ET4254 Communications and Networking 1

Similar documents

Internet Protocols (chapter 18)

SEN366 (SEN374) (Introduction to) Computer Networks

Internetwork Protocols

Introduction to Internetworking

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

The Internet. The Internet is an interconnected collection of netw orks.

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

CHAPTER-2 IP CONCEPTS

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

This Lecture. BUS Computer Facilities Network Management. Internetworking. Internetworking

TSIN02 - Internetworking

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Data and Computer Communications. Protocols and Architecture

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Vorlesung Kommunikationsnetze

Internet Protocol, Version 6

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

TSIN02 - Internetworking

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

Router Architecture Overview

TCP/IP Protocol Suite

Lecture 3. The Network Layer (cont d) Network Layer 1-1

ECE4110 Internetwork Programming. Introduction and Overview

Position of IP and other network-layer protocols in TCP/IP protocol suite

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Data & Computer Communication

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

TCP /IP Fundamentals Mr. Cantu

Lecture 8. Network Layer (cont d) Network Layer 1-1

User Datagram Protocol

The Internet Protocol (IP)

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University

Introduction to routing in the Internet

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Chapter 4: Network Layer

Chapter 5 OSI Network Layer

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

EEC-484/584 Computer Networks

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

Introduction to routing in the Internet

IP Address Assignment

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Recap. Recap. Internetworking. First mile problem. Internet. End Users. Last mile problem. Direct link networks Packet switching.

EE 610 Part 2: Encapsulation and network utilities

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Networking interview questions

Chapter Motivation For Internetworking

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

Chapter 7. Local Area Network Communications Protocols

OSI Network Layer. Chapter 5

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

Introduction Layer 3. IP-Header: and RFC-760 Addressing schemes Subnetting Routing. Layer 3 Solution in Trains

Network layer: Overview. Network Layer Functions

Chapter 5 TCP/IP SUITE

ECE 4450:427/527 - Computer Networks Spring 2017

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

Network Layer/IP Protocols

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Computer Networks (Introduction to TCP/IP Protocols)

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

TCP/IP and the OSI Model

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

Need For Protocol Architecture

TCP/IP THE TCP/IP ARCHITECTURE

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Internet Networking recitation #2 IP Checksum, Fragmentation

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction

7010INT Data Communications Lecture 7 The Network Layer

Network Layer: Internet Protocol

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Interconnecting Networks with TCP/IP

INTERNET SYSTEM. Internet Protocol. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. Large Scale Networking

Internetworking Part 2

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Transcription:

Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1

Protocol Functions have a small set of functions that form basis of all protocols encapsulation fragmentation and reassembly connection control ordered delivery flow control error control addressing multiplexing transmission services 2

Encapsulation data usually transferred in blocks called Protocol Data Units (PDUs) have three categories of control address error-detecting code protocol control encapsulation is addition of control information to data have many examples of PDU s in previous chapters e.g. TFTP, HDLC, frame relay, ATM, AAL5, LLC, IEEE 802.3, IEEE 802.11 3

Fragmentation and Reassembly protocol exchanges data between two entities lower-level protocols may need to break data up into smaller blocks, called fragmentation for various reasons network only accepts blocks of a certain size more efficient error control & smaller retransmission units fairer access to shared facilities smaller buffers disadvantages smaller buffers more interrupts & processing time 4

PDUS and Fragmentation 5

Connection Control have connectionless data transfer where each PDU treated independently and connection-oriented data transfer involves a logical association, or connection, established between entities preferred (even required) for lengthy data exchange or if protocol details are worked out dynamically three phases occur for connection-oriented connection establishment data transfer connection termination 6

Phases of Connection Oriented Transfer 7

Connection Establishment entities agree to exchange data typically, one station issues connection request may involve central authority receiving entity accepts or rejects (simple) may include negotiation syntax, semantics, and timing both entities must use same protocol may allow optional features must be agreed 8

Data Transfer and Termination both data and control information exchanged data flow and acknowledgements may be in one or both directions one side may send termination request or central authority might terminate 9

Sequencing used by many, but not all, connection-oriented protocols e.g. HDLC, IEEE 802.11 connection-oriented protocols include some way of identifying connection have PDUs numbered sequentially each side tracks seq numbers in and out to support three main functions ordered delivery llow control error control 10

Ordered Delivery risk PDUs may arrive out of order require PDU order must be maintained hence number PDUs sequentially easy to reorder received PDUs use finite sequence number field numbers repeat modulo maximum number max sequence number greater than max number of PDUs that could be outstanding 11

TCP/IP Concepts 12

Flow Control receiving entity limits amount / rate of data sent simplest protocol is stop-and-wait more efficient protocols use concept of credit amount of data sent without acknowledgment must be implemented in several protocols network traffic control buffer space application overflow 13

Error Control to guard against loss or damage implemented as separate error detection and retransmission functions sender inserts error-detecting code in PDU receiver checks code on incoming PDU if error, discard if transmitter doesn t get acknowledgment in reasonable time, retransmit can use an error-correction code enables receiver to detect and possibly correct errors performed at various protocol layers 14

Addressing addressing level addressing scope connection identifiers addressing mode 15

Addressing Level level in architecture where entity is named have a unique address for each intermediate and end system usually a network-level address to route PDU e.g. IP address or internet address e.g. OSI - network service access point (NSAP) at destination data must routed to some process e.g. TCP/IP port e.g. OSI service access point (SAP) 16

Addressing Scope global address which identifies unique system unambiguous synonyms permitted system may have more than one global address global applicability enables internet to route data between any two systems need unique address for each interface on network MAC address on IEEE 802 network and ATM host address enables network to route data units through network only relevant for network-level addresses port or SAP above network level is unique within system 17

Connection Identifiers is used by both entities for future transmissions advantages: reduced overhead since smaller routing using a fixed route tagged by connection ID multiplexing of multiple connections use of state information 18

Addressing Mode address usually refers to single system individual or unicast address can refer to more than one system for multiple simultaneous recipients for data broadcast for all entities within domain multicast for specific subset of entities 19

Multiplexing multiple connections into single system e.g. frame relay, can have multiple data link connections terminating in single end system e.g. multiple TCP connections to given system upward multiplexing have multiple higher level connections over a single lower level connection downward multiplexing have single higher level connection built on multiple lower level connections 20

Transmission Services may have additional services to entities: priority on connection basis or message basis quality of service e.g. minimum throughput or maximum delay threshold security mechanisms, restricting access these depend on underlying transmission system and lower-level entities 21

Internetworking Terms communications Network internet the Internet intranet End System (ES) Intermediate System (IS) bridge router 22

Requirements of Internetworking link between networks routing and delivery of data between processes on different networks accounting services and status info independent of network architectures 23

Network Architecture Features addressing packet size access mechanism timeouts error recovery status reporting routing user access control connection based or connectionless 24

Architectural Approaches connection oriented virtual circuit connectionless datagram PDU s routed independently from source ES to dest ES through routers and networks share common network layer protocol, e.g. IP below have network access on each node 25

Connectionless Internetworking advantages flexibility robust no unnecessary overhead unreliable not guaranteed delivery not guaranteed order of delivery packets can take different routes reliability is responsibility of next layer up (e.g. TCP) 26

IP Operation 27

Design Issues routing datagram lifetime fragmentation and re-assembly error control flow control 28

The Internet as a Network 29

Routing ES / routers maintain routing tables indicate next router to which datagram is sent static dynamic source routing source specifies route to be followed can be useful for security & priority route recording 30

Datagram Lifetime datagrams could loop indefinitely consumes resources transport protocol may need upper bound on lifetime of a datagram can mark datagram with lifetime Time To Live field in IP when lifetime expires, datagram discarded simplest is hop count or time count 31

Fragmentation and Re-assembly may have different packet sizes on networks along path used by datagram issue of when to re-assemble at destination packets get smaller as data traverses internet intermediate re-assembly need large buffers at routers buffers may fill with fragments all fragments must go through same router 32

IP Fragmentation IP re-assembles at destination only uses fields in header Data Unit Identifier (ID) identifies end system originated datagram Data length length of user data in octets Offset position of fragment of user data in original datagram in multiples of 64 bits (8 octets) More flag indicates that this is not the last fragment 33

Fragmentation Example 34

Dealing with Failure re-assembly may fail if some fragments get lost need to detect failure re-assembly time out assigned to first fragment to arrive if timeout expires before all fragments arrive, discard partial data use packet lifetime (time to live in IP) if time to live runs out, kill partial data 35

Error Control no guaranteed delivery router should attempt to inform source if packet discarded source may modify transmission strategy may inform high layer protocol need datagram identification see ICMP in next section 36

Flow Control allows routers and/or stations to limit rate of incoming data limited in connectionless systems send flow control packets to request reduced flow see ICMP in next section 37

Internet Protocol (IP) v4 IP version 4 defined in RFC 791 part of TCP/IP suite two parts specification of interface with a higher layer e.g. TCP specification of actual protocol format and mechanisms will (eventually) be replaced by IPv6 38

IP Services Primitives functions to be performed form of primitive implementation dependent Send - request transmission of data unit Deliver - notify user of arrival of data unit Parameters used to pass data and control info 39

IP Parameters source & destination addresses protocol type of Service identification don t fragment indicator time to live data length option data user data 40

IP Options security source routing route recording stream identification timestamping 41

IPv4 Header 42

Header Fields (1) Version currently 4 IP v6 - see later Internet header length in 32 bit words including options DS/ECN (was type of service) total length of datagram, in octets 43

Header Fields (2) Identification sequence number identify datagram uniquely with addresses / protocol Flags More bit Don t fragment Fragmentation offset Time to live Protocol Next higher layer to receive data field at destination 44

Header Fields (3) Header checksum reverified and recomputed at each router 16 bit ones complement sum of all 16 bit words in header set to zero during calculation Source address Destination address Options Padding to fill to multiple of 32 bits long 45

Data Field carries user data from next layer up integer multiple of 8 bits long (octet) max length of datagram (header plus data) is 65,535 octets 46

IPv4 Address Formats 47

IP Addresses - Class A start with binary 0 all 0 reserved 01111111 (127) reserved for loopback range 1.x.x.x to 126.x.x.x all allocated 48

IP Addresses - Class B start with binary 10 range 128.x.x.x to 191.x.x.x second octet also included in network address 2 14 = 16,384 class B addresses all allocated 49

IP Addresses - Class C start with binary 110 range 192.x.x.x to 223.x.x.x second and third octet also part of network address 2 21 = 2,097,152 addresses nearly all allocated see IPv6 50

Subnets and Subnet Masks allows arbitrary complexity of internetworked LANs within organization insulate overall internet from growth of network numbers and routing complexity site looks to rest of internet like single network each LAN assigned subnet number host portion of address partitioned into subnet number and host number local routers route within subnetted network subnet mask indicates which bits are subnet number and which are host number 51

Subnet Mask Calculation Binary Representation Dotted Decimal IP address 11000000.11100100.00010001.00111001 192.228.17.57 Subnet mask 11111111.11111111.11111111.11100000 255.255.255.224 Bitwise AND of address and mask (resultant network/subnet number) 11000000.11100100.00010001.00100000 192.228.17.32 Subnet number 11000000.11100100.00010001.001 1 Host number 00000000.00000000.00000000.00011001 25 52

Routing Using Subnets 53

ICMP Internet Control Message Protocol RFC 792 (get it and study it) transfer of (control) messages from routers and hosts to hosts feedback about problems e.g. time to live expired encapsulated in IP datagram hence not reliable 54

ICMP Message Formats 55

Common ICMP Messages destination unreachable time exceeded parameter problem source quench redirect echo & echo reply timestamp & timestamp reply address mask request & reply 56

Address Resolution Protocol (ARP) need MAC address to send to LAN host manual included in network address use central directory use address resolution protocol ARP (RFC 826) provides dynamic IP to ethernet address mapping source broadcasts ARP request destination replies with ARP response 57

IP Versions IP v 1-3 defined and replaced IP v4 - current version IP v5 - streams protocol IP v6 - replacement for IP v4 during development it was called IPng (IP Next Generation) 58

Why Change IP? Address space exhaustion two level addressing (network and host) wastes space network addresses used even if not connected growth of networks and the Internet extended use of TCP/IP single address per host requirements for new types of service 59

IPv6 RFCs RFC 1752 - Recommendations for the IP Next Generation Protocol requirements PDU formats addressing, routing security issues RFC 2460 - overall specification RFC 2373 - addressing structure many others 60

IPv6 Enhancements expanded 128 bit address space improved option mechanism most not examined by intermediate routes dynamic address assignment increased addressing flexibility anycast & multicast support for resource allocation labeled packet flows 61

IPv6 PDU (Packet) Structure 62

IP v6 Header 63

IP v6 Flow Label related sequence of packets needing special handling identified by src & dest addr + flow label router treats flow as sharing attributes e.g. path, resource allocation, discard requirements, accounting, security may treat flows differently buffer sizes, different forwarding precedence, different quality of service alternative to including all info in every header have requirements on flow label processing 64

IPv6 Addresses 128 bits long assigned to interface single interface may have multiple unicast addresses three types of addresses: unicast - single interface address anycast - one of a set of interface addresses multicast - all of a set of interfaces 65

IPv6 Extension Headers 66

Hop-by-Hop Options must be examined by every router if unknown discard/forward handling is specified next header header extension length options Pad1 PadN Jumbo payload Router alert 67

Fragmentation Header fragmentation only allowed at source no fragmentation at intermediate routers node must perform path discovery to find smallest MTU of intermediate networks set source fragments to match MTU otherwise limit to 1280 octets header includes fragment offset more fragments bit identification 68

Routing Header list of one or more intermediate nodes to visit header includes Next Header Header extension length Routing type Segments left Type 0 routing provides a list of addresses initial destination address is first on list current destination address is next on list final destination address will be last in list 69

Destination Options Header carries optional info for destination node format same as hop-by-hop header 70

Virtual Private Networks set of computers interconnected using an insecure network e.g. linking corporate LANs over Internet using encryption & special protocols to provide security to stop eavesdropping & unauthorized users proprietary solutions are problematical hence development of IPSec standard 71

IPSec RFC 1636 (1994) identified security need encryption & authentication to be IPv6 but designed also for use with current IPv4 applications needing security include: branch office connectivity remote access over Internet extranet & intranet connectivity for partners electronic commerce security 72

IPSec Scenario 73

IPSec Benefits provides strong security for external traffic resistant to bypass below transport layer hence transparent to applications can be transparent to end users can provide security for individual users if needed 74

IPSec Functions Authentication Header for authentication only Encapsulating Security Payload (ESP) for combined authentication/encryption a key exchange function manual or automated VPNs usually need combined function see chapter 21 75

Summary basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 76