IST 220 Lectures for: Dec. 8, 2009 Dec. 10, 2009

Slides:



Advertisements
Similar presentations
Lecture 2 - Networking Devices
Advertisements

CSE331: Introduction to Networks and Security Lecture 8 Fall 2002.
IP Addressing and Subnetting
Module 10: Routing Fundamentals and Subnets Small Router Purchase Subnetting Example a Basic Subnetting b Subnetting a Class A Network.
Network Layer CS176A Ramya Raghavendra. Routing table [Q1] Destination Address Range Link Interface Through
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 17 Introduction to Networks and the Internet.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
Chapter 3 Review of Protocols And Packet Formats
Networking and Internetworking Devices Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009.
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
Q and A, Ch. 21 IS333, Spring 2015 Victor Norman.
WAN Technologies.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
CSC 412 – Networking Scott Heggen. Agenda Today The Network Layer (Chapter 5) Discussion on A2: The Data Link Layer Thursday Q2: The Networking Layer.
Week 3 - IP addressing 4 Introduction to IP addressing 4 Classes of IP addressing 4 Why Subnet Masks are necessary? 4 How to create subnet masks.
IP Addressing and Network Software. IP Addressing  A computer somewhere in the world needs to communicate with another computer somewhere else in the.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
More on the IP Internet Protocol. Internet Layer Process Transport layer process passes EACH TCP segment to the internet layer process for delivery Transport.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
LECTURE ON IP Addressing. What is Networking? –by ‘computer network’ we mean the interconnection between different computers. Why Networking? –to share.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 16 Introduction to Networks and the Internet.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
CS470 Computer Networking Protocols
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Networking Components Assignment 3 Corbin Watkins.
Q and A, Ch. 21 IS333, Spring 2016 Victor Norman.
NT1210 Introduction to Networking
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
1 Layer 3: Routing & Addressing Honolulu Community College Cisco Academy Training Center Semester 1 Version
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
IP – Subnetting and CIDR
Chapter 9 Introduction To Data-Link Layer 9.# 1
Datagram Forwarding.
Introduction to Networks v6.0
Network Hardware for Expanding Network
Lecture 3 By Miss Irum Matloob.
MAC Address Tables on Connected Switches
Link Layer 5.1 Introduction and services
Instructor Materials Chapter 5: Ethernet
Part III Datalink Layer 10.
Now (switched network)
Scaling the Network: The Internet Protocol
CS4470 Computer Networking Protocols
Local Area Networks: Topologies
Lab 2 – Hub/Switch Data Link Layer
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Chapter-5 TCP/IP Suite.
PART IV Network Layer.
Lab 2 – Hub/Switch Data Link Layer
CS 1302 Computer Networks — Unit - 3 — — Network Layer —
Internetworking & Address Resolution
Net 323: NETWORK Protocols
Q and A, Ch. 21 CS332, Fall 2017 Victor Norman.
CS 457 – Lecture 10 Internetworking and IP
TCP/IP Internetworking (Part 2)
IP Forwarding Relates to Lab 3.
Part III Datalink Layer 10.
Scaling the Network: The Internet Protocol
Delivery, Forwarding, and Routing of IP Packets
Internetworking: Concepts, Architecture, and Protocols
Presentation transcript:

IST 220 Lectures for: Dec. 8, 2009 Dec. 10, 2009

Introduction Each WAN or LAN belongs to a particular organization, an internetwork does not belong to any particular org An internetwork could actually be very small, though it is usually big For big internetworks, the routing tables must be still small; otherwise, too slow To make routing tables small, we would need to use hierarchical addresses IP addresses are a hierarchical address scheme Each IP address has 32 bits

Five Classes of IP addresses To make both big and small companies happy, one class of IP address is NOT enough.

How to identify the class of an IP address? The first 4 bits of an IP address identifies its class. 0 * * * : class A IP address “*” means either bit “1” or bit “0” 1 0 * * : class B IP address 1 1 0 * : class C IP address 1 1 1 0 : class D IP address 1 1 1 1 : class E IP address

Dotted Decimal Notation of an IP Address Remembering 32 bits IP addresses is often too HARD for human being. To solve this problem, we translate the 32 bits to decimal. 10000001 00110100 00000110 00000000 Binary  Decimal: 129 . 52 . 6 .

How to know the Class of a decimal IP address? Example: 129.52.6.0 Step 1: translate the first decimal number “129” to binary, we get: 10000001 Step 2: because the first 4 bits “1000” match the identifier of Class A, it is a Class A address. Idea: the first decimal number tells the Class info: Class 1st decimal number A 0 through 127 B 128-191 C 192-223 Suffix: Last 3 decimal numbers Last 2 decimal numbers Last 1 decimal number

IP Packet Forwarding in a tiny Internetwork Question 1: how many physical networks are there? Principle: each physical network belongs to a particular organization; physical networks are interconnected by routers, not bridges.

Answer to Question1 Answer: the two routers R1 and R2 break the internetwork into 3 physical networks. Note that Physical Network 2 includes two LAN segments and the bridge. Note that half of R1 belongs to Phy Network 1; the other half of R1 belongs to Phy Network 3.

What is the Network Address of Phy Network 1? Each Phy Network has a unique network address which cannot be used by any computer in it. The “prefix” of the Network Address must be the same as the prefix of the IP addresses of all other IP addresses used in the network; but all the “suffix” bits must be “0” Because the first decimal number of A’s IP address is 166, it is a Class B IP address. The “prefix” of A’s IP address should be 166.200 because the first 16 bits are the prefix of any Class B address.

What is the Network Address of Phy Network 1 (cont.)? Because all the IP addresses used in a Phy Network must have the same prefix, the prefix of the IP addresses of all Other computers, though now shown, must be 166.200 Hence, the “prefix” of the Network Address must be 166.200. Hence, the network address is: 166.200.0.0

What is the Broadcast Address of Phy Network 1 (cont.)? The “prefix” of the Broadcast Address must be the same as the prefix of the IP addresses of all other IP addresses used in the network; but all the “suffix” bits must be “1” Hence, the “prefix” of the Broadcast Address must be 166.200; and the suffix must be: 11111111-11111111 When we translate the 16 bits suffix back to decimal, we will get: 255.255 Hence, the broadcast address is: 166.200.255.255

Maximally, Phy Network 1 can hold how many computers? Because it is a Class B network, the suffix part of the IP addresses used in the Phy Network will have 16 bits. Because the total number of all possible combinations of the 16 bits is 216, the Phy Network can theoretically hold 216 computers. However, because neither the Network Address nor the Broadcast Address can be used by a computer, maximally the Phy Network can only hold 216 – 2 computers.

How many IP addresses should R1 own? NIC1,1 belongs to Phy Network 1; however, NIC 1,2 belongs to Phy Network 3. Different Phy Networks must have diff. prefix. Hence, the IP addresses assigned to these two NIC cards must have different prefix. Therefore, R1 owns two IP addresses.

Assume computer A sends message “Hello” to D: Step 1: P-A (processor of A) adds the “IP header” (also called the routing layer header): | 168.16.24.115 | 166.200.122.1 | “hello” | (The IP layer payload includes the message only.) Step 2: P-1 adds the NIC Layer (also called “Network Interface Layer”) header: | NIC-11’s MAC | NIC-A’s MAC | 168.16.24.115 | 166.200.122.1 | “hello” | (The NIC Layer payload includes the message and the two IP addr.)

Assume computer A sends message “Hello” to D (cont’d): Step 3: NIC-A adds preamble and CRC | Preamble | NIC-11’s MAC | NIC-A’s MAC | 168.16.24.115 | 166.200.122.1 | “hello” | CRC| Step 4: NIC-A uses CSMA-CD to send the packet out after modulation.

Assume computer A sends message “Hello” to D (cont’d): Step 5: NIC-11 senses the signal, demodulates it, and puts it into cache Step 6: NIC-11 does address filtering Step 7: NIC-11 does length checking Step 8: NIC-11 does CRC checking Step 9: NIC-11 strips off preamble & CRC Step 10: NIC-11 puts the packet into incoming queue

Assume computer A sends message “Hello” to D (cont’d): Step 11: P-1 (processor of R1) gets the packet from queue Step 12: P-1 strips off the NIC layer header Step 13: P-1 does routing based on the Routing Table. Destination Where to forward 166.200.0.0 NIC1,1 167.234.0.0 NIC1,2 168.16.0.0

Assume computer A sends message “Hello” to D (cont’d): Notes on the Routing Table: The Destination column should contain Network Addr. The Dest field tells the receiver’s Phy Network The Routing Table should forward the packet towards the shortest path, if there exists multiple paths from R1 to the receiver. -When P-1 matches the packet’s Dest IP Address against the routing table, the last row will be matched because the Network Address in the last row and the packet’s dest IP address have the SAME prefix.

Assume computer A sends message “Hello” to D (cont’d): Step 14: P-1 adds a new NIC Layer header: | NIC-21’s MAC | NIC-12’s MAC | 168.16.24.115 | 166.200.122.1 | “hello” | Step 15: NIC-12 adds the preamble and CRC; NIC-12 then uses CSMA-CD to send it out after modulation. Step 16: NIC-21 will do exactly the same things NIC-11 has done.

Assume computer A sends message “Hello” to D (cont’d): Step 17: P-2 will do exactly the same things P-1 has done except that it will use a different routing table. Destination Where to forward 166.200.0.0 NIC2,1 167.234.0.0 NIC2,2 168.16.0.0

Assume computer A sends message “Hello” to D (cont’d): Step 18: P-2 adds a new NIC layer header: | NIC-D’s MAC | NIC-22’s MAC | 168.16.24.115 | 166.200.122.1 | “hello” | Alert: Inside the NIC layer header, the dest address cannot be the MAC address of NIC-L of the Bridge, since no bridge does address filtering.

Assume computer A sends message “Hello” to D (cont’d): Step 19: NIC-22 adds the preamble and CRC; it then uses CSMA-CD to send packet out after modulation. Step 20: NIC-L will sense the signal, demodulates it, and puts it into cache. Step 20: NIC-L will do length checking; Step 21: NIC-L will do CRC checking Step 22: NIC-L will strip off preamble & CRC Step 23: NIC-L will put the packet into queue.

Assume computer A sends message “Hello” to D (cont’d): Step 24: P-B (bridge) will decide where to forward the packet based on its forwarding table: Destination Where is the packet from? Where to forward? D’s MAC Addr. Left segment NIC-R Right segment discard C’s MAC Addr. Discard NIC-L

Assume computer A sends message “Hello” to D (cont’d): Step 25: because the first rule is matched, P-B will forwards the packet to NIC-R. Step 26: NIC-R adds preamble and CRC. Step 27: NIC-R uses CSMA-CD to sent the packet out after modulation. Step 28: NIC-D senses the signal, demodulates it, and puts it into cache. Step 29: NIC-D does address filtering.

Assume computer A sends message “Hello” to D (cont’d): Step 30: NIC-D does length checking. Step 31: NIC-D does CRC checking. Step 32: NIC-D strips off preamble and CRC. Step 33: NIC-D forwards the packet to P-C. Step 34: P-D strips off the NIC layer header; Step 35: P-D strips off the IP header after knowing who the sender is. Step 36: P-D shows the message in Outlook.