Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Similar documents
Internetwork Protocols

Introduction to Internetworking

Internet Protocols (chapter 18)

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

ET4254 Communications and Networking 1


SEN366 (SEN374) (Introduction to) Computer Networks

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

The Internet. The Internet is an interconnected collection of netw orks.

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Introduction to routing in the Internet

Introduction to routing in the Internet

CHAPTER-2 IP CONCEPTS

SEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide?

Chapter 09 Network Protocols

The Internet Protocol (IP)

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Vorlesung Kommunikationsnetze

EEC-484/584 Computer Networks

(ICMP), RFC

TCP /IP Fundamentals Mr. Cantu

Ch.7 Internet Protocol: Connectionless Datagram Delivery (IPv4, IPv6)

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

ECE4110 Internetwork Programming. Introduction and Overview

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC

Position of IP and other network-layer protocols in TCP/IP protocol suite

IP Protocols. ALTTC/Oct

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

(Chapters 2 3 in Huitema) E7310/Internet basics/comnet 1

OSI Network Layer. Chapter 5

Chapter 12 Network Protocols

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical

Router Architecture Overview

Lecture 8. Network Layer (cont d) Network Layer 1-1

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1

INTERNET SYSTEM. Internet Protocol. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. Large Scale Networking

EEC-684/584 Computer Networks

ICMP (Internet Control Message Protocol)

Network layer: Overview. Network Layer Functions

The Internetworking Problem. Internetworking. A Translation-based Solution

Data & Computer Communication

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 5 OSI Network Layer

Chapter 4: Network Layer

Topics for This Week

IP : Internet Protocol

TCP/IP Protocol Suite

Internetworking Part 2

Lecture 3: The Transport Layer: UDP and TCP

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

This Lecture. BUS Computer Facilities Network Management. Internetworking. Internetworking

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

TSIN02 - Internetworking

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

II. Principles of Computer Communications Network and Transport Layer

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University

ICMP (Internet Control Message Protocol)

CS/ECE 4457 FALL Name: Computing ID: WARM UP. Question 1: What type of transmission mode is depicted in the photo below:

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes

Chapter 7. Local Area Network Communications Protocols

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

Lecture 16: Network Layer Overview, Internet Protocol

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSCI-1680 Network Layer: IP & Forwarding John Jannotti

Lecture 4: The Transport Layer and UDP

Chapter Motivation For Internetworking

Computer Networks ICS 651. IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery

Introduction Layer 3. IP-Header: and RFC-760 Addressing schemes Subnetting Routing. Layer 3 Solution in Trains

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

CS 457 Lecture 11 More IP Networking. Fall 2011

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t

Internetworking. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

Network Layer PREPARED BY AHMED ABDEL-RAOUF

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Need For Protocol Architecture

Need For Protocol Architecture

Solution of Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Using ICMP to Troubleshoot TCP/IP Networks

Transcription:

Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1

Network Layer Provides the upper layers with independence from the data transmission and physical networking technologies. Responsible for sending data from source to destination. This includes the nodes in between (and therefore it is not end-to-end) Responsible for requesting network facilities, such as priority, bit-rate, etc Responsible for routing. Prof. Shervin Shirmohammadi CEG 4185 2-2

Internetworking Prof. Shervin Shirmohammadi CEG 4185 2-3

Routing Autonomous System (AS): set of networks and routers operated by a single organization. Interior Router Protocol (IRP): passing routing information within and AS. Exterior Router Protocol (ERP): passing routing information between different ASs. Prof. Shervin Shirmohammadi CEG 4185 2-4

Routing Approaches Distance Vector Routing: each node exchanges information with its neighboring nodes; e.g. Routing Information Protocol (RIP). Link-state Routing: sends link costs of each of its network interfaces to all routers (not just neighboring). Typically used with a Dijksterabased algorithm; e.g., Open Shortest Path First (OSPF). Path-vector Routing: router provides information about which networks can be reached by a given router and the ASs that must be crossed; e.g. Border Gateway Protocol (BGP). Prof. Shervin Shirmohammadi CEG 4185 2-5

TCP/IP Protocol Suite vs. OSI Prof. Shervin Shirmohammadi CEG 4185 2-6

OSI Pros and Cons Bad timing (too much detailed concept before actual applications) Similar to ITU-T standards, it tries to design the perfect world, which is either extremely difficult or not possible. Keep in mind: technology and human understanding of how things work (or should work) changes. Bad implementations/technology (mostly difficult to implement) Bad politics Advantages? Prof. Shervin Shirmohammadi CEG 4185 2-7

TCP/IP Pros and Cons Service, interface, and protocol not distinguished. Not a general model. Host-to-network layer not really a layer. Advantages: The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. Others? Everything should be made as simple as possible, but not simpler. Albert Einstein Prof. Shervin Shirmohammadi CEG 4185 2-8

Internet Architecture In a TCP/IP internet, IP routers provide interconnection among physical networks. Computers/equipment that interconnect two or more networks and pass packets from one to the other are called internet router. user s view the inside Prof. Shervin Shirmohammadi CEG 4185 2-9

Internet Protocol (IP) The most-widely used Internetworking protocol. Purpose: to connect all networks together; hence and internetworking protocol. IPv4 the most commonly used version (covered in this course). Prof. Shervin Shirmohammadi CEG 4185 2-10

Internetworking Requirements Design requirements: accommodate differences in constituting networks: 1. Different addressing schemes 2. Different maximum packet size 3. Different network access mechanism 4. Different timeouts 5. Different transmission modes (connection-oriented, connectionless) 6. Error control 7. Flow control Prof. Shervin Shirmohammadi CEG 4185 2-11

IP Header Prof. Shervin Shirmohammadi CEG 4185 2-12

1. Different Addressing Scheme Introduce IP address as a global address All hosts on the Internet must have a unique IP address Exception: techniques such as IP-forwarding allow private IP addresses that might be duplicated somewhere else. Prof. Shervin Shirmohammadi CEG 4185 2-13

IP Address Classes Prof. Shervin Shirmohammadi CEG 4185 2-14

Address Range Prof. Shervin Shirmohammadi CEG 4185 2-15

IP Addresses - Class A 32 bit global internet address Network part and host part Class A Start with binary 0 All 0 reserved (0.x.x.x) 01111111 (127) reserved for loopback (127.x.x.x) Range 1.x.x.x to 126.x.x.x All allocated! Prof. Shervin Shirmohammadi CEG 4185 2-16

IP Addresses - Class B Start 10 Range 128.x.x.x to 191.x.x.x Second Octet also included in network address 2 14 = 16,384 class B addresses (network part) All allocated! Prof. Shervin Shirmohammadi CEG 4185 2-17

IP Addresses - Class C Start 110 Range 192.x.x.x to 223.x.x.x Second and third octet also part of network address 2 21 = 2,097,152 addresses (network part) Only 2 8 = 256 hosts per network! Nearly all allocated Prof. Shervin Shirmohammadi CEG 4185 2-18

Example of IP addresses Prof. Shervin Shirmohammadi CEG 4185 2-19

Subnets and Subnet Masks Allow arbitrary complexity of internetworked LANs within organization. Insulate overall internet from growth of network numbers and routing complexity. To rest of internet, site looks like single network. Prof. Shervin Shirmohammadi CEG 4185 2-20

Subnets and Subnet Masks Each LAN is assigned subnet number. Host portion of address partitioned further into subnet number and host number. Local routers route within subnetted network. Subnet mask indicates which bits are subnet number and which are host number by doing a bitwise AND. Prof. Shervin Shirmohammadi CEG 4185 2-21

Routing Using Subnets Prof. Shervin Shirmohammadi CEG 4185 2-22

2. Different Maximum Size Problem: different networks have different Maximum Transmission Unit (MTU) sizes. What if a packet reaches a network and it exceeds the network s MTU? Solution: Use fragmentation to split large packets into smaller ones. Use reassembly at the destination only to put the fragments together and build the original packet. Prof. Shervin Shirmohammadi CEG 4185 2-23

IP Fragmentation IP re-assembles at destination only! Uses fields in header Data Unit Identifier (ID) Identifies end system originated datagram Source and destination address Protocol layer generating data (e.g. TCP) Identification supplied by that layer Data length Length of user data in octets Offset Position of fragment of user data in original datagram In multiples of 64 bits (8 octets) More flag Indicates that this is not the last fragment Prof. Shervin Shirmohammadi CEG 4185 2-24

Fragmentation Example Prof. Shervin Shirmohammadi CEG 4185 2-25

Dealing with Failure Re-assembly may fail if some fragments get lost Re-assembly time out Assigned to first fragment to arrive If timeout expires before all fragments arrive, discard partial data Prof. Shervin Shirmohammadi CEG 4185 2-26

3. Different Network Access Solved by abstracting networking functions in the Networking layer, and relying on Data Link Layer for networking access. Routers handle the difference in network access mechanism. Prof. Shervin Shirmohammadi CEG 4185 2-27

IP Router Operation Prof. Shervin Shirmohammadi CEG 4185 2-28

Address Mapping Sometimes, in order to reach a destination, there is no need to go trough an IP router. E.g.? In that case, the physical address can be used directly. Prof. Shervin Shirmohammadi CEG 4185 2-29

ARP (Address Resolution Protocol) Prof. Shervin Shirmohammadi CEG 4185 2-30

Reverse ARP Prof. Shervin Shirmohammadi CEG 4185 2-31

4. Different Timeout Problem: different networks use different timeout mechanisms. Solution: Introduce the concept of Datagram Lifetime. Datagrams could loop indefinitely Consumes resources Transport protocol may need upper bound on datagram life Datagram marked with lifetime Time To Live (TTL) field in IP Once lifetime expires, datagram discarded (not forwarded) Hop count Decrement time to live on passing through each router Prof. Shervin Shirmohammadi CEG 4185 2-32

5. Different Transmission Modes Use a connectionless architecture Advantages Flexibility Robust No unnecessary overhead Disadvantages Not guaranteed delivery Not guaranteed order of delivery Reliability is responsibility of upper layers (e.g. TCP) Prof. Shervin Shirmohammadi CEG 4185 2-33

6. Error Control Minimal error control, done only for the header Router should attempt to inform source if packet discarded (using ICMP) e.g. for time to live expiring Not guaranteed delivery May inform high layer protocol Prof. Shervin Shirmohammadi CEG 4185 2-34

7. Flow Control Allows routers and/or stations to limit rate of incoming data Limited in connectionless systems Send flow control packets Requesting reduced flow e.g. ICMP Prof. Shervin Shirmohammadi CEG 4185 2-35

IP Header Prof. Shervin Shirmohammadi CEG 4185 2-36

Header Fields Version (4 bits): currently 4 Internet Header Length (4 bits) Minimum is 5, for 20 octets Header may include options and padding Type of Service (8 bits) rarely used, for differentiated services and congestion notification Total Length (16 bits) of datagram, in octets (header & data) Identification (16 bits) Sequence number Used with addresses and user protocol to identify datagram uniquely Flags (3 bits) Only 2 used; More bit, and Don t Fragment bit Prof. Shervin Shirmohammadi CEG 4185 2-37

Header Fields ( ) Fragmentation offset ( 13 bits) Time to Live (8 bits) Protocol (8 bits) Next higher layer to receive data field at destination Header Checksum (16 bits) Re-verified and recomputed at each router 16 bit ones complement sum of all 16 bit words in header Source Address (32 bits) Destination Address (32 bits) Options (Security, timestamp, ) Padding, to fill to multiple of 32 bits long Prof. Shervin Shirmohammadi CEG 4185 2-38

Data Field Carries upper-layer data. Integer multiple of 8 bits long (octet). Max length of datagram (header plus data) is 65,535 octets. Prof. Shervin Shirmohammadi CEG 4185 2-39

Internet Control Message Protocol Defined in RFC 792. Used for sending control messages between entities: end-hosts interim nodes No data is sent, only control messages (similar to signaling in POTS). Sent directly on top of IP. Has over 40 different messages Prof. Shervin Shirmohammadi CEG 4185 2-40

Common ICMP Messages Full list Prof. Shervin Shirmohammadi CEG 4185 2-41

ICMP example: ping ping is a utility to check whether a given node is alive or not, and what the distance to it is. Named after the sound that a sonar makes. Uses timed ECHO_REQUEST and ECHO_REPLY packets to probe the "distance" to the target machine. Prof. Shervin Shirmohammadi CEG 4185 2-42

ICMP example: tracert tracert is a utility to trace the route between two nodes on the network. You can think of it as a set of ping commands, each with TTL set to 1 hop larger than the previous one. Starts by sending an ICMP Echo request message with destination s IP address with TTL set to 1. The first node receiving the packet decrements the TTL and discards the message, sending an ICMP "TTL exceeded message to the sender. Receipt of this message allows the sender to identify which system is one link away. The sender repeats the above with TTL=2, 3, and so on, until it reaches the target destination. This gives a topological view of the network route from the sender to the destination. Things to consider: Where alternate paths are possible, results may vary. Some Routers are configured to discard ICMP messages, while others process them but do not answer. Such routers hide the path of the network. Prof. Shervin Shirmohammadi CEG 4185 2-43