IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

Similar documents
CS 457 Networking and the Internet. Network Overview (cont d) 8/29/16. Circuit Switching (e.g., Phone Network) Fall 2016 Indrajit Ray

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t

Announcements. Designing IP. Our Story So Far (Context) Goals of Today s Lecture. Our Story So Far (Context), Con t. The Internet Hourglass

Goals for Today s Class. EE 122: Networks & Protocols. What Global (non-digital) Communication Network Do You Use Every Day?

IPv4 Lecture 10a. COMPSCI 726 Network Defence and Countermeasures. Muhammad Rizwan Asghar. August 14, 2017

Network Layer. IP Protocol Stack: Key AbstracHons. Best- Effort Global Packet Delivery. Circuit Switching (e.g., Phone Network)

EE 122: Introduction To Communication Networks. Some Questions & Answers

What Global (non-digital) Communication Network Do You Use Every Day?"

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018

What Global (non-digital) Communication Network Do You Use Every Day?"

Multiple unconnected networks

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

STEVEN R. BAGLEY PACKETS

ECE 4450:427/527 - Computer Networks Spring 2017

Introduction to Internetworking

Introduction to TCP/IP networking

COS 318: Internetworking

Network Layer (1) Networked Systems 3 Lecture 8

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

ICS 351: Networking Protocols

Introduction to Internetworking

CPSC156a: The Internet Co-Evolution of Technology and Society. Lecture 4: September 16, 2003 Internet Layers and the Web

u 1960s: ARPAnet - Defense Advanced Research Project l Research project into packet switching networks u 1970s: ARPA needed:

ECE 158A: Lecture 7. Fall 2015

CSCD 433/533 Advanced Networks

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

CS4450. Computer Networks: Architecture and Protocols. Lecture 13 THE Internet Protocol. Spring 2018 Rachit Agarwal

Need For Protocol Architecture

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Need For Protocol Architecture

CS 457 Lecture 11 More IP Networking. Fall 2011

Networking: Network layer

CSCI-GA Operating Systems. Networking. Hubertus Franke

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Part 1: Introduction. Goal: Review of how the Internet works Overview

Outline. Computer Communication and Networks. The Network Core. Components of the Internet. The Network Core Packet Switching Circuit Switching

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 6. September 16 CMSC417 Set 3 1

CS457 Transport Protocols. CS 457 Fall 2014

Network and Security: Introduction

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Outline: Connecting Many Computers

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

INTRODUCTORY COMPUTER

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

CS 4390 Computer Networks. Transport Services and Protocols

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University

Internetwork Protocols

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

Chapter 5 OSI Network Layer

Introduction to computer networking

Communications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Lecture 2: Layering & End-to-End

416 Distributed Systems. Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018

EE 122: IP Forwarding and Transport Protocols

ET4254 Communications and Networking 1

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

Page 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11

The Transmission Control Protocol (TCP)

Data & Computer Communication

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Position of IP and other network-layer protocols in TCP/IP protocol suite

ECE4110 Internetwork Programming. Introduction and Overview

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

CPS221 Lecture: Layered Network Architecture

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Architecture & Performance. What s the Internet: nuts and bolts view

EEC-682/782 Computer Networks I

Lecture 2: Internet Structure

CSCI Computer Networks

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

CS3600 SYSTEMS AND NETWORKS

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM SOLUTION

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Announcements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.

ELC 537 Communication Networks

IPng (IPv6) Motivation. Currently: mainly servers, workstations, SLIP/PPP Address space exhaustion + new uses:

ECE 650 Systems Programming & Engineering. Spring 2018

CSCI-1680 Network Layer: IP & Forwarding John Jannotti

CMPE 80N: Introduction to Networking and the Internet

Lecture 9: Internetworking

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

EECS 228a Lecture 1 Overview: Networks. Jean Walrand

Overview of Networks

Links. CS125 - mylinks 1 1/22/14

CE 443: Computer Networks

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Transcription:

IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery IP as the Internet s narrow waist Design philosophy of IP IP packet structure Fields in the IP header Traceroute using TTL field Source-address spoofing 2 Simple Network: Nodes and a Link Node Link Node Node: computer End host: general-purpose computer, cell phone, PDA Network node: switch or router Link: physical medium connecting nodes Twisted pair: the wire that connects to telephones Coaxial cable: the wire that connects to TV sets Optical fiber: high-bandwidth long-distance links Space: propagation of radio waves, microwaves, 3

Network Components Links Interfaces Switches/routers Fibers Ethernet card Large router Wireless card Coaxial Cable Telephone switch 4 Links: Delay and Bandwidth Delay Latency for propagating data along the link Corresponds to the length of the link Typically measured in seconds Bandwidth Amount of data sent (or received) per unit time Corresponds to the width of the link Typically measured in bits per second bandwidth delay x bandwidth delay 5 Connecting More Than Two Hosts Multi-access link: Ethernet, wireless Single physical link, shared by multiple nodes Limitations on distance and number of nodes Point-to-point links: fiber-optic cable Only two nodes (separate link per pair of nodes) Limitations on the number of adapters per node multi-access link point-to-point links 6

Beyond Directly-Connected Networks Switched network End hosts at the edge Network nodes that switch traffic Links between the nodes Multiplexing Many end hosts communicate over the network Traffic shares access to the same links 7 Circuit Switching (e.g., Phone Network) Source establishes connection to destination Node along the path store connection info Nodes may reserve resources for the connection Source sends data over the connection No destination address, since nodes know path Source tears down connection when done 8 Circuit Switching With Human Operator 9

Circuit Switching: Multiplexing a Link Time-division Each circuit allocated certain time slots Frequency-division Each circuit allocated certain frequencies time frequency time 10 Advantages of Circuit Switching Guaranteed bandwidth Predictable communication performance Not best-effort delivery with no real guarantees Simple abstraction Reliable communication channel between hosts No worries about lost or out-of-order packets Simple forwarding Forwarding based on time slot or frequency No need to inspect a packet header Low per-packet overhead Forwarding based on time slot or frequency No IP (and TCP/UDP) header on each packet 11 Disadvantages of Circuit Switching Wasted bandwidth Bursty traffic leads to idle connection during silent period Unable to achieve gains from statistical multiplexing Blocked connections Connection refused when resources are not sufficient Unable to offer okay service to everybody Connection set-up delay No communication until the connection is set up Unable to avoid extra latency for small data transfers Network state Network nodes must store per-connection information Unable to avoid per-connection storage and state 12

Packet Switching (e.g., Internet) Data traffic divided into packets Each packet contains a header (with address) Packets travel separately through network Packet forwarding based on the header Network nodes may store packets temporarily Destination reconstructs the message 13 Packet Switching: Statistical Multiplexing Packets 14 IP Service: Best-Effort Packet Delivery source Packet switching Divide messages into a sequence of packets Headers with source and destination address Best-effort delivery Packets may be lost Packets may be corrupted Packets may be delivered out of order IP network destination 15

IP Service Model: Why Packets? Data traffic is bursty Logging in to remote machines Exchanging e-mail messages Don t want to waste bandwidth No traffic exchanged during idle periods Better to allow multiplexing Different transfers share access to same links Packets can be delivered by most anything RFC 1149: IP Datagrams over Avian Carriers (aka birds) still, packet switching can be inefficient Extra header bits on every packet 16 IP Service Model: Why Best-Effort? IP means never having to say you re sorry Don t need to reserve bandwidth and memory Don t need to do error detection & correction Don t need to remember from one packet to next Easier to survive failures Transient disruptions are okay during failover but, applications do want efficient, accurate transfer of data in order, in a timely fashion 17 IP Service: Best-Effort is Enough No error detection or correction Higher-level protocol can provide error checking Successive packets may not follow the same path Not a problem as long as packets reach the destination Packets can be delivered out-of-order Receiver can put packets back in order (if necessary) Packets may be lost or arbitrarily delayed Sender can send the packets again (if desired) No network congestion control (beyond drop ) Sender can slow down in response to loss or delay 18

Layering in the IP Protocols HTTP Telnet FTP DNS RTP Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet Protocol SONET Ethernet ATM 19 History: Why IP Packets? IP proposed in the early 1970s Defense Advanced Research Project Agency (DARPA) Goal: connect existing networks To develop an effective technique for multiplexed utilization of existing interconnected networks E.g., connect packet radio networks to the ARPAnet Motivating applications Remote login to server machines Inherently bursty traffic with long silent periods Prior ARPAnet experience with packet switching Previous DARPA project Demonstrated store-and-forward packet switching 20 Other Main Driving Goals (In Order) Communication should continue despite failures Survive equipment failure or physical attack Traffic between two hosts continue on another path Support multiple types of communication services Differing requirements for speed, latency, & reliability Bidirectional reliable delivery vs. message service Accommodate a variety of networks Both military and commercial facilities Minimize assumptions about the underlying network 21

Other Driving Goals, Somewhat Met Permit distributed management of resources Nodes managed by different institutions though this is still rather challenging Cost-effectiveness Statistical multiplexing through packet switching though packet headers and retransmissions wasteful Ease of attaching new hosts Standard implementations of end-host protocols though still need a fair amount of end-host software Accountability for use of resources Monitoring functions in the nodes though this is still fairly limited and immature 22 IP Packet Structure 4-bit Version 4-bit Header Length 8-bit Type of Service (TOS) 16-bit Identification 16-bit Total Length (Bytes) 3-bit Flags 13-bit Fragment Offset 8-bit Time to Live (TTL) 8-bit Protocol 16-bit Header Checksum 32-bit Source IP Address 32-bit Destination IP Address Options (if any) Payload IP Header: Version, Length, ToS Version number (4 bits) Indicates the version of the IP protocol Necessary to know what other fields to expect Typically 4 (for IPv4), and sometimes 6 (for IPv6) Header length (4 bits) Number of 32-bit words in the header Typically 5 (for a 20-byte IPv4 header) Can be more when IP options are used Type-of-Service (8 bits) Allow packets to be treated differently based on needs E.g., low delay for audio, high bandwidth for bulk transfer 24

IP Header: Length, Fragments, TTL Total length (16 bits) Number of bytes in the packet Maximum size is 63,535 bytes (2 16-1) though underlying links may impose harder limits Fragmentation information (32 bits) Packet identifier, flags, and fragment offset Supports dividing a large IP packet into fragments in case a link cannot handle a large IP packet Time-To-Live (8 bits) Used to identify packets stuck in forwarding loops and eventually discard them from the network 25 IP Header: More on Time-to-Live (TTL) Potential robustness problem Forwarding loops can cause packets to cycle forever Confusing if the packet arrives much later Time-to-live field in packet header TTL field decremented by each router on the path Packet is discarded when TTL field reaches 0 and time exceeded message is sent to the source 26 IP Header: Use of TTL in Traceroute Time-To-Live field in IP packet header Source sends a packet with a TTL of n Each router along the path decrements the TTL TTL exceeded sent when TTL reaches 0 Traceroute tool exploits this TTL behavior TTL=1 Time exceeded source TTL=2 destination Send packets with TTL=1, 2, and record source of time exceeded message 27

Example Traceroute: Berkeley to CNN No response from router Hop number, IP address, DNS name 1 169.229.62.1 2 169.229.59.225 3 128.32.255.169 4 128.32.0.249 5 128.32.0.66 6 209.247.159.109 7 * 8 64.159.1.46 9 209.247.9.170 10 66.185.138.33 11 * 12 66.185.136.17 13 64.236.16.52 inr-daedalus-0.cs.berkeley.edu soda-cr-1-1-soda-br-6-2 vlan242.inr-202-doecev.berkeley.edu gige6-0-0.inr-666-doecev.berkeley.edu qsv-juniper--ucb-gw.calren2.net POS1-0.hsipaccess1.SanJose1.Level3.net? No name resolution? pos8-0.hsa2.atlanta2.level3.net pop2-atm-p0-2.atdn.net? pop1-atl-p4-0.atdn.net www4.cnn.com 28 IP Header Fields: Transport Protocol Protocol (8 bits) Identifies the higher-level protocol E.g., 6 for the Transmission Control Protocol (TCP) E.g., 17 for the User Datagram Protocol (UDP) Important for demultiplexing at receiving host Indicates what kind of header to expect next protocol=6 IP header TCP header protocol=17 IP header UDP header 29 IP Header: Checksum on the Header Checksum (16 bits) Sum of all 16-bit words in the IP packet header If any bits of the header are corrupted in transit the checksum won t match at receiving host Receiving host discards corrupted packets Sending host will retransmit the packet, if needed 134 + 212 134 + 216 = 346 = 350 Mismatch! 30

IP Header: To and From Addresses Two IP addresses Source IP address (32 bits) Destination IP address (32 bits) Destination address Unique identifier for the receiving host Allows each node to make forwarding decisions Source address Unique identifier for the sending host Recipient can decide whether to accept packet Enables recipient to send a reply back to source 31 Source Address: What if Source Lies? Source address should be the sending host But, who s checking, anyway? You could send packets with any source you want Why would someone want to do this? Launch a denial-of-service attack Send excessive packets to the destination to overload the node, or the links leading to the node Evade detection by spoofing But, the victim could identify you by the source address So, you can put someone else s source address in the packets Also, an attack against the spoofed host Spoofed host is wrongly blamed Spoofed host may receive return traffic from the receiver 32 Summary: Packet Switching Review Efficient Can send from any input that is ready General Multiple types of applications Accommodates bursty traffic Addition of queues Store and forward Packets are self contained units Can use alternate paths reordering Contention (i.e., no isolation) Congestion Delay 33

Next Lecture IP routers Packet forwarding Components of a router Reading for this week Chapter 3: Sections 3.1 and 3.4 Chapter 4: Sections 4.1.1-4.1.4 34