Datagram Forwarding.

Slides:



Advertisements
Similar presentations
1 Internet Protocol: Routing IP Datagrams D. E. Comer, “Internetworking with TCP/IP: Principles, Protocols and Architectures”, Ch. 8, Prentice Hall, 2000.
Advertisements

1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
IP Forwarding Relates to Lab 3.
Discussion Monday ( ). ver length 32 bits data (variable length, typically a TCP or UDP segment) 16-bit identifier header checksum time to live.
ARP: Address Resolution Protocol
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
ROUTING PROTOCOL IGRP. REVIEW 4 Purpose of Router –determine best path to destination –pass the frames to the destination 4 Protocols –routed - used by.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
Chapter 3 Review of Protocols And Packet Formats
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
© Jörg Liebeherr ECE 1545 Forwarding in IP Networks.
WAN Technologies.
Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Chapter 4: Managing LAN Traffic
Network Layer – Subnetting and Control Protocols Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
ARP Scenarios CIS 81 and CST 311 Rick Graziani Fall 2005.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
FALL, 2005CSI Part 2.3 Internetworking & Addressing (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution Robert L. Probert, SITE,
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Chapter 19 - Binding Protocol Addresses
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Chapter 20 IP Datagrams and Datagram Forwarding. Connectionless vs Connection-oriented Service TCP/IP’s fundamental delivery service is connectionless.
Birgit Bonham: Prospect High School ARP….or What’s your MAC address?
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
ARP The Process and the Protocol. Note to reader The information explained in this section is a simplification and extrapolation of the actual ARP determination.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
Basic Routing Principles V1.2. Objectives Understand the function of router Know the basic conception in routing Know the working principle of router.
Internet Protocol: Routing IP Datagrams Chapter 8.
1 IP Datagrams And Datagram Forwarding. 2 Motivation For IP Packets Because it can connect heterogeneous networks, a router cannot transmit a copy of.
CSIT 220 (Blum)1 ARP Based on Computer Networks and Internets (Comer)
By: Muhammad Hanif.  Have a heart that never harden, and a temper that never tire, and a touch that never hurt.  The True happiness is to give love.
Address Resolution Protocol (ARP). Internet and Data Link Layer Addresses Each host and router on a subnet needs a data link layer address to specify.
1 Binding Protocol Addresses (ARP ). 2 Resolving Addresses Hardware only recognizes MAC addresses IP only uses IP addresses Consequence: software needed.
Delivery and Forwarding Chapter 18 COMP 3270 Computer Networks Computing Science Thompson Rivers University.
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
VCC Semester 1 CHAPTER 11. VCC  Content Layer 3 Devices ARP concept Network layer services Routed and routing protocols Protocol analyzer.
Scaling the Network: Subnetting and Protocols
Chapter 9 Introduction To Data-Link Layer 9.# 1
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
ROUTING.
Scaling the Network Chapters 3-4 Part 2
MAC Address Tables on Connected Switches
Now (switched network)
Scaling the Network: The Internet Protocol
CS4470 Computer Networking Protocols
Local Area Networks: Topologies
6 Network Layer Part III Computer Networks Tutun Juhana
MAC Addresses and ARP 32-bit IP address:
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Forwarding and Routing IP Packets
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
IST 220 Lectures for: Dec. 8, 2009 Dec. 10, 2009
Internetworking & Address Resolution
Net 323: NETWORK Protocols
CS 428 Computer Networking
(Read Forouzan Chapters 6 and 7)) IP Forwarding Procedure
IP Forwarding Relates to Lab 3.
IP Forwarding Relates to Lab 3.
Chapter 9 Introduction To Data-Link Layer 9.# 1
IP Forwarding Relates to Lab 3.
Data Communication Networks
Scaling the Network: The Internet Protocol
Networking Essentials For Firewall-1 Administrators
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
ITIS 6167/8167: Network and Information Security
Figure 6.6 Default routing
Presentation transcript:

Datagram Forwarding

Routers and the IP Addressing Principle How to assign IP to a router, which interconnects multiple networks?

Routers and the IP Addressing Principle Each router is assigned two or more IP addresses, one address for each network 3 3

Forwarding an IP Datagram To make the selection of a next hop for an IP datagram, a router uses a forwarding table. 4 4

Network Prefix Extraction The mask field in a forwarding table entry is used to extract the network portion (prefix) of an IP address during lookup if ( (Mask[i] & IP Address) == Destination[i] ) forward to NextHop[i] Examples A datagram to 192.4.10.3 The first entry fails since 255.0.0.0 & 192.4.10.3 ≠ 30.0.0.0 The second entry: 255.0.0.0 & 192.4.10.3 ≠ 40.0.0.0 The third entry: 255.255.0.0 & 192.4.10.3 ≠ 128.1.0.0 The last entry: 255.255.255.0 & 192.4.10.3 == 192.4.10.0  Forward to 128.1.0.9

Exercise 1 What is the next hop for IP datagram to 30.0.1.2?

Longest Matching Prefix Prefix in the table might overlap! AT&T Pennsylvania  AT&T Pittsburgh Longest matching prefix rule: For each packet, examine entries in the forwarding table with the longest prefix first

Exercise 2 Given the following forwarding table: Determine the next hop for each of the following destination address: 112.32.54.188 112.33.45.12 112.34.8.60 Network Next Hop 60.0.0.0/8 A 112.32.0.0/12 B 112.32.0.0/16 C 112.33.45.0/24 D

IP Encapsulation: Virtual Packets An IP datagram is encapsulated in a frame by network hardware. Datagram: Layer-3 packet Encapsulation requires the sender to supply the MAC address of the next computer Router or host

Example: A Tiny Internetwork NIC-1-1 NIC-1-2 A D R2 NIC-2-1 NIC-2-2 E B NIC-L NIC-R F A 166.200.0.0/16 167.234.0.0/16 R1 168.16.0.0/16 R2 F 166.200.1.5 166.200.0.7 167.234.0.7 167.234.0.8 168.16.0.8 168.16.2.4

Exercise 3 Complete R2’s forwarding table: F A R2 R1 166.200.0.0/16 167.234.0.0/16 R1 168.16.0.0/16 R2 F 166.200.1.5 166.200.0.7 167.234.0.7 167.234.0.8 168.16.0.8 168.16.2.4 Complete R2’s forwarding table: Network Mask Next Hop 166.200.0.0 167.234.0.0 168.16.0.0

Steps for A to send “I like you” to F 166.200.1.5 168.16.2.4 P-A will compose the packet I like you 166.200.1.5 168.16.2.4 NIC-A’s MAC NIC-1-1’s MAC P-A forwards the packet to NIC-A NIC-A calculates the CRC, adds SOH, EOT I like you 166.200.1.5 168.16.2.4 NIC-A’s MAC NIC-1-1’s MAC SOH EOT CRC NIC-A modulates the packet  send out using CSMA/CD

ARP (Address Resolution Protocol) Internet uses ARP to map the next hop’s IP address to its Link layer (MAC) address always restricted to a single network at a time. ARP uses broadcast to reach all nodes Broadcast MAC address: FF:FF:FF:FF:FF:FF “I'm looking for the MAC address of a computer that has IP address 1.2.3.4” “I'm the computer with IP address 1.2.3.4, and my MAC address is 11:22:33:44:55:66”

Steps for A to send “I like you” to F 166.200.1.5 168.16.2.4 After a while, NIC-1-1 will receive the m-carrier NIC-1-1 demodulates the m-carrier and put it into the cache NIC-1-1 does address filtering NIC-1-1 does length and CRC checkings If the packet passes all checkings, NIC-1-1 will strip off SOH, EOT, CRC, and forward the frame to P-R1 P-R1 will strip off the Layer-2 (MAC) header: I like you 166.200.1.5 168.16.2.4 NIC-A’s MAC NIC-1-1’s MAC I like you 166.200.1.5 168.16.2.4

Steps for A to send “I like you” to F P-R1 will do routing based on the routing table. Destination address: 168.16.2.4 P-R1 adds the Layer-2 (MAC) header and forward it to NIC-1-2 Network Mask Next Hop 166.200.0.0 255.255.0.0 Deliver direct 167.234.0.0 168.16.0.0 167.234.0.8 (NIC-2-1) I like you 166.200.1.5 168.16.2.4 NIC-1-2’s MAC NIC-2-1’s MAC

Steps for A to send “I like you” to F NIC-1-2 calculates the CRC, adds SOH, EOT; modulates the packet  send out using CSMA/CD… NIC-2-1 does the same as NIC-1-1… P-R2 does the same as P-R1 except that it will use a different routing table: Destination address: 168.16.2.4 Network Mask Next Hop 166.200.0.0 255.255.0.0 167.234.0.7 (NIC-1-2) 167.234.0.0 Deliver direct 168.16.0.0

Steps for A to send “I like you” to F P-R2 adds the new Layer-2 (MAC) header and forward it to NIC-2-2 NIC-2-2 does the same as NIC-1-2 to send out the frame… The bridge will forward the frame to computer F based on the MAC address as we discussed before (week10-2.pptx) Note: the bridge does not understand IP addresses! After a while, NIC-F will receive the m-carrier… I like you 166.200.1.5 168.16.2.4 NIC-2-2’s MAC NIC-F’s MAC

Exercise 4 Q1: During the whole process, how many processors (incl. computers and routers) have seen the Internet layer header? Q2: During the whole process, how many times is the Internet layer header changed? How about the Link layer header?