EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Similar documents
NETWORK LAYER: IP Addressing

TSIN02 - Internetworking

Vorlesung Kommunikationsnetze

TSIN02 - Internetworking

TSIN02 - Internetworking

TSIN02 - Internetworking

TSIN02 - Internetworking

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

Lecture 8 Network Layer: Logical addressing

TSIN02 - Internetworking

Network Layer/IP Protocols

TCP/IP Protocol Suite

Chapter 5 TCP/IP SUITE

IP - The Internet Protocol

Position of IP and other network-layer protocols in TCP/IP protocol suite

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

IP Address Assignment

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L6 Networking and IP

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Internet Protocol (IP)

End-to-End Communication

Network Layer: Logical Addressing

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Chapter 4 Network Layer

Network Layer: outline

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Chapter 18. Introduction to Network Layer

OSI Data Link & Network Layer

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

Chapter 11. User Datagram Protocol (UDP)

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

OSI Data Link & Network Layer

TCP /IP Fundamentals Mr. Cantu

Objectives. Chapter 10. Upon completion you will be able to:

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

LOGICAL ADDRESSING. Faisal Karim Shaikh.

OSI Transport Layer. objectives

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

Chapter 5. Subnetting/Supernetting and Classless Addressing

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

The Internet Protocol (IP)

OSI Data Link & Network Layer

ECE 4450:427/527 - Computer Networks Spring 2017

IP Addresses McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Network Layer: Control/data plane, addressing, routers

Chapter 19 Network Layer: Logical Addressing

ECE 158A: Lecture 7. Fall 2015

INTERNET SYSTEM. Internet Protocol. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. Large Scale Networking

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

CS164 Final Exam Winter 2013

Internetworking Part 2

TCP/IP THE TCP/IP ARCHITECTURE

Introduction to TCP/IP networking

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Network Protocols - Revision

TCP/IP and the OSI Model

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Chapter 7. Local Area Network Communications Protocols

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays.

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

ET4254 Communications and Networking 1

Subnetting/Supernetting and Classless Addressing

SEN366 (SEN374) (Introduction to) Computer Networks

Communication at the network layer is host-to-host Length of address. Total number of addresses used by the protocol. IPv4 & IPv6

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Chapter Motivation For Internetworking

CSCI-GA Operating Systems. Networking. Hubertus Franke

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Addressing and Routing

Part 4. Wide Area Networks (WAN)

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Internet Fundamentals

Unit 2.

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Networking Fundamentals

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Chapter 19 Network Layer: Logical Addressing 19.1

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

The Interconnection Structure of. The Internet. EECC694 - Shaaban

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Chapter 2 Advanced TCP/IP

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Data Communication & Computer Networks Week # 13

Introduction to TCP/IP

CH. 3 IP FORWARDING AND ROUTING

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Transcription:

EITF25 Internet Techniques and Applications L7: Internet Stefan Höst

What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet use the TCP/IP protocol suite. All protocols and other things are described in Request for Comments (RFCs). 2

Internet administration Source: http://www.hill2dot0.com 3

Network architecture Two types of networks in Internet: Backbone networks and Access networks. The end-user is connected to an access network. Today, the access networks and some of the backbone networks are owned by private so called Internet Service Providers (ISPs). Network Access Points, NAPs, (or Internet Exchanges, IX) are switching stations that provide connection between backbone networks. 4

Organisation of Internet 5

Internetwork 6

Internet? All networks that are part of Internet have one thing in common: They all use the same network protocol, Internet Protocol (IP)! However, they do not need to use the same link protocols, which means that all kinds of networks can be part of Internet. The protocol framework for Internet is called the TCP/IP-model. 7

OSI vs TCP/IP models OSI Application Presentation Session Transport Network Link Physical TCP/IP Application Transport Network Link Physical Underlying network 8

TCP/IP model The TCP/IP model is sometimes illustrated with a hourglass. 9

TCP/IP protocol suite 10

Why is this important? The data networks have been developed during more than 40 years. During this time, several networks have been standardized with different protocols on different layers. Since IP can be used on all types of networks, this has made Internet what it is today. All documentation about the Internet protocols is so called open access. 11

Internet protocol (IP) Two versions of IP: IPv4 is used today that will be the main focus in this course. IPv6 is an improved future network protocol, which we will only introduce in this course. IP is a so called Best effort protocol, which means that it does not support any error control methods. Also, IP is based on connectionless transmission. 12

IP addresses (IPv4) Every host and router that are connected to the Internet have a unique network address (IP address) that is 32 bits long. The address is usually written in a dotted-decimal format. 13

IP addresses The IPv4 address consists of two parts: Netid (prefix) defines the network that the device is connected to. Hostid (suffix) defines the device itself within this network. 14

Address hierarchy 15

Addressing methods There are two ways to define addresses: Classful addressing Classless addressing 16

Classful addressing Five address classes are defined: A, B, C, (D, and E) 17

Netid and hostid in Classful addressing = netid 18

Address depletion The IPv4 address space with classful addresses was determined at a time when there were very few networks connected to the Internet. However, with the growth of Internet, the address classes didn t match the reality. Therefore, subnetting and supernetting was introduced. Subnetting: Class A and B address blocks are divided into several subnets. Supernetting: Several Class C address blocks were combined into a larger block. 19

Classful addressing The major problem with classful addressing is that an organization can only get a block of addresses. Therefore, in 1996, Internet authorities announced classless addressing. 20

Classless addressing In classless addressing, an organization (small or large) is granted a block of addresses, with the following restrictions: The addresses in a block must be contiguous. The number of addresses in a block must be a power of 2. The first address must be evenly divisible by the number of addresses. 21

Classless addressing, example 22

Mask An address block can be defined by its mask. A mask is a 32-bit number in which the n leftmost bits are 1s and the 32-n rightmost bits are 0s. In IPv4 addressing, a block of addresses can be defined as: x.y.z.t /n in which x.y.z.t defines one of the addresses and the /n defines the mask. The slash notation /n is called Classless Interdomain Routing (CIDR) 23

Slash notation (CIDR) 24

Information extracting 25

Classless addressing, example Address: 11011110 00010111 01000011 01000100 Mask: 11111111 11111111 11000000 00000000 Netid: 11011110 00010111 01000000 00000000 Hostid: 00000000 00000000 00000011 01000100 Decimal-dotted format: 232.23.67.68/18 26

Classless v. classful addressing The classful addressing scheme can also be represented with masks: 27

Routers use the network address 28

Forwarding example 29

Resulting forwarding table The n leftmost bits of the destination address (prefix) are kept and the rest of the bits (suffix) are set to zero. 30

Alternative forwarding table If the leftmost bits of the destination address matches, the packet is sent out from the corresponding interface. 31

Longest mask matching The principle states that the forwarding table must be sorted from the longest mask to the shortest mask. 32

IPv4 datagram format 33

Encapsulated data The protocol field contains information about what higher-level protocol that uses the services of IPv4. 34

Header checksum, example The header contains a 16-bit checksum: 35

Fragmentation IP allows for 65.535 bytes payload. However, IP packets can be fragmented if the data from upper layer cannot fit in a link layer frame. Typical maximum size is 1500 bytes (IEEE 802). It is the source host that fragments the data, and the destination host that reassembles the data. Header fields identification, flags and fragmentation offset are used. 36

Fragmentation offset example 37

Problems with IPv4 IPv4 has the following major problems: The address space is to small. It was not designed for real-time applications. It has no support for encryption and authentication. Therefore, IPv6 was developed. However, the adoption of IPv6 has been slow. Some operators in Sweden use IPv6. 38

IPv4 map 2011 39

Some advantages with IPv6 Larger address space: 128 bits long addresses. Better header format: The base header has a constant length (40 bytes). Options can be inserted, when needed. Support for more security: IPv6 has encryption and authentication options. Support for real-time applications: Special handling of datagram can be requested. 40

IPv6 packet format 41

IPv6 addresses Hexadecimal colon notation 42

Abbreviated IPv6 addresses The removal of whole sections of zeros can only be done once per address. 43

Transport protocols in Internet 44

Process-to-process delivery 45

Port numbers The Internet Cooperation for Assigned Names and Numbers Authority (ICANN) has defined three types of port numbers: Well-known ports are assigned and controlled by IANA. Registered ports can be registered with IANA to prevent duplication. Dynamic ports are neither controlled nor registered, and can be used by any software. They are also called ephemeral ports. 46

Port number range The port numbers are within the following ranges: 47

Socket address The combination of an IP address and a port number is called a socket address. 48

Multiplexing and demultiplexing The socket addresses allow multiplexing and demultiplexing by the transport layer: 49

User Datagram Protocol (UDP) UDP is a connectionless, unreliable transport protocol. It does not add anything to services of IP except to provide process-to-process communication instead of host-to-host communication. Advantage: It is very simple and adds a minimum of overhead. Some applications that use UDP: Online games, IPtelephony, real-time streaming applications. 50

Some well-known UDP ports 51

UDP packet format 52

Checksum calculation The UDP checksum uses a pseudoheader, the UDP header, and the data from the application layer (padded to multiple of 16 bits) 53

Transmission Control Protocol (TCP) TCP is a connection-oriented, reliable transport protocol. It creates a virtual connection between two processes. Also, it provides flow and error control mechanisms. Some applications that use TCP: HTTP, File transfer, Email, video streaming, online games. 54

Some well-known TCP ports 55

Stream delivery TCP allows the sending process to deliver data as a stream of bytes and allows the receiving process to obtain data as a stream of bytes. 56

TCP functions TCP groups a number of bytes together into a packet called a segment. To allow for flow and error control control, both the sender and receiver use buffers on byte level. TCP implements a Go-back-N protocol in which the sequence number is the number of the first byte carried in the segment. The ACK contains the number of the next byte that the receiver expects to receive. ACKs can be piggybacked. 57

TCP Segments, example 58

TCP segment format 59

TCP sequence numbers TCP assigns a sequence number to each segment that is being sent. The sequence number of the first segment is the Initial sequence number (ISN) which is a random number. The sequence number of any other segment is the sequence number of the previous segment plus the number of bytes carried by the previous segment. 60

TCP connection establishment The connection establishment in TCP is called threeway handshaking. 61

TCP data transfer The data transfer uses full duplex, piggybacking and Go-back-N. The receiver saves all segments that are received in the wrong order. 62

TCP connection termination 63

Error control TCP has advanced flow and congestion controls that are not included in this course. The Error control is based on Go-back-N ARQ, and we will show some scenarios. 64

Example: Normal operation Bidirectional data, ACK piggybacked if possible. 65

Example: Lost segment RTO = Retransmission Time-Out 66

Example: Fast retransmission The RTO timer is dynamic, and therefore, fast retransmission is also implemented. 67

Address Resolution Protocol (ARP) In order to find a specific host/router in a network, the IP-address must be mapped to a physical address. Adress Resolution Protocol (ARP) is used for the mapping of IP-addresses to MAC-addresses within a LAN. A host in a LAN always knows the IP-address to a default router (gateway) that is connected to the rest of Internet. 68

Position of ARP in TCP/IP suite ARP is a help protocol to IP: 69

ARP operation Each host/router has a ARP cache (table) that is used to store MAC/IP-address pairs. An ARP query packet is broadcasted everytime a host/router needs to map an IP-address to a MACaddress. The intended host answers with an ARP response packet. 70

ARP operation 71

ARP packet format (Ethernet = 1) (IPv4 = (0800) 16 ) 72

ARP example 73

ARP, example If the intended host is on another network, the packet is sent to the default gateway. A B C D E F G H The Net Default gateway Default gateway 74