Lecture (08) Internetwork Layer II

Similar documents
Lecture (03) Internet Protocol tcp/ip> OSI>

Private and Public addresses. Real IPs. Lecture (09) Internetwork Layer (3) Agenda. By: Dr. Ahmed ElShafee

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

Lecture (08) Fundamentals of WANs (II)

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

IP: Addressing, ARP, Routing

CS 457 Lecture 11 More IP Networking. Fall 2011

EEC-684/584 Computer Networks

01/17/08 TDC /17/08 TDC363-03

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

Cisco CCNA Basic IP Routing Part I

Imi :... Data:... Nazwisko:... Stron:...

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Outline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols

Lecture (03) Network Model

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Network+ Guide to Networks 5 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Copyright 2011 Sakun Sharma

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

Lecture (02) The TCP/IP Networking Model

Lecture (01) Determining IP Routes (1)

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

CCNA MCQS with Answers Set-1

Exam E1 Copyright 2010 Thaar AL_Taiey

Auxiliary Protocols. Internet Layer. Address Resolution Protocol. Delivery of IP Packets

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

TCP/IP Protocol Suite and IP Addressing

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Homework 3 Discussion

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Introduction to Local and Wide Area Networks

Table of Contents. Cisco How NAT Works

IP Protocols. ALTTC/Oct

Configuring IP Services

Network Layer (4): ICMP

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

Lecture (02) The TCP/IP Networking Model

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

Applied Networks & Security

Lab Using Wireshark to Examine Ethernet Frames

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

IP Training Programme. Module 1: IP Generic Session 3: IP Services

Lesson 12 Lab Key Lab Exercises

Chapter 7. Local Area Network Communications Protocols

Configuring IPv4. Finding Feature Information. This chapter contains the following sections:

6 Chapter 6. Figure 1 Required Unique Addresses

Question 7: What are Asynchronous links?

Module 7 Internet And Internet Protocol Suite

Chapter 7. ARP and RARP MGH T MGH C I 20

Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI)

ICS 451: Today's plan

CS118 Discussion, Week 6. Taqi

Lab Using Wireshark to Examine Ethernet Frames

Network I Lab 02. What are the major external components of the PC including the peripherals? / Characteristics

DHCP Technology White Paper

Using AutoInstall and Setup

Linux System Administration

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Engr. Joseph Ronald Canedo's Note 1

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

Internet Technology 4/29/2013

Cisco Cisco Certified Network Associate (CCNA)

Telecommunication Protocols Laboratory Course. Lecture 3

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

TCP/IP and the OSI Model

0x02 Networking. Day 2 IPs, Subne:ng, Important Services

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

IP/MAC Address Translation

by Douglas Comer, Purdue University

Address Resolution Protocol

Interconnecting Cisco Networking Devices Part 1

Outline. IP Address. IP Address. The Internet Protocol. o Hostname & IP Address. o The Address

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Putting it all together

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

AT&T Digital Subscriber Line Service

How the Internet Works

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

Chapter Motivation For Internetworking

Lab 8 (IP Addressing)

Networking Potpourri: Plug-n-Play, Next Gen

CCNA. Course Catalog

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Guide to TCP/IP, Third Edition. Chapter 8: The Dynamic Host Configuration Protocol

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Transla'ng Addresses. Goals of Today s Lecture

Expert Reference Series of White Papers. How a Spanning Tree Works

Transcription:

genda Lecture (08) Internetwork Layer II Network Layer (Layer 3) ddressing (continue) IP Routing and Routing Protocols y: Dr. hmed ElShafee ١ ٢ Private and public addresses ny host with a direct connection to the Internet must have a globally unique IP address. Not all hosts are connected directly to the Internet. Some are on networks that aren t connected to the Internet. Some hosts are hidden behind firewalls, so their Internet connection is indirect. Several blocks of IP addresses are set aside just for this purpose, for use on private networks that are not connected to the Internet or to use on networks that are hidden behind a firewall. Three such ranges of addresses exist, summarized in Table ٣ Dr. hmed ElShafee, CU Fall 2013, Network I ٤ Dr. hmed ElShafee, CU Fall 2013, Network I

Network ddress Translation firewalls use a technique called network address translation (NT) to hide the actual IP address of a host from the outside world. the NT device must use a globally unique IP to represent the host to the Internet. ehind the firewall, though, the host can use any IP address it wants. When packets cross the firewall, the NT device translates the private IP address to the public IP address and vice versa. ٥ Dr. hmed ElShafee, CU Fall 2013, Network I ٦ Dr. hmed ElShafee, CU Fall 2013, Network I NT device can use a single public IP address for more than one host. It keeps track of outgoing packets so that it can match incoming packets with the correct host. To understand how this works, consider the following sequence of steps: host whose private address is 192.168.1.100 sends a request to216.239.57.99, which is www.google.com. The NT device changes the source IP address of the packet to 208.23.110.22, the IP address of the firewall. That way, Google will send its reply back to the firewall router. The NT records that 192.168.1.100 sent a request to 216.239.57.99. ٧ Dr. hmed ElShafee, CU Fall 2013, Network I ٨ Dr. hmed ElShafee, CU Fall 2013, Network I

Now another host, at address 192.168.1.107, sends a request to 207.46.134.190, which happens to be www.microsoft.com. The NT device changes the source of this request to 208.23.110.22 so that Microsoft will reply to the firewall router. The NT records that 192.168.1.107 sent a request to 207.46.134.190. few seconds later, the firewall receives a reply from 216.239.57.99. The destination address in the reply is 208.23.110.22, the address of the firewall. To determine to whom to forward the reply, the firewall checks its records to see who is waiting for a reply from 216.239.57.99. It discovers that 192.168.1.100 is waiting for that reply, so it changes the destination address to 192.168.1.100 and sends the packet on. ٩ Dr. hmed ElShafee, CU Fall 2013, Network I ١٠ Dr. hmed ElShafee, CU Fall 2013, Network I The design in Figure requires six groups, each of which is a Class network in this example. The four LNs each use a single Class network. ١١ In other words, each of the LNs attached to routers,, C, and D is in a separate network. dditionally, the two serial interfaces composing the point topoint serial link between routers C and D use the same network because these two interfaces are not separated by a router. ١٢

Finally, the three router interfaces composing the Frame Relay network with routers,, and C are not separated by an IP router and would compose the sixth network. Each Class network has 2 16 2 hosts addresses in it far more than you will ever need for each LN and WN link. the design requires six groups uses six subnets, each of which is a subnet of a single Class network ١٣ ١٤ Network Layer (Layer 3) ddressing (24) This design subnets Class network 150.x.0.0, which has been assigned by the NIC. To perform subnetting the third octet (in this example) is used to identify unique subnets of network 150.x.0.0. When subnetting, a third part of an IP address appears between the network and host parts of the address namely, the subnet part of the address. ١٥ This field is created by stealing or borrowing bits from the host part of the address. The size of the network part of the address never shrinks in other words, Class,, and C rules still apply when defining the size of the network part of an address. The host part of the address shrinks to make room for the subnet part of ١٦ the address.

Network Layer Utilities Now, instead of routing based on the network part of an address, routers can route based on the combined network and subnet parts. In fact, most people do not even bother distinguishing between the network part and the subnet part they just call both fields together the subnet part of an address. Finally, IP addressing with subnetting uses a concept called a subnet mask. ١٧ Network Layer Utilities The TCP/IP network layer uses several utility protocols to help it complete its task 1. ddress Resolution Protocol (RP) and the Domain Name System 2. ICMP Echo and the ping Command 3. RRP, OOTP, and DHCP ١٨ 1. ddress Resolution Protocol and the Domain Name System TCP/IP needs a way to find MC addresses associated with other computers on the same LN subnet. knows her own name, IP address, and MC address because those things are configured in advance. What does not know are s IP and MC addresses. To find the two missing facts, uses the Domain Name System (DNS) and the ddress Resolution Protocol (RP). 10.1.1.254 ١٩ ٢٠

knows the IP address of a DNS server because the address was preconfigured on s machine or learned using Dynamic Host Configuration Protocol (DHCP) (will be discussed later) now sends a DNS request to the DNS, asking for s IP address. The DNS replies with the address, 10.1.1.2. still needs to know the Ethernet MC address used by 10.1.1.2 issues something called an RP broadcast. n RP broadcast is sent to a broadcast Ethernet address, so everyone on the LN receives it. 10.1.1.254 ٢١ ٢٢ ecause is on the LN, receives the RP broadcast. ecause s IP address is 10.1.1.2 and the RP broadcast is looking for the MC address associated with 10.1.1.2, replies with his own MC address. Now knows the destination IP and Ethernet addresses that she should use when sending frames to, ٢٣ ٢٤

2. ICMP Echo and the ping Command IP needs to have a way to test basic IP connectivity, without relying on any applications to be working. can test basic network connectivity using the ping command. ping (Packet INternet Groper) uses the Internet Control Message Protocol (ICMP), sending a message called an ICMP echo request to another IP address. The computer with that IP address should reply with an ICMP echo reply. ٢٥ ٢٦ If that works, you successfully have tested the IP network. ICMP does not rely on any application, so it really just tests basic IP connectivity Layers 1, 2, and 3 of the OSI model. 3. RRP, OOTP, and DHCP Over the years, three protocols have been popular to allow a host computer to discover the IP address it should use: 1. Reverse RP (RRP) 2. oot Protocol (OOTP) 3. Dynamic Host Configuration Protocol (DHCP) ٢٧ ٢٨

Network Layer (Layer 3) ddressing (cont,..) (13) RRP and OOTP work using the same basic process. To use either protocol, a PC needs a LN interface card. The computer sends a LN broadcast frame announcing its own MC address and requests that someone assign it an IP address. oth protocols allow for IP address assignment, but that is all that RRP can ask for it can t even ask for the subnet mask used on the LN. ٣٠ OOTP allows many more information to be announced to a OOTP client its IP address, its subnet mask, its default gateway IP addresses, its other server IP addresses, and the name of a file that the computer should download. Why? oth RRP and OOTP were created with the motivation to allow a diskless workstation to come up and start operating. RRP? With RRP, the creators of the protocol just want to get the machine an IP address so that a knowledgeable user could type in commands and copy the correct files from a server onto the diskless computer s RM memory so that they could be used ٣١ ٣٢

OOTP? The creators wanted to automate as much of the process as possible including the dynamic assignment of a default gateway (router) IP address. OOTP s name really comes from the feature in which OOTP supplies the name of a file to the OOTP client. Typically, the diskless workstations had enough permanent memory to boot a very simple operating system, with the expectation that the computer would use a simple protocol, such as the Trivial File Transfer Protocol (TFTP), to transfer a file containing a more sophisticated operating system into RM. So, with the ultimate goal being to let a diskless computer complete the processing of initializing, or booting, a full operating system, OOTP was aptly named. oth RRP and OOTP clients require a computer to act as a server, and the server was required to know the MC address of every computer and the corresponding configuration parameters that each computer should be told. So, administration in a network of any size was painful. ٣٣ ٣٤ DHCP Like OOTP, DHCP uses the concept of the client making a request and the server supplying the IP address to the client, plus other information such as the default gateway, subnet mask, DNS IP address, and other information. The biggest advantage of DHCP compared to OOTP and RRP is that DHCP does not require that the DHCP server be configured with all MC addresses of all clients. DHCP defines a process by which the server knows the IP subnet in which the DHCP client resides, and it can assign an IP address from a pool of valid IP addresses in that subnet. So, the DHCP server does not need to know the MC address ahead of time. lso, most of the other information that DHCP might supply, such as the default router IP address, is the same for all hosts in the same subnet, so DHCP servers simply can configure information per subnet rather than per host and save a lot of administrative hassle compared to OOTP. ٣٥ ٣٦

DHCP has become a very popular protocol, with most enduser hosts on LNs in corporate networks getting their IP addresses and other basic configuration via DHCP. ٣٧ ٣٨ IP Routing and Routing Protocols First, a few detail about the figure need to be explained. The subnet numbers are shown, with the whole third octet used for the subnet part of the addresses. The actual IP addressed for PC1 and PC2 are shown. the full IP addresses of the routers are not shown only the host part of the address is listed For instance, R2 s IP address on the serial link to R1 is 150.150.2.7. The subnet is 150.150.2.0, and the.7 shown beside R2 in the figure represents the host part of the address, which is the fourth octet in this case. ٣٩ ٤٠

Step 1 PC1 sends the packet to R1 PC1 first builds the IP packet, with a destination address of PC2 s IP address (150.150.4.10). PC1 needs to send the packet to R1 because it knows that its default router is 150.150.1.4. PC1 first checks its RP cache, hoping to find R1 s Ethernet ٤١ MC address. If it is not found, PC1 RPs to learn R1 s Ethernet MC address. Then PC1 places the IP packet into an Ethernet frame, with a destination Ethernet address of R1 s Ethernet address. PC1 sends the frame onto the Ethernet. ٤٢ Step 2 R1 processes the incoming frame and forwards the packet to R2 ecause the incoming Ethernet frame has a destination MC of R1 s Ethernet MC, R1 copies the frame off the Ethernet for processing. If the FCS passes, meaning that the Ethernet frame did not have any errors in it, R1 looks at the Protocol Type field to discover that the packet inside the frame is an IP packet. R1 then discards the Ethernet header and trailer. Next, R1 looks for the routing table entry that matches the destination address in the packet, 150.150.4.10. The routing table entry is listed in the figure a route to subnet 150.150.4.0, with outgoing interface Serial0 to next hop router R2 (150.150.2.7). ٤٣ ٤٤

Now R1 just needs to build an HDLC frame and send it out its Serial0 interface to R2. s mentioned earlier, RP is not needed on a point to point HDLC WN link. R1 knows all the information necessary to out the packet inside an HDLC frame and send the frame. Step 3 R2 processes the incoming frame and forwards the packet to R3 R2 repeats the same general process as R1 when it receives the HDLC frame. fter stripping the HDLC header and trailer, R2 also needs to find the routing table entry that matches destination 150.150.4.10. ٤٥ ٤٦ R2 s routing table has an entry for 150.150.4.0, outgoing interface serial1, to next hop router 150.150.3.1, which is R3. efore R2 can complete the task, the correct DLCI for the VC to R3 must be decided. ٤٧ Step 4 R3 processes the incoming frame and forwards the packet to PC2 Like R1 and R2 before it, R3 checks the FCS in the data link trailer, looks at the type field to decide whether the packet inside the frame is an IP packet, and then discards the Frame Relay ٤٨ header and trailer.

The routing table entry for 150.150.4.0 shows that the outgoing interface is R3 s Ethernet interface, but there is no next hop router because R3 is connected directly to subnet 150.150.4.0. ll R3 has to do is encapsulate the packet inside a Ethernet header and trailer, and forward the frame. efore R3 can finish building the Ethernet header, an IP RP broadcast must be used to find PC2 s MC address (assuming that R3 doesn t already have that information in its IP RP cache). ٤٩ ٥٠ The routing process relies on the rules relating to IP addressing. For instance, why did 150.150.1.10 (PC1) assume that 150.150.4.10 (PC2) was not on the same Ethernet? Well, because 150.150.4.0, PC2 s subnet, is different than 150.150.1.0, which is PC1 s ٥١ subnet. ecause IP addresses in different subnets must be separated by some router, PC1 needed to send the packet to some router and it did. Similarly, all three routers list a route to subnet 150.150.4.0, which, in this example, includes IP addresses 150.150.4.1 to 150.150.4.254. ٥٢

What if someone tried to put PC2 somewhere else in the network, but still using 150.150.4.10? The routers then would forward packets to the wrong place. So, Layer 3 routing relies on the structure of Layer 3 addressing to route more efficiently. IP Routing Protocols IP routing protocols fill the IP routing table with valid, (hopefully) loop free routes. Each route includes a subnet number, the interface out which to forward packets so that they are delivered to that subnet, and the IP address of the next router that should receive packets destined for that subnet (if needed). ٥٣ ٥٤ the goals of a routing protocol To dynamically learn and fill the routing table with a route to all subnets in the network. If more than one route to a subnet is available, to place the best route in the routing table. To notice when routes in the table are no longer valid, and to remove those routes from the routing table. If a route is removed from the routing table and another route through another neighboring router is available, to add the route to the routing table. To add new routes, or to replace lost routes, with the best currently available route as quickly as possible. The time between losing the route and finding a working replacement route is called convergence time. To prevent routing loops. ٥٥ ٥٦

The logic basic logic that they use is relatively simple. Routing protocols take the routes in a routing table and send a message to their neighbors telling them about the routes. fter a while, everyone has heard about all the routes. Figure shows a sample network, with routing updates shown. ٥٧ ٥٨ IP Routing and Routing Protocols (20) Table shows Router s routing table before receiving the routing updates, IP Routing and Routing Protocols (21) fter receiving the update from Router, Router has learned three more routes. ecause Router learned those routes from Router, all three of s routes point back to Router as the next hop router. Router adds routes for directly connected subnets when the interfaces first initialize. So, before Router receives any routing updates, it knows about only two routes the two connected routes as listed ٥٩ ٦٠

Router learned about subnets 162.11.5.0 and 162.11.9.0 because is connected directly to those subnets. Router, in turn, learned about subnet 162.11.10.0, the subnet off Router C s Ethernet, from routing updates sent by Router C. ٦١ ٦٢ Thanks,.. See you next week (IS), ٦٣