDR) (1) Classful addressing: inefficient use of address space, address space exhaustion subnetting does not get around the fact that a network with more than 255 hosts requires a class B address class B net allocate addresses for 65K hosts, even if only 2K hosts in that network CIDR: Classless InterDomain Routing network portion of address of arbitrary length address format: a.b.c.d/x, where x is # bits in network portion of address network part /23 host part 43

44 Supernetting (CIDR) (2) Assign block of contiguous network numbers to near-by networks helps to aggregate routers less entries in the forwarding tables Restrict block sizes to powers of 2 E.g. Consider an Autonomous system(as) with 16 class C network numbers ( to ) the top 20 bits are same ( ) 20-bit network number (a single network prefix) can be used in forwarding tables. Something between class B and class C classless! CIDR tries to balance the desire to minimize the number of routes that a router needs to know against the need to hand out addresses efficiently. 44

45 Classless Addressing Requires to hand out blocks of class C addresses that share a common prefix The convention is to place a /X after the prefix where X is the prefix length in bits For example, the 20-bit prefix for all the networks through is represented as /20 By contrast, if we wanted to represent a single class C network number, which is 24 bits long, we would write it /24 45

46 Route aggregation with CIDR To achieve scalability, you need to reduce the amount of information stored in routers Uses a single entry in the forwarding table to tell the router how to reach a lot of different networks Breaks the rigid boundaries between address classes Hierarchical aggregation: IP has a two-level hierarcy (network+host) 46

47 A simple example Suppose hosts had arbitrary addresses Then every router would need a lot of information to know how to direct packets toward the host host host... host host host... host LAN 1 router router router WAN WAN LAN forwarding table 47

48 Example continued.. Number related hosts from a common subnet /24 on the left LAN /24 on the right LAN host host... host host host... host LAN 1 router router router WAN WAN LAN / /24 forwarding table 48

49 Example continued.. Easy to add a new host No need to update the routers E.g., adding a new host on the right Doesn t require adding a new forwarding entry host host... host host host... host LAN / /24 router router router WAN WAN LAN 2 host forwarding table 49

50 Longest Prefix Match IP forwarding mechanism assumes that it can find the network number in a packet and then look up that number in the forwarding table With CIDR, prefixes may be of any length (from 2 to 32 bits) and may overlap (some addresses may match more than one prefix). For example, suppose we have the following in the forwarding table at a router: (a 16-bit prefix) (a 24-bit prefix) A packet with destination address matches both prefixes The rule is to choose the longest prefix(longest match) to forward to ( in this case) Consider also The longest match would be not Efficient algorithms are required for finding the longest match in a forwarding table 50

51 CIDR Example Suppose the router does the longest-prefix match. Where does the router forward packets addressed (in hex) to: C4.5E > B C4.5E > A C > E 5E > F C4.6D.31.2E > C C4.6B.31.2E > D Net / Mask Length Next Hop C / 12 C4.5E.10.0 / 20 C / 12 C / 14 A B C D / 1 E / 2 F / 2 G 51

52 Today s Internet Sites are connected arbitrarily rather than as a tree-like structure as was the case in 1990s Some large corporations connect with each other. This is called peering A simple multi-provider Internet 52

53 Problems How do we build a routing system that can handle hundreds of thousands of networks and billions of end nodes? How to handle address space exhaustion of IPV4? How to enhance the functionalities of Internet?

54 Routing in the Internet (1) The Global Internet consists of Autonomous Systems (AS) interconnected with each other. AS: corresponds to an administrative domain examples: University, company, backbone network Each AS is assigned a 16-bit number A network with two autonomous system 54

55 Routing in the Internet (2) We can classify ASs into three types: Stub AS: small corporation: a single connection to one other AS. only carry local traffic Multihomed AS: large corporation: multiple connections to other AS s. (no transit, i.e. refuses to carry others traffic) Transit AS: backbone provider, hooking many AS s together (an AS has connections to more than one other AS, and is designed to carry both transit and local traffic) Q: Which ASes are Stub, Multihomed and Transit in Slide 52? Two-level routing: Intra-AS: Routing within a single autonomous system (administrator responsible for choice of routing algorithm within network) Inter-AS: Routing between autonomous systems. 55 Unique standard for inter-as routing: BGP

56 Intra-AS, Inter-AS routing Most common Intra-AS routing protocols: - RIP: Routing Information Protocol - OSPF: Open Shortest Path First - IGRP: Interior Gateway Routing Protocol Most common Inter-AS routing protocol is Border Gateway Protocol (BGP) - Assumes that the Internet is an arbitrarily interconnected set of ASs - Leave optimality aside. Just find a loop-free path - Thus only bothers with reachability R5 AS1 (RIP intra - AS routing) R1 BGP R2 R3 BGP AS2 ( OSPF intra - AS routing) R4 AS3 ( OSPF intra - AS routing) 56

57 Major Features 128-bit addresses Multicast Real-time service IPv6 (1) Authentication and security Autoconfiguration End-to-end fragmentation Enhanced routing functionality, including support for mobile hosts Protocol extensions 57

58 IPv6 (2) IPv6 addresses Classless addressing/routing (similar to CIDR) Notation: x:x:x:x:x:x:x:x (x = 16-bit hex number) contiguous 0s are compressed: 47CD::A456:0124 IPv6 compatible IPv4 address: :: Address assignment provider-based geographic 58

59 40-byte base header Extension headers (fixed order, mostly fixed length) fragmentation source routing authentication and security other options IPv6 Header 59

60 Routing for Mobile Hosts Mobile IP home agent Router located on the home network of the mobile hosts home address The permanent IP address of the mobile host. Has a network number equal to that of the home network and thus of the home agent foreign agent Router located on a network to which the mobile node attaches itself when it is away from its home network

61 Routing for Mobile Hosts Problem of delivering a packet to the mobile node How does the home agent intercept a packet that is destined for the mobile node? Proxy ARP How does the home agent then deliver the packet to the foreign agent? IP tunnel Care-of-address How does the foreign agent deliver the packet to the mobile node?

62 Routing for Mobile Hosts Route optimization in Mobile IP The route from the sending node to mobile node can be significantly sub-optimal One extreme example The mobile node and the sending node are on the same network, but the home network for the mobile node is on the far side of the Internet Triangle Routing Problem Solution Let the sending node know the care-of-address of the mobile node. The sending node can create its own tunnel to the foreign agent Home agent sends binding update message The sending node creates an entry in the binding cache The binding cache may become out-of-date The mobile node moved to a different network Foreign agent sends a binding warning message

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

CS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray

CS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray CS 457 Networking and the Internet Fall 2016 Indrajit Ray Problems Earlier we saw how to connect one node to another, or to an existing network. How do we build networks of global scale? How do we interconnect

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Lecture 8 Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2

More information

L10: Simple Internetworking. Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L10: Simple Internetworking. Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L10: Simple Internetworking Hui Chen, Ph.D. Department of Engineering & Computer Science Virginia State University Petersburg, VA 23806 1 Acknowledgements Some pictures used in this presentation were obtained

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

Chapter 3 Internetworking

Chapter 3 Internetworking Chapter 3 Internetworking Basic Internetworking (IP) (cont d) Datagram forwarding in IP Every datagram contains the IP address of the destination host If directly connected to destination network, then

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

C14a: Internetworks and The Internet

C14a: Internetworks and The Internet CISC 7332X T6 C14a: Internetworks and The Internet Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/27/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

EPL606. Internetworking. Part 2a. 1Network Layer

EPL606. Internetworking. Part 2a. 1Network Layer EPL606 Internetworking Part 2a The majority of the slides in this course are adapted from the accompanying slides to the books by Larry Peterson and Bruce Davie and by Jim Kurose and Keith Ross. Additional

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

Recap. Recap. Internetworking. First mile problem. Internet. End Users. Last mile problem. Direct link networks Packet switching.

Recap. Recap. Internetworking. First mile problem. Internet. End Users.   Last mile problem. Direct link networks Packet switching. Recap First mile problem Internet www.yahoo.com Comcast Sprint End Users SBC UUNET www.cnn.com Last mile problem Recap Direct link networks Packet switching Internetworking 1 IP Internet Concatenation

More information

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement

More information

Copyright 2010, Elsevier Inc. All rights Reserved

Copyright 2010, Elsevier Inc. All rights Reserved Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie C 3 Internetworking Copyright 2010, Elsevier Inc. All rights Reserved Switching and Forwarding Store-and-Forward Switches

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Network Layer Protocols

Network Layer Protocols internetwork n. &v. Network Layer Protocols CSCI 363 Computer Networks Department of Computer Science 1 logical network built out of a collection of physical networks. 2 tr. to interconnect physical networks

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the

More information

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address Outline IP The Internet Protocol o IP Address IP subnetting CIDR o ARP Protocol o IP Function o Fragmentation o NAT o IPv6 2 IP Address o Hostname & IP Address IP Address o The Address ping www.nu.ac.th

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16 CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 16 Announcements Midterm II March 21st (One week from today) In class Same format as last time Will cover all material since Midterm

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

CSCI-1680 Network Layer: IP & Forwarding John Jannotti

CSCI-1680 Network Layer: IP & Forwarding John Jannotti CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

CH. 3 IP FORWARDING AND ROUTING

CH. 3 IP FORWARDING AND ROUTING 1 2012, Morgan-Kaufmann Pub. Co., Prof. Larry Peterson and Bruce Davie Some marked texts and figures from textbook Conceptual Computer Networks & José María Foces Vivancos CH. 3 IP FORWARDING AND ROUTING

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3

CS 356: Computer Network Architectures. Lecture 15: DHCP, NAT, and IPv6. [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 CS 356: Computer Network Architectures Lecture 15: DHCP, NAT, and IPv6 [PD] chapter 3.2.7, 3.2.9, 4.1.3, 4.3.3 Xiaowei Yang xwy@cs.duke.edu Dynamic Host Configuration Protocol (DHCP) Dynamic Assignment

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene

More information

HY 335 Φροντιστήριο 8 ο

HY 335 Φροντιστήριο 8 ο HY 335 Φροντιστήριο 8 ο Χειμερινό Εξάμηνο 2009-2010 Παπακωνσταντίνου Άρτεμις artpap@csd.uoc.gr 4/12/2009 Roadmap IP: The Internet Protocol IPv4 Addressing Datagram Format Transporting a datagram from source

More information

Review of Internet Architecture and Protocols

Review of Internet Architecture and Protocols Review of Internet Architecture and Protocols Professor Guevara Noubir Northeastern University noubir@ccs.neu.edu Lecture Reference Textbook: (source of some diagrams) Computer Networks: A Systems Approach,

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How

More information

Network Layer: Control/data plane, addressing, routers

Network Layer: Control/data plane, addressing, routers Network Layer: Control/data plane, addressing, routers CS 352, Lecture 10 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors)

More information

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Goal is to use this opportunity (and not to find the lowest common denominator

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

Internet Protocol (IP)

Internet Protocol (IP) CPSC 360 - Network Programming Internet Protocol (IP) Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu March 14, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Topics This week: Network layer (IP, ARP, ICMP) Next week: More network layer (Routers and routing protocols)

More information

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 12 2/28/08 CIS/TCOM 551 1 Announcements Reminder: Project 2 is due Friday, March 7th at 11:59 pm 2/28/08 CIS/TCOM 551 2 Internet Protocol

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Basic Internetworking (IP)

Basic Internetworking (IP) Basic Internetworking (IP) CSCI 466: Networks Keith Vertanen Fall 2011 Internetworking Service model Internet protocol (IP) History Packet format Fragmenta?on Global addressing Overview Discovering link-

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

CSEP 561 Internetworking. David Wetherall

CSEP 561 Internetworking. David Wetherall CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport

More information

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking. Outline 5-44 Computer Networking Lecture 9 Protocol Traditional addressing CIDR addressing Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Forwarding examples 5-44

More information

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer

More information

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical CSE/EE 461 The Network Layer Application Presentation Session Transport Network Data Link Physical This Lecture Focus: What to do when one wire isn t big enough? Point to point link Broadcast link (Ethernet

More information

COMP 631: NETWORKED & DISTRIBUTED SYSTEMS 9/6/16 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS. IP Addressing. Jasleen Kaur. Fall 2016

COMP 631: NETWORKED & DISTRIBUTED SYSTEMS 9/6/16 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS. IP Addressing. Jasleen Kaur. Fall 2016 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS IP Addressing Jasleen Kaur Fall 2016 1 How to Deal With Heterogeneity & Scale? Requirements from IP addressing: Should be globally unique Should facilitate easy

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

CS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay

CS 348 Computer Networks. IP and Routing. Indian Institute of Technology, Bombay Computer Networks IP and Routing Network Interconnections Data Link Layer Delivery of frames on the same LAN Extend reach using switches/bridges and hubs Limitations Solution? Cannot address heterogeniety

More information

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting Quiz v 10/30/2013 (Wednesday), 20 mins v Midterm question (available on website) v TCP basics Segment structure and fields Flow control (rwnd) Timeout interval v TCP Congestion control Phases transition

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

IPv4. Christian Grothoff.

IPv4. Christian Grothoff. IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving

More information

Internet Protocol, Version 6

Internet Protocol, Version 6 Outline Protocol, Version 6 () Introduction to Header Format Addressing Model ICMPv6 Neighbor Discovery Transition from to vs. Taken from:chun-chuan Yang Basics: TCP/ Protocol Suite Protocol (IP) Features:

More information

The Internet. The Internet is an interconnected collection of netw orks.

The Internet. The Internet is an interconnected collection of netw orks. The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

CSCI Computer Networks Fall 2016

CSCI Computer Networks Fall 2016 source: computer-s-webdesign.com CSCI 4760 - Computer Networks Fall 2016 Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu These slides are adapted from the textbook slides by J.F. Kurose and K.W.

More information

Chapter 4: Advanced Internetworking. Networking CS 3470, Section 1

Chapter 4: Advanced Internetworking. Networking CS 3470, Section 1 Chapter 4: Advanced Internetworking Networking CS 3470, Section 1 Intra-AS and Inter-AS Routing a C C.b b d A A.a a b A.c c B.a a B c Gateways: perform inter-as routing amongst themselves b perform intra-as

More information

UNIT III. 3.1 Circuit switching vs. packet switching / Packet switched networks. Figure 3.1.1: Switching Techniques

UNIT III. 3.1 Circuit switching vs. packet switching / Packet switched networks. Figure 3.1.1: Switching Techniques UNIT III Circuit switching vs. packet switching / Packet switched networks IP ARP RARP DHCP ICMP Queueing discipline Routing algorithms RIP OSPF Subnetting CIDR Interdomain routing BGP Ipv6 Multicasting

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

Lecture 3: Packet Forwarding

Lecture 3: Packet Forwarding Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR

More information

Address Translation. Map IP addresses into physical addresses destination host next hop router

Address Translation. Map IP addresses into physical addresses destination host next hop router Address Translation Map IP addresses into physical addresses destination host next hop router Techniques encode physical address in host part of IP address table-based ARP table of IP to physical address

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

Most important (cont d) What s most important in Project 1. Important for individuals. From from Most Important

Most important (cont d) What s most important in Project 1. Important for individuals. From from Most Important What s most important in Project 1 Most important (cont d) gain some experience with the techniques of protocol implementation Learn to design timeouts and resending Peer to peer interface and protocol

More information

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis Session 8. TCP/IP Dongsoo S. Kim (dskim@iupui.edu) Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis IP Packet 0 4 8 16 19 31 Version IHL Type of Service Total Length Identification

More information

C14b: Classless Intradomain Routing

C14b: Classless Intradomain Routing CISC 7332X T6 C14b: Classless Intradomain Routing Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/27/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in this

More information

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly The Internet Protocol IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly IP Addresses IP Addresses are 32 bit. Written in dotted decimal format:

More information

Outline. Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits

Outline. Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits Lecture 2 Outline Addressing on the network layer ICMP IPv6 Addressing on the link layer Virtual circuits TCP/IP protocol suite Good name for our book! User application, e.g., http with Mozilla Communication

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

Computer Networks CS 552

Computer Networks CS 552 Computer Networks CS 552 Badri Nath Rutgers University badri@cs.rutgers.edu 1. Link Layer, Multiple access 2. IP addressing, CIDR, NAT 3. IP/L3 routing, OSPF (link state), RIP(DV), Issues 4. L2 routing

More information

Overview 4.2: Routing

Overview 4.2: Routing Overview 4.2: Routing Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph A 6 1

More information

IP Routing & Bridging

IP Routing & Bridging CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information