Chapter 5 OSI Network Layer

Similar documents
OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Chapter 5

SEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide?

Chapter 5 Network Layer

Position of IP and other network-layer protocols in TCP/IP protocol suite

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

EE 610 Part 2: Encapsulation and network utilities

Internetwork Protocols

Introduction to Internetworking

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Chapter 20 Network Layer: Internet Protocol 20.1

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

ECE4110 Internetwork Programming. Introduction and Overview

Internet Networking recitation #2 IP Checksum, Fragmentation

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internet Protocols (chapter 18)

Data & Computer Communication

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

The Internet. The Internet is an interconnected collection of netw orks.

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

CHAPTER-2 IP CONCEPTS

II. Principles of Computer Communications Network and Transport Layer

ET4254 Communications and Networking 1

Internet Protocol version 6

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

The Internet Protocol (IP)

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Introduction to Protocols

IP : Internet Protocol

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

Communication Systems DHCP

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

TCP /IP Fundamentals Mr. Cantu

Introduction to TCP/IP networking

Vorlesung Kommunikationsnetze

Ch.7 Internet Protocol: Connectionless Datagram Delivery (IPv4, IPv6)

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

Packetization Layer Path Maximum Transmission Unit Discovery (PLPMTU) For IPsec Tunnels

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite

Department of Computer Science and Engineering. CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016

Lecture 9: Internetworking

Lecture 8. Network Layer (cont d) Network Layer 1-1

ECE 461 Internetworking Fall Quiz 1

CH. 3 IP FORWARDING AND ROUTING

Module 7 Internet And Internet Protocol Suite

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [NETWORKING] Frequently asked questions from the previous class surveys

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

Chapter 7. Local Area Network Communications Protocols

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Review of Important Networking Concepts

IP Address Assignment

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Introduction Layer 3. IP-Header: and RFC-760 Addressing schemes Subnetting Routing. Layer 3 Solution in Trains

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

TCP/IP protocol suite

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Need For Protocol Architecture

SEN366 (SEN374) (Introduction to) Computer Networks

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

Networking Background

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

Network Reference Models

Lesson 3. IPv4 and IPv6 Protocols. Chapter-4 L03: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1

Network Architecture Models

IPng (IPv6) Motivation. Currently: mainly servers, workstations, SLIP/PPP Address space exhaustion + new uses:

Networks Homework # 2

Recap. Recap. Internetworking. First mile problem. Internet. End Users. Last mile problem. Direct link networks Packet switching.

Network Protocols. Internet Protocol (IP) TDC375 Autumn 2010/11 John Kristoff - DePaul University 1

TCP/IP THE TCP/IP ARCHITECTURE

Network Layer (1) Networked Systems 3 Lecture 8

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Your Name: Your student ID number:

Need For Protocol Architecture

Network Layer/IP Protocols

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

The Internetworking Problem. Internetworking. A Translation-based Solution

Lecture 2: Basic routing, ARP, and basic IP

Communicating over the Network

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

CS 457 Networking and the Internet. Problems. Mechanisms 9/21/16. Fall 2016 Indrajit Ray

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Introduction to Open System Interconnection Reference Model

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv4 Lecture 10a. COMPSCI 726 Network Defence and Countermeasures. Muhammad Rizwan Asghar. August 14, 2017

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Transcription:

Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation allows its contents to be passed to the destination within a network or on another network with minimum overhead. This chapter focuses on the role of the Network layer - examining how it divides networks into groups of hosts to manage the flow of data packets within a network. We also consider how communication between networks is facilitated. This communication between networks is called routing. Learning Objectives Upon completion of this chapter, you will be able to: Identify the role of the Network layer as it describes communication from one end device to another end device. Examine the most common Network layer protocol, Internet Protocol (IP), and its features for providing connectionless and best-effort service. Understand the principles used to guide the division, or grouping, of devices into networks. Understand the hierarchical addressing of devices and how this allows communication between networks. Understand the fundamentals of routes, next-hop addresses, and packet forwarding to a destination network. 1

5.1 Network Layer Communication from Host to Host The Network layer, or OSI Layer 3, provides services to exchange the individual pieces of data over the network between identified end devices. To accomplish this end-to-end transport, Layer 3 uses four basic processes: 1. Addressing the Network layer must provide a mechanism for addressing end devices. 2. Encapsulation the Network layer must provide encapsulation. Layer 3 receives the Layer 4 PDU and adds a Layer 3 header, or label, to create the Layer 3 PDU (i.e. packet). 3. Routing the Network layer must provide services to direct packets to their destination host. The source and destination hosts are not always connected to the same network. 4. Decapsulation The host examines the destination address to verify that the packet was addressed to this device. Unlike the Transport layer (OSI Layer 4), which manages the data transport between the processes running on each end host, Network layer protocols specify the packet structure and processing used to carry the data from one host to another host. 2

Network Layer Protocols Protocols implemented at the Network layer that carry user data include: Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Novell Internetwork Packet Exchange (IPX) AppleTalk Connectionless Network Service (CLNS/DECNet) 5.2 Role of IPv4 As shown in the figure, the Network layer services implemented by the TCP/IP protocol suite are the Internet Protocol (IP). Version 4 of IP (IPv4) is currently the most widely-used version of IP. It is the only Layer 3 protocol that is used to carry user data over the Internet. IPv4 basic characteristics: Connectionless - No connection is established before sending data packets. Best Effort (unreliable) - No overhead is used to guarantee packet delivery. Media Independent - Operates independently of the medium carrying the data. Connectionless Service An example of connectionless communication is sending a letter to someone without notifying the recipient in advance. As shown in the figure, the postal service still takes the letter and delivers it to the recipient. Connectionless data communications works on the same principle. IP packets are sent without notifying the end host that they are coming. Connection-oriented protocols, such as TCP, require that control data be exchanged to establish the connection as well as additional fields in the PDU header. Because IP is connectionless, it requires no initial exchange of control information to establish an end-toend connection before packets are forwarded and no additional fields in the PDU header to maintain this connection. This process greatly reduces the overhead of IP. 3

1 2 3 4

5.3 IPv4 Packet Header As shown in the figure, an IPv4 protocol defines many different fields in the packet header. These fields contain binary values that the IPv4 services reference as they forward packets across the network. This course will consider these 6 key fields: IP Source Address IP Destination Address Time-to-Live (TTL) Type-of-Service (ToS) Protocol Fragment Offset Key 5

IP Destination Address The IP Destination Address field contains a 32-bit binary value that represents the packet destination Network layer host address. IP Source Address The IP Source Address field contains a 32-bit binary value that represents the packet source Network layer host address. Time-to-Live The Time-to-Live (TTL) is an 8-bit binary value that indicates the remaining "life" of the packet. The TTL value is decreased by at least one each time the packet is processed by a router (that is, each hop). When the value becomes zero, the router discards or drops the packet and it is removed from the network data flow. This mechanism prevents packets that cannot reach their destination from being forwarded indefinitely between routers in a routing loop. If routing loops were permitted to continue, the network would become congested with data packets that will never reach their destination. Protocol This 8-bit binary value indicates the data type that the packet is carrying. The Protocol field enables the Network layer to pass the data to the appropriate upper-layer protocol. Example values are: 01 ICMP (Internet Control Message Protocol) 06 TCP (Transmission Control Protocol) 17 UDP (User Datagram Protocol) Type-of-Service The Type-of-Service field contains an 8-bit binary value that is used to determine the priority of each packet. This value enables a Quality-of-Service (QoS) mechanism to be applied to high priority packets, such as those carrying telephony voice data. The router processing the packets can be configured to decide which packet it is to forward first base on the Type-of- Service value. Fragment Offset As mentioned earlier, a router may have to fragment a packet when forwarding it from one medium to another medium that has a smaller MTU (Maximum Transmission Unit). When fragmentation occurs, the IPv4 packet uses the Fragment Offset field and the MF flag in the 6

IP header to reconstruct the packet when it arrives at the destination host. The fragment offset field identifies the order in which to place the packet fragment in the reconstruction. More Fragments flag The More Fragments (MF) flag is a single bit in the Flag field used with the Fragment Offset for the fragmentation and reconstruction of packets. The More Fragments flag bit is set, it means that it is not the last fragment of a packet. When a receiving host sees a packet arrive with the MF = 1, it examines the Fragment Offset to see where this fragment is to be placed in the reconstructed packet. When a receiving host receives a frame with the MF = 0 and a non-zero value in the Fragment offset, it places that fragment as the last part of the reconstructed packet. An unfragmented packet has all zero fragmentation information (MF = 0, fragment offset =0). Don't Fragment flag Don't Fragment (DF) flag is a single bit in the Flag field that indicates that fragmentation of the packet is not allowed. If Don't Fragment flag bit is set, then fragmentation of this packet is NOT permitted. If a router needs to fragment a packet to allow it to be passed downward to the Data Link layer but the DF bit is set to 1, then the router will discard this packet. Version - Contains the IP version number (4) Header Length (IHL) - Specifies the size of the packet header. Packet Length - This field gives the entire packet size, including header and data, in bytes. Identification - This field is primarily used for uniquely identifying fragments of an original IP packet Header Checksum - The checksum field is used for error checking the packet header. Options - There is provision for additional fields in the IPv4 header to provide other services but these are rarely used. 5.3 Networks- Separating Hosts into Common Groups 5.3.1 Dividing Networks Rather than having all hosts everywhere connected to one vast global network, it is more practical and manageable to group hosts into specific networks. 7

Networks can be grouped based on factors that include: Geographic location, Purpose, and Ownership. Grouping Hosts Geographically We can group network hosts together geographically. Grouping hosts at the same location - such as each building on a campus or each floor of a multi-level building - into separate networks can improve network management and operation. 8

Grouping Hosts for Specific Purposes Users who have similar tasks typically use common software, common tools, and have common traffic patterns. We can often reduce the traffic required by the use of specific software and tools by placing the resources to support them in the network with the users. Grouping Hosts for Ownership Using an organizational (company, department) basis for creating networks assists in controlling access to the devices and data as well as the administration of the networks. In one large network, it is much more difficult to define and limit the responsibility for the network personnel. Dividing hosts into separate networks provides a boundary for security enforcement and management of each network. 9