INTERNET SYSTEM. Internet Protocol. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. Large Scale Networking

Similar documents
Kent State University

Position of IP and other network-layer protocols in TCP/IP protocol suite

Internet Protocol (IP)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Introduction to Internetworking

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

Internetwork Protocols

Chapter 20 Network Layer: Internet Protocol 20.1

Internet Protocols (chapter 18)

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.

Chapter Motivation For Internetworking

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

b. Suppose the two packets are to be forwarded to two different output ports. Is it

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

End-to-End Communication

IP Address Assignment

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

ET4254 Communications and Networking 1

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

The Internet Protocol (IP)

ECE4110 Internetwork Programming. Introduction and Overview

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Network Layer/IP Protocols

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

CS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray

The Internet. The Internet is an interconnected collection of netw orks.

IP : Internet Protocol

Lecture 8. Network Layer (cont d) Network Layer 1-1

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Ch.7 Internet Protocol: Connectionless Datagram Delivery (IPv4, IPv6)

ECE 4450:427/527 - Computer Networks Spring 2017

Network Layer: Internet Protocol

CS-461 Internetworking. Dr. Mohamed Aboutabl

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

TSIN02 - Internetworking

Lecture 11: Networks & Networking

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University

SEN366 (SEN374) (Introduction to) Computer Networks

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

Module 7 Internet And Internet Protocol Suite

Router Architecture Overview

User Datagram Protocol

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Vorlesung Kommunikationsnetze

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

COMP/ELEC 429/556 Introduction to Computer Networks

Lecture 3. The Network Layer (cont d) Network Layer 1-1

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

CHAPTER-2 IP CONCEPTS

Chapter 19 Network Layer: Logical Addressing

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16

Chapter 4: Network Layer

TCP/IP THE TCP/IP ARCHITECTURE

Introduction to TCP/IP networking

TCP/IP Protocol Suite

TSIN02 - Internetworking

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

ECE 158A: Lecture 7. Fall 2015

OSI Network Layer. Chapter 5

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Data Communication & Computer Networks Week # 13

Lecture 9: Internetworking


CS 455 Internet Architecture, Page 3 ffl By 1985, the ARPANET was heavily used and congested; the National Science Foundation (NSF) initiated the NSFN

Chapter 5 Network Layer

Layering and Addressing CS551. Bill Cheng. Layer Encapsulation. OSI Model: 7 Protocol Layers.

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

Chapter 5 OSI Network Layer

STEVEN R. BAGLEY PACKETS

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Recap. Recap. Internetworking. First mile problem. Internet. End Users. Last mile problem. Direct link networks Packet switching.

IPv4. Christian Grothoff.

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 80N: Introduction to Networking and the Internet

Communication Systems DHCP

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

NETWORK LAYER: IP Addressing

Transcription:

CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-6 SYSTEM 1 2 Large Scale Networking No Single Technology can Adequately Serve Every One s Need. Each LAN/ WAN has specific Performance, Quality of Service, Advantages. Internet Protocol Again WAN/ LAN Technologies are not interoperable Packet Format & Size Addressing Format Overall how actions are coordinated. Autonomy: Single Administrative Domain Multiple Administrative Domains. No one can be forced to give away their mode and adopt an universal LAN/ WAN technology. LECT-6, S-3 Objective: Universal Service. Can we have one single network technology serving all? Why networks cannot communicate? What are the two main sources of incompatibilty? What is internet and Internet? LECT-6, S-4 The Main Hardware Component Internet Architecture Routers: like bridge connects two network. Performs filtered frame forwarding. But, also understands packet format. Two sides can be two technologies. Why Routers are Bridge like, but not Switch like? LECT-6, S-5 LECT-6, S-6

Protocols for Internetworking A number of attempts were made to make internetworking possible. However, the most successful one is the protocol suit known as TCP/IP. Its development begun in the 1970s by DARPA. IP- Internet Protocol Global Addressing Scheme Virtual Datagram Datagram Forwarding Fragmentation & Reassembly Now Internet connects more than 80 million computers across more than 107 countries. TCP- Transmission Control Protocol Connection startup & shutdown Reliability: ordering, missing data handling LECT-6, S-7 LECT-6, S-8 IP Addressing Scheme IP Addressing Format To achieve an illusion of single network, all computers, despite their differences in physical technology, should have a uniform addressing scheme. IP address = Network number + host number If n bits are for network than how many networks can be there? This is done as a software address. In this abstraction, each host in internet is assigned an unique 32 bit address called IP address. Network number Host number How many hosts can be in those networks? 32 bits LECT-6, S-9 The hierarchy allows host addresses to be assigned independently. What is the right allocation for bits for each part? LECT-6, S-10 IP Addressing Classes IP divides the addresses into 5 classes to accommodate networks of varying sizes. Network Sizes LECT-6, S-11 LECT-6, S-12

Special Addresses Network Address (n.n.n.0, n.0.0.0, etc) Never appears as the destination in an IP packet. Direct Broadcast (n.n.n.255, n.n.255.255, etc.) All computer in the logical network. Limited Broadcast (255.255.255.255) All computers in physical network This computer (0.0.0.0) used during booting. Loopback (127.any) used for testing. Address Management ICANN/ IANA/ authorized registries now assign network numbers or blocks of network numbers to ISPs. Big ISPs further distribute the network numbers to smaller ISPs connected to them. Network administrators assigns the host numbers to individual computers. LECT-6, S-13 LECT-6, S-14 An Example Private TCP/IP Network Router Addresses Class B= 128 Class A= 10 Class C= 192 Can you determine the network classes? Routers have more than one IP addresses. Some Network computers Address may also be in more than one networks. LECT-6, S-15 LECT-6, S-16 IP Packets IP Datagram Physical Networks differ in the format, size, transmission mechanism of packets. If applications have to be aware of these diversities than application developed for one physical network technology will not work for other. IP packets are called IP datagram. IP therefore creates a definition of virtual packets which all applications can use. IP software takes the responsibility of adapting to specific underlying network technology. IP packets are virtual. They never travel across a network intact. IP offers communication mechanism for both connectionless and connection-based services. IP datagrams can be of variable size 1-64K octates. IP datagram header contains information to route the packet across internet. IP datagrams are encapsulated in frames before they are transmitted over any Network. The address that appears in datagram header is different from the address that appears in frame header. LECT-6, S-17 LECT-6, S-18

IP Datagram Header IP does not take responsibility of: duplication, outof-order, corrupt data or lost datagram problems. IP- Internet Protocol Global Addressing Scheme Virtual Datagram Datagram Forwarding Fragmentation & Reassembly TCP- Transmission Control Protocol Connection startup & shutdown Reliability: ordering, missing data handling VARS=IP version, H.LEN=how many 32 bit segments in header SEVICE TYPE= min delay or max capacity path? TOTAL LENGTH= HEADER+DATA octates. TIME TO LIVE=maximum allowable hops (0-255) HEADER CHECKSUM= 1 s complement sum OPTIONS=optional, without it LEN=H.LEN=5, PADDING=0 s to meet 32 bit boundary LECT-6, S-19 LECT-6, S-20 How Data is Forwarded? IP Datagram Forwarding: Concept To create an illusion of large uniform network software works with IP addresses. It puts data into packet and specifies the IP address of the destination. TCP/IP software in each host (or router) looks into the destination address and decides the next-hop. This next hop is also IP address. Q1: How to travel through the network to the destination? What is the best path? Immediate question, who is the next IP Hop router? Q2: How to get to the next HOP? What is the LAN address of next Hop router? Unfortunately, IP addresses are virtual and cannot be used to reach the next-hop across a physical network. A frame sent across a physical network must have a physical address. LECT-6, S-21 LECT-6, S-22 Q1: How IP Datagram Routing IP Datagram Routing: Example Each router sends forwards it to next router. They maintain a simple table which can also be managed by humans. The IP tables are a little complicated. It uses Masks. R2 s routing table R2 s routing table LECT-6, S-23 LECT-6, S-24

Q2: Address Resolution Translation from IP address to hosts physical address is known as address resolution. ARP Protocol Address resolution is always local to a physical network. ARP requests are Broadcast A to B: Protocol Software resolves B s address. A to D: Protocol Software on A determines R1 is the next hop s IP address. A resolves R1 s address. ARP replies are not Broadcast Protocol Software on R2 resolves D s address. LECT-6, S-25 LECT-6, S-26 ARP Message Format ARP Message on Ethernet Frame ARP protocol is general and can handle any-to-any translation. 1 FOR ETHERNET Preamble 64 (8 octates) 10101010.. synchronizes hardware. x0800 FOR IP TCP/IP to Ethernet ARP message format 1 for REQ 2 for RES LECT-6, S-27 48 bits static destination and source address. 16 bit frame type describe content forms. 0800 IP Version 4 806 Internet ARP 46-1500 byte data. 32 bit CRC. LECT-6, S-28 Fragmentation & Reassembly Datagrams are fragmented into multiple segments, if it faces a Network with MTU smaller than the datagram size. Each fragment has the same format as the datagram, except a bit flag which indicates that it is a fragment, not the entire datagram. FRAGMENTOFFSET field indicates where in the orginal datagram the fragment data belongs. Flashback: Subnetting LECT-6, S-29 30

Subnetting & Masks Subnet Masks IP address is depleting faster than expected: All network, even one with 2 hosts, need at least class C address. A network with 256 hosts need class B address. Also, the more there is networks, the bigger the routing table gets. Solution is subnetting. A network can be divided into subnets. Outside routers still view them as one large network. Only, the local routers see them as separate networks. LECT-6, S-31 Now in each routing table both the network number and the mask is stored. An AND operation is performed before looking up for the next hop. For distant networks, the mask is of type A, B, or C. But for local network, the mask is longer. LECT-6, S-32 Example of Subnet IP Datagram Forwarding: with IP But the administrator of 128.96.34.0 has divided its network into two physical networks 128.96.34.0 and 128.96.34.0 and 128.96.34.128 with mask 255.255.255.128 What is Bit Mask? Network 128.96.34.0 is class B address and can have about 256x256 hosts in one large network H3 in 128.96.33.0 sees everything in 128.96.34.0 as one single network. LECT-6, S-33 R2 s routing table LECT-6, S-34 Flashback: Fragmentation & Reassembly IP- Internet Protocol Addressing Scheme Virtual Datagram Datagram Forwarding Fragmentation & Reassembly TCP- Transmission Control Protocol Connection startup & shutdown Reliability: ordering, missing data handling 35 LECT-6, S-36

Encapsulation Transmission across Internet Datagrams have to travel via a physical network. But, a physical network has its own Frame format. A Datagram, therefore must be encapsulated. The destination address in the Frame header is the address of the next hop. LECT-6, S-37 Encapsulation applies to one network at a time. However, in Internet the journey requires series of transmission over many different Networks. LECT-6, S-38 MTU and Datagram Size Each Network on its way generally has their own maximum transmission unit size (MTU). How can IP routers can overcome this obstacle? Fragmentation Datagrams are fragmented into multiple segments, if it faces a Network with MTU smaller than the datagram size. Each fragment has the same format as the datagram, except a bit flag which indicates that it is a fragment, not the entire datagram. FRAGMENTOFFSET field indicates where in the orginal datagram the fragment data belongs. LECT-6, S-39 LECT-6, S-40 Reassembly Because each fragment has a copy of the original header, and an indication flag that it is a fragment, the original datagram can be reassembled at the end. IP specifies only the destination should reassemble fragments. H1 sends 1500B, but it is fragmented by R1. But, R2 does not reassemble them although Net3 MTU is 1500! Datagram Identification individual fragments can arrive out of order. How IP reassembles out of order fragments? Sender inserts an unique number in INDENTIFICATION field. This with FRAGMENT OFFSET helps in restoring out of order. IP does not guarantee delivery and thus fragments can be lost. How IP handles such loss? The same two fields helps in identifying a missing fragment. After receiving the first FRAGMENT, receiver starts a timer. If the entire datagram does not arrive with in a specified time, it discards all fragments. But, it does not notify the sender! LECT-6, S-41 LECT-6, S-42

Example of TCP Fragments What if a fragment needs to be fragmented again? Before Fragmentation Minor detail: Offset field count in units of 8 bytes. Fragmentation have to be performed in units of 8 bytes. LECT-6, S-43 LECT-6, S-44 IP & Reliability IP is a best effort mechanism. But provides no guarantee of delivery. However, it is not careless! ICMP is a mechanism by which network elements can pass information about the source/cause of errors, and also warn each other about potential problem. LECT-6, S-45