SEN366 (SEN374) (Introduction to) Computer Networks

Similar documents
Internet Protocols (chapter 18)


ET4254 Communications and Networking 1

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

Introduction to Internetworking

Internetwork Protocols

The Internet. The Internet is an interconnected collection of netw orks.

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

TCP/IP Protocol Suite

TSIN02 - Internetworking

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

This Lecture. BUS Computer Facilities Network Management. Internetworking. Internetworking

Vorlesung Kommunikationsnetze

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

Network Layer/IP Protocols

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

CHAPTER-2 IP CONCEPTS

TSIN02 - Internetworking

Network layer: Overview. Network Layer Functions

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

Internet Protocol, Version 6

Router Architecture Overview

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

The Internet Protocol (IP)

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

IP: Addressing, ARP, Routing

Chapter Motivation For Internetworking

Introduction to routing in the Internet

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

7th Slide Set Computer Networks

TCP /IP Fundamentals Mr. Cantu

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Chapter 4: Network Layer

OSI Network Layer. Chapter 5

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Introduction to routing in the Internet

Lecture 3. The Network Layer (cont d) Network Layer 1-1

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Lecture 8. Network Layer (cont d) Network Layer 1-1

The Internetworking Problem. Internetworking. A Translation-based Solution

Network Layer PREPARED BY AHMED ABDEL-RAOUF

IP Address Assignment

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

OSI Data Link & Network Layer

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

Master Course Computer Networks IN2097

Need For Protocol Architecture

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

EEC-484/584 Computer Networks

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Position of IP and other network-layer protocols in TCP/IP protocol suite

TCP/IP and the OSI Model

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Need For Protocol Architecture

ECE4110 Internetwork Programming. Introduction and Overview

Asst. Prof. Chaiporn Jaikaeo, Ph.D.

IP Addressing and Subnetting

CSCI Computer Networks Fall 2016

Internet Protocol (IP)

Recap. Recap. Internetworking. First mile problem. Internet. End Users. Last mile problem. Direct link networks Packet switching.

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

Chapter 5 TCP/IP SUITE

Introduction Layer 3. IP-Header: and RFC-760 Addressing schemes Subnetting Routing. Layer 3 Solution in Trains

Network Layer: Internet Protocol

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv6. (Internet Protocol version 6)

Chapter 4 Network Layer

IPv4. Christian Grothoff.

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy

Chapter 5 OSI Network Layer

Network Layer: Control/data plane, addressing, routers

(Chapters 2 3 in Huitema) E7310/Internet basics/comnet 1

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

Chapter 5 Network Layer

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

EE 610 Part 2: Encapsulation and network utilities

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

Lecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

Transcription:

SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week)

The Internet Protocol

12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol IPv6 Virtual Private Networks and IP Security

Internetworking Terms

Host A Host B App Y App X Port App X App Y 1 2 3 Logical connection 2 4 6 (TCP connection) TCP TCP IP Global internet address IP Network Access Protocol #1 Physical Subnetwork attachment point address Router J Logical connection (e.g., virtual circuit) Network Access Protocol #2 Physical IP NAP 1 NAP 2 Network 1 Network 2 Physical Physical Figure 14.1 TCP/I P Concepts

Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol (IP) IP Initially developed for the DARPA internet project Protocol is needed to access a particular network

LAN 1 LAN 2 End system (A) Router (X) Frame relay WAN Router (Y) End system (B) TCP TCP IP LLC MAC Physical t 1 t 2 t 3 t 6 t 5 t 4 IP LLC LAPF MAC Physical Physical t 7 t 8 t 10 t 9 IP LLC LAPF MAC Physical Physical t 11 t 12 t 13 t 16 t 15 t 14 IP LLC MAC Physical t 1, t 6, t 7, t 10, t 11, t 16 IP-H TCP-H Data t 2, t 5 LLC1-H IP-H TCP-H Data t 3, t 4 MAC1-H LLC1-H IP-H TCP-H Data MAC1-T t 8, t 9 t 12, t 15 t 13, t 14 FR-H IP-H TCP-H Data FR-T LLC2-H IP-H TCP-H Data MAC2-H LLC2-H IP-H TCP-H Data MAC2-T TCP-H IP-H LLCi-H MACi-H = TCP header = IP header = LLC header = MAC header MACi-T FR-H FR-T = MAC trailer = Frame relay header = Frame relay trailer Figure 14.2 Example of I nternet Protocol Operation

Connectionless Internetworking Connectionless internet facility is flexible IP provides a connectionless service between end systems Advantages: Is flexible Can be made robust Does not impose unnecessary overhead

IP Design Issues Routing Datagram lifetime Fragmentation and reassembly Error control Flow control

S1 S2 P1 T1 P3 T2 P2 T3 (a) Packet-switching network ar chitecture S1 R1 P N1 P P R3 S2 P P N2 P R2 P P N3 P (b) Internetwork architecture Figure 14.3 The I nternet as a Network

Routing Routing table indicates next router to which datagram is sent Can be static or dynamic ES / routers maintain routing tables Source routing Source specifies route to be followed Can be useful for security and priority Each router appends its internet address to a list of addresses in the datagram Useful for testing and debugging purposes Route recording

Datagram Lifetime If dynamic or alternate routing is used the potential exists for a datagram to loop indefinitely Consumes resources Transport protocol may need upper bound on lifetime of a datagram Can mark datagram with lifetime When lifetime expires, datagram is discarded

Fragmentation and Re-assembly Protocol exchanges data between two entities Lower-level protocols may need to break data up into smaller blocks, called fragmentation Reasons for fragmentation: Network only accepts blocks of a certain size More efficient error control and smaller retransmission units Fairer access to shared facilities Smaller buffers Disadvantages: Smaller buffers More interrupts and processing time

Fragmentation and Re-assembly At destination Packets get smaller as data traverses internet Issue of when to re-assemble Need large buffers at routers Intermediate re-assembly Buffers may fill with fragments All fragments must go through same router

IP Fragmentation IP re-assembles at destination only Uses fields in header Data Unit Identifier (ID) Identifies end system originated datagram Data length Length of user data in octets Offset Position of fragment of user data in original datagram In multiples of 64 bits (8 octets) More flag Indicates that this is not the last fragment

IP Header (20 octets) TCP Header (20 octets) Original I P datagram Data length = 404 octets Segment offset = 0; More = 0 TCP payload (384 octets) IP Header (20 octets) TCP Header (20 octets) Partial TCP payload (188 octets) First fragment Data length = 208 octets Segment offset = 0; More = 1 IP Header (20 octets) Partial TCP payload (196 octets) Second fragment Data length = 196 octets Segment offset = 26 64-bit units (208 octets); More = 0 Figure 14.4 Fragmentation Example

Error and Flow Control Error control Discarded datagram identification is needed Reasons for discarded datagrams include: Lifetime expiration Congestion FCS error Flow control Allows routers to limit the rate they receive data Send flow control packets requesting reduced data flow

Internet Protocol (IP) v4 Defined in RFC 791 Part of TCP/IP suite Two parts Specification of interface with a higher layer Specification of actual protocol format and mechanisms

IP Services Primitives Specifies functions to be performed Form of primitive implementation dependent Send-request transmission of data unit Deliver-notify user of arrival of data unit Parameters Used to pass data and control information

IP Parameters Source and destination addresses Protocol Type of Service Identification Don t fragment indicator Time to live Data length Option data User data

IP Options Security Route recording Source routing Stream identification Timestamping

ECN Version IHL DS Total Length Identification Flags Fragment Offset Time to Live Protocol Source Address Header Checksum Destination Address Options + Padding (a) IPv4 header ECN Version DS Flow Label Payload Length Next Header Hop Limit Source Address Destination Address (b) IPv6 header Field name kept from IPv4 to IPv6 Field not kept in IPv6 Name and position changed in IPv6 New field in IPv6 Figure 14.5 IPv4 and IPv6 Headers

0 Network (7 bits) Host (24 bits) Class A 1 0 Network (14 bits) Host (16 bits) Class B 1 1 0 Network (21 bits) Host (8 bits) Class C 1 1 1 0 M ulticast Class D 1 1 1 1 0 Future Use Class E Figure 14.6 I Pv4 Address Formats

IP Addresses Class A IP Addresses Class B IP Addresses Class C Start with binary 0 Start with binary 10 Start with binary 110 Network addresses with a first octet of 0 (binary 0000000) and 127 (binary 01111111) are reserved 126 potential Class A network numbers Range 128 to 191(binary 10000000 to 10111111) Second octet also included in network address Range 192 to 223 Second and third octet also part of network address 2 21 = 2,097,152 addresses Range 1 to 126 2 14 = 16,384 Class B addresses Nearly all allocated See IPv6

Subnets and Subnet Masks Allows arbitrary complexity of internetworked LANs within organization Insulate overall internet from growth of network numbers and routing complexity Site looks to rest of internet like single network Each LAN assigned subnet number Host portion of address partitioned into subnet number and host number Local routers route within subnetted network Subnet mask indicates which bits are subnet number and which are host number

Table 14.2 IPv4 Addresses and Subnet Masks Binary Representation Dotted Decimal IP address 11000000.11100100.00010001.00111001 192.228.17.57 Subnet mask 11111111.11111111.11111111.11100000 255.255.255.224 Bitwise AND of address and mask (resultant network/subnet number) 11000000.11100100.00010001.00100000 192.228.17.32 Subnet number 11000000.11100100.00010001.001 1 Host number 00000000.00000000.000 00000.00011001 25 (a) Dotted decimal and binary representations of IPv4 address and subnet masks Binary Representation Class A default mask 11111111.00000000.00000000.00000000 255.0.0.0 Dotted Decimal Example Class A mask 11111111.11000000.00000000.00000000 255.192.0.0 Class B default mask 11111111.11111111.00000000.00000000 255.255.0.0 Example Class B mask 11111111.11111111.11111000.00000000 255.255.248.0 Class C default mask 11111111.11111111.11111111.00000000 255. 255. 255.0 Example Class C mask 11111111.11111111.11111111.11111100 255. 255. 255.252 (b) Default subnet masks

LAN X Net ID/Subnet ID: 192.228.17.32 Subnet number: 1 A B Rest of Internet R1 IP Address: 192.228.17.33 Host number: 1 Net ID/Subnet ID: 192.228.17.64 Subnet number: 2 LAN Y IP Address: 192.228.17.57 Host number: 25 C R2 IP Address: 192.228.17.65 Host number: 1 LAN Z Net ID/Subnet ID: 192.228.17.96 Subnet number: 3 D IP Address: 192.228.17.97 Host number: 1 Figure 14.7 Example of Subnetworking

Internet Control Message Protocol (ICMP) RFC 792 Provides a means for transferring messages from routers and other hosts to a host Provides feedback about problems Datagram cannot reach its destination Router does not have buffer capacity to forward Router can send traffic on a shorter route Encapsulated in IP datagram Hence not reliable

0 8 16 31 Type Code Checksum Unused I P Header + 64 bits of original datagram (a) Destination Unreachable; Time Exceeded; Source Quench 0 8 16 31 Type Code Checksum I dentifier Sequence Number Originate Timestamp (e) Timestamp 0 8 16 31 Type Code Checksum Pointer Unused I P Header + 64 bits of original datagram (b) Parameter Problem 0 8 16 31 Type Code Checksum Gateway I nternet Address I P Header + 64 bits of original datagram (c) Redirect 0 8 16 31 Type Code Checksum I dentifier Sequence Number Optional data (d) Echo, Echo Reply 0 8 16 31 Type Code Checksum I dentifier Sequence Number Originate Timestamp Receive Timestamp Transmit Timestamp (f) Timestamp Reply 0 8 16 31 Type Code Checksum I dentifier Sequence Number (g) Address Mask Request 0 8 16 31 Type Code Checksum I dentifier Sequence Number Address M ask (h) Address Mask Reply Figure 14.8 ICMP Message Formats

Common ICMP Messages Destination unreachable Time exceeded Parameter problem Source quench Redirect Echo and echo reply Timestamp and timestamp reply Address mask request and reply

Address Resolution Protocol (ARP) Need MAC address to send to LAN host Manual Included in network address Use central directory Use address resolution protocol ARP (RFC 826) provides dynamic IP to Ethernet address mapping Source broadcasts ARP request Destination replies with ARP response

IP Next Generation Address space exhaustion: Two level addressing (network and host) wastes space Network addresses used even if not connected Growth of networks and the Internet Extended use of TCP/IP Single address per host Requirements for new types of service Address configuration routing flexibility Traffic support

IPv6 RFCs RFC 1752 - Recommendations for the IP Next Generation Protocol Requirements PDU formats Addressing, routing security issues RFC 2460 - overall specification RFC 4291 - addressing structure

IPv6 Enhancements Expanded 128 bit address space Improved option mechanism Most not examined by intermediate routes Dynamic address assignment Increased addressing flexibility Anycast and multicast Support for resource allocation Labeled packet flows

Mandatory IPv6 header Next Header IPv6 header 40 Octets: Next Header Hop-by-hop options header Variable Next Header Optional extension headers Next Header Next Header Routing header Fragment header Destination options header Variable 8 Variable TCP header 20 (optional variable part) IPv6 packet body Application data Variable Figure 14.9 I Pv6 Packet with Extension Headers (containing a TCP Segment)

Options + Padding (a) I Pv4 header ECN Version DS Flow Label Payload Length Next Header Hop Limit Source Address Destination Address (b) I Pv6 header Field name kept from IPv4 to IPv6 Field not kept in IPv6 Name and position changed in IPv6 New field in IPv6 Figure 14.5 IPv4 and IPv6 Headers

IPv6 Flow Label Related sequence of packets Special handling Identified by source and destination address plus flow label Router treats flow as sharing attributes May treat flows differently Alternative to including all information in every header Have requirements on flow label processing

IPv6 Addresses 128 bits long Assigned to interface Single interface may have multiple unicast addresses Three types of addresses: Unicast - single interface address Anycast - one of a set of interface addresses Multicast - all of a set of interfaces

Table 14.3 IPv6 Address Space Usage Address Type Binary Prefix IPv6 Notation Fraction of address space ::FFFF/96 2 96 Embedded IPv4 address Loopback 00 1 (128 bits) 00 1111 1111 1111 1111 (96 bits) ::1/128 2 128 Link-local unicast 1111 1110 10 FE80::/10 1/1024 Multicast 1111 1111 FF00::/8 2/256 Global unicast Everything else

Hop-by-Hop Options Must be examined by every router If unknown discard/forward handling is specified Next header Header extension length Options Pad1 PadN Jumbo payload Router alert

0 8 16 31 Next Header Hdr Ext Len 0 8 16 31 Next Header Hdr Ext Len Routing type Segments left One or more options type-specific data (a) Hop-by-hop options header; destination options header (c) Generic routing header 0 8 16 29 31 Next Header Reserved Fragment Offset ResM I dentification (b) Fragmentation header Figure 14.10 I Pv6 Extension Headers

Fragmentation Header Fragmentation only allowed at source No fragmentation at intermediate routers Node must perform path discovery to find smallest MTU of intermediate networks Set source fragments to match MTU Otherwise limit to 1280 octets

Routing Header Contains a list of one or more intermediate nodes to be visited on the way to a packet s destination Header includes Next header Header extension length Routing type Segments left

Destination Options Header Carries optional information for destination node Format same as hop-by-hop header

Virtual Private Network (VPN) Set of computers interconnected using an unsecure network e.g. linking corporate LANs over Internet Using encryption and special protocols to provide security Eavesdropping Entry point for unauthorized users Proprietary solutions are problematical Development of IPSec standard

IPsec RFC 1636 (1994) identified security need Encryption and authentication necessary security features in IPv6 Designed also for use with current IPv4 Applications needing security include: Branch office connectivity Remote access over Internet Extranet and intranet connectivity for partners Electronic commerce security

User system with IPSec IP Header IPSec Header Secure IP Payload Secure IP Payload Public (I nternet) or Private Network IP Header IPSec Header IP Header IPSec Header Secure IP Payload IP Payload Ethernet switch IP Header IP Payload IP Header Networking device with IPSec Figure 14.11 An I P Security Scenario

Benefits of IPsec Provides strong security for external traffic Resistant to bypass Below transport layer hence transparent to applications Can be transparent to end users Can provide security for individual users if needed

IPsec Functions