Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6

Slides:



Advertisements
Similar presentations
TCP/IP Protocol Suite 1 Chapter 27 Upon completion you will be able to: Next Generation: IPv6 and ICMPv6 Understand the shortcomings of IPv4 Know the IPv6.
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IPv6 Network Security.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Internet Control Message Protocol (ICMP)
Internet Networking Spring 2003
McGraw-Hill©The McGraw-Hill Companies, Inc., Chapter 20 Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6.
Group members:- Himasweta pattanaik M.A.Sravni Liakat ali khan Agamani karmakar.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Internet Control Message.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
Internet Control Message Protocol (ICMP)
1 Computer Communication & Networks Lecture 20 Network Layer: IP and Address Mapping (contd.) Waleed.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Dr. John P. Abraham Professor UTPA
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 19 Network Layer Protocols Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
Chapter 20 Network Layer: Internet Protocol
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
ICMPv6 Error Message Types Informational Message Types.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Network Layer: Address Mapping, Error Reporting, and Multicasting
1 Chapter 4: Internetworking (Internet Protocol) Dr. Rocky K. C. Chang 16 March 2004.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
IPv4 IPv4 The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. Datagram Fragmentation Checksum Options Topics.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Next Generation: IPv6 and ICMPv6
ICMP The IP provides unreliable and connectionless datagram delivery. The IP protocol has no error-reporting or error-correcting mechanism. The IP protocol.
Chapter 19 Network Layer Protocols
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Network Layer Protocols
21-2 ICMP(Internet control message protocol)
Chapter 9 ICMP.
BOOTP and DHCP Objectives
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Net 323: NETWORK Protocols
Net 323: NETWORK Protocols
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTPA
Internet Control Message Protocol Version 4 (ICMPv4)
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTPA
Net 323 D: Networks Protocols
Internet Control Message Protocol
Internet Control Message Protocol
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Presentation transcript:

Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6 Chapter 15 Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6

Network layer Protocols Figure 20.1 Protocols at network layer Network layer Protocols IGMP IP (main protocol) ARP RARP ICMP

IP criteria: Responsible for host to host delivery of datagrams from a source to destination. Needs a protocol called ARP to find the MAC(Physical) address of the next hop. IP is designed for unicast delivery. For multicasting, IP uses the services of IGMP. During the datagram delivery, IP needs the services of ICMP to handle unusual situation (Error). The current version is IPV4.

Figure 8-1

20.1 ARP Mapping Packet Format Encapsulation Operation

ARP (Address Resolution Protocol): The hosts and routers are recognized at the network level by their IP addresses, which is universally unique. The hosts and routers are recognized at the physical network by their MAC addresses, which is local and it should be unique locally but not necessarily universally unique. The MAC address and IP address are two different identifiers, and both are equally necessary. Because a physical network (Ethernet) can have two different protocols (IP, IPX) at the network layer. In the same way a packet at network layer (IP) may pass through two different physical networks (Ethernet, Token Ring). So delivery of a packet needs two levels of addressing (IP and MAC). So it is necessary to map an IP address to its corresponding MAC address.

Mapping Static mapping Dynamic mapping Static mapping: Creates a table (in each machine of the network) that associates an IP address with a MAC address. The machine that knows the IP address of other machine but not MAC address, can look through this table. Static mapping table must be periodically updated. Limitation: A machine can change its network card, results in a new MAC address. In some LANs (Local talk (Apple)), the MAC address changes every time the computer is turned on. A mobile computer can move from one computer to another computer, results in a new MAC address. Dynamic mapping (ARP, RARP) Each time a machine knows one of the two addresses, it can use a protocol to find the other. 2 protocols (ARP and RARP) have been designed for dynamic mapping. ARP maps an IP address to a MAC address. RARP/DHCP maps a MAC address to an IP address.

Figure 20.2 ARP operation

Figure 8-6

Figure 20.3 ARP packet

Figure 20.4 Encapsulation of ARP packet

Figure 20.5 Four cases using ARP

An ARP request is broadcast; an ARP reply is unicast. Note: An ARP request is broadcast; an ARP reply is unicast.

Example 1 A host with IP address 130.23.3.20 and physical address B23455102210 has a packet to send to another host with IP address 130.23.43.25 and physical address A46EF45983AB. The two hosts are on the same Ethernet network. Show the ARP request and reply packets encapsulated in Ethernet frames. Solution Figure 20.6 shows the ARP request and reply packets. Note that the ARP data field in this case is 28 bytes, and that the individual addresses do not fit in the 4-byte boundary. That is why we do not show the regular 4-byte boundaries for these addresses. Note that we use hexadecimal for every field except the IP addresses.

Figure 20.6 Example 1

Figure 8-8 RARP

Figure 8-9

Figure 8-10

DHCP (Dynamic Host Configuration Protocol): RARP (now obsolete) has been replaced by DHCP. DHCP maps a MAC address to an IP address. It provides the information dynamically based on demand. It is used to assign addresses to a host dynamically. Operation: DHCP is a client server program. DHCP server has two databases. The first database statically binds physical addresses to IP addresses. The second database makes DHCP dynamic. When a DHCP client requests for a temporary, DHCP server goes to the pool of available IP addresses and assigns an IP address for a negotiable period of time. When a DHCP client sends a request to a DHCP server, the server first checks its static database. If an entry with the requested physical address exists in the static database, the permanent IP address of the client is returned. On the other hand, if the entry does not exist in the static database, the server selects an IP address from the available pool, assigns the address to the client, and adds the entry to the dynamic database.

DHCP Transition:

DHCP Transition states: (1) Initialization state: The DHCP client broadcasts a DHCP DISCOVER message. (2) Selecting state: The servers that provide this type of service respond with a DHCP OFFER message. DHCP OFFER message includes IP address and lease duration. The server that sends DHCP OFFER message, locks the IP address, so other clients cannot use it. If the clients receive no DHCP OFFER message, it tries 4 times, after every 2 seconds. Finally if fails the clients sleeps for 5 minutes, before trying again. On the other hand, if the client receives the DHCP OFFER message, it sends a DHCP REQUEST message to the selected server. (3) Requesting state: Here client waits until it receives DHCP ACK message from the server, which binds the client’s physical address and its IP address. (4) Bound state: In this state client can use the IP address until the lease expires. If the lease expires it goes to the initial state. If 50% of the lease period expires, the client sends DHCP REQUEST for renewal. If the server agrees, it sends DHCP ACK message to the client (5) Renewing state: If client receives DHCP ACK message from the server, it renews the lease agreement. If the lease time 87.5% expires and the DHCP client does not receive the DHCP ACK message, it sends the DHCP REQUEST to the server and goes to the Rebinding state. (6) Rebinding state: If the lease time expires or the client receives a DHCP N ACK message from the server, it goes to the initialization state.

Figure 15-4 Part I (Exchanging messages)

Figure 15-4 Part II

20.2 IP Datagram Fragmentation

Characteristics: Host to host delivery protocol for the internet. Unreliable and connectionless datagram protocol (best effort delivery service) and also applicable for packet switching network. IP provides no error and flow control mechanism. IP provides only error detection mechanism and discards the packet if it is corrupted. For reliability, IP is paired with TCP.

Continue…… Datagram: A datagram variable length packet has two parts. Header and Data. Header 20 -60 bytes Data (65536-20) ((65536-60) bytes

Figure 20.7 IP datagram

Note: The total length field defines the total length of the datagram including the header.

Version: IPV4 Header length: Differentiated services: Total length: Length of the header is variable. Length of the datagram is 4 byte words. Differentiated services: This is necessary for quality of service purposes. Total length: Length of data = total length-header length Total length of the IP datagram = (216-1) bytes = 65535 bytes. [16 bits] Time to live: Controls the maximum number of hops (routers) visited by the datagram. When a source node sends a datagram, stores a number approximately 2 times the maximum number of routes between any two hosts. Each router that process the datagram decrements this number by 1. If the value is 0, the router decrements the datagram. Protocol: An IP datagram encapsulates data from several higher-level protocols, such as TCP, UDP, ICMP and IGMP. This field specifies the final destination protocol, to which the IP datagram should be delivered.

Figure 20.8 Multiplexing Demultiplexing

Protocols Checksum: The checksum in the IP packet covers only the header, but not the data. The reasons are: The checksum for the IP datagram doesn’t have to check the encapsulated data. The header of the IP packet changes with each visited router, but the data do not.

Figure 20.9 Example of checksum calculation

Maximum transfer unit: (MTU) Figure 20.10 MTU Maximum transfer unit: (MTU) When a datagram is encapsulated in a frame, the total size of the datagram <= maximum size (depends on hardware and software of the network). The maximum length of the IP datagram = the largest maximum transfer unit (MTU) = 65535 bytes. For other physical networks, we must divide the datagram to make it possible to pass through these networks. A datagram can be fragmented by the source host or any router in the path. Reassembly will be done at the destination.

Fields related to fragmentation: Flags: This is a 3-bit field. The first bit is reserved. The second bit is “Do not fragment bit”. If its value is 0, the datagram can be fragmented. If the value is 1, the machine must not fragment the datagram. The third bit is called “The more fragment bit”. If the value is 1, it means the more datagram exit after the current fragment. If the value is 0, it means this is the last or only fragment.

Fragmentation offset: Figure 20.11 Fragmentation example Fragmentation offset: This 13 bit field shows the relative position of this fragment with respect to the whole datagram.

20.3 ICMP (Internet Control Message Protocol Types of Messages

Necessity of ICMP: IP has no error-reporting or error-correcting mechanism. IP has no mechanism for host and management queries. A host sometimes needs to know if a router or another host is alive. ICMPs messages are not passed directly to the data link layer. Instead the messages are first encapsulated inside IP datagram before going to the lower level. If the value of the protocol field = 1, in the IP datagram, IP data implies ICMP message.

Figure 20.12 ICMP encapsulation

ICMP always reports error messages to the original source. Note: ICMP always reports error messages to the original source.

Types of ICMP message: 2 types: (1) Error reporting (2) Query IP is an unreliable protocol, it cannot perform error checking and error control. ICMP was designed for this shortcoming. ICMP always reports error messages to the original source (originator of the datagram). ICMP doesn’t correct errors; the correction belongs to the higher level protocols. Five types of errors are reported.

Figure 20.13 Error-reporting messages

Error Reporting Destination unreachable: Source quench (Slow down): If a router cannot route a datagram or a host cannot deliver a datagram, the datagram is discarded, the router or host sends a destination unreachable message to the source host. Source quench (Slow down): IP is a connectionless protocol. IP has lack of flow control and congestion control. Lack of flow control can create a problem in source-destination delivery. The lack of congestion control creates a problem in the routers that are supposed to forward the packet. When a router or host discards a datagram due to congestion, it sends a source-quench message to the source host. source-quench message can inform the source that the datagram has been discarded. source-quench message help the source host to slow down the sending messages.

Continue….. Time exceeded: The router that receives the datagram with a value 0 in the TTL field, discard the packet, and a time-exceeded message must be sent by the router to the source. If all fragments of a message do not arrive at the destination in time, then this message is reported to the source. Parameter problem: If a router or host discovers an ambiguous value or a missing value in any field of the datagram, it sends a parameter problem message to the source. Redirection: The numbers of hosts are too many compared to the number of routers, and so they don’t take part in the routing update process dynamically, as unacceptable traffic can be produced. The host usually uses static routing, and knows only the IP address of a default router. So when a host sends a packet to the default router that may not be the dedicated router to send the packet to the appropriate network, it simply forwards the packet to the appropriate router. However to update the routing table of a host, router sends a redirection message to this host.

There is no flow control or congestion control mechanism in IP. Note: There is no flow control or congestion control mechanism in IP.

Figure 20.14 Query messages

Query message: Echo request and reply: Designed for diagnostic purposes. The combination of Echo request and reply messages determines, whether two systems (hosts or routers) can communicate with each other or not. Time- stamp request and reply: This is used to synchronize the clocks in two machines. Two machines (hosts or routers) can determine the round trip time for an IP datagram to travel between them, using this message. Addresses mask request and reply: A host may know its full IP address, but it may not know which part of the address defines the networks and sub networks and which part defines the host identifier. In this case a host can send Addresses mask request message to the router. The router then sends a mask in an Addresses mask reply message.

Continue…. Router solicitation and advertisement: The hosts must know whether the routers are alive or not through Router solicitation and advertisement messages. A host can broadcast or multicast a Router solicitation message. A router that receives Router solicitation message, broadcast their routing information using the Router advertisement message. The router can do it periodically, even if no host has solicited.

ICMPv6 Strategy: Like ICMPV4 Purpose: Like ICMPV4 ARP and IGMP of IPV4 are combined in ICMPV6. RARP is dropped from the suite, as it is used seldom now a day.

20.4 IPv6 IPv6 Addresses Categories of Addresses IPv6 Packet Format Fragmentation ICMPv6 Transition

Demerit of IPV4: IPV4 has a two-level address structure (net ID and host ID) categorized into five classes. The address space is insufficient. Internet must accommodate encryption and authentication of data for some applications. Originally no security mechanism was provided in IPV4. Internet must accommodate real time audio and video transmission. This requires minimum delay strategies and reservation of resources. This is not provided in IPV4.

Merit of IPV6 over IPV4: Larger address space: An IPV6 address is 128 bits long, while IPV4 has 32 bits. Better header format: Here options are separated from the base header and the upper layer data. New options: Allow options for additional functionalities. Allowance for extension: Allow the extension of the protocol, if required by new technologies or applications. Support for resource allocation: Flow level has been added to enable the source to request special handling of the packet and to support traffic (real time audio and video). Support for more security: The encryption and authentication options in IPV6 provide confidentiality and integrity of the packet.

Figure 20.15 IPv6 address

Figure 20.16 Abbreviated address

Figure 20.17 Abbreviated address with consecutive zeros

Figure 20.18 CIDR address IPv6 allows classless addressing and CIDR notation. Figure: Prefix of 60 bits using CIDR

IPv6 Categories of addresses: IPV6 defines three types of addresses: Unicast address Anycast address Multicast address Defines a single computer Anycast address is a new type of address incorporated in IPv6. It defines a group of computers with addresses that have the same prefix. In contrast to conducting transmission to all nodes in a group as in multicast, anycast sends the packet only to the nearest node in the group. Multicast address: A packet sent to a multicast address must be delivered to each member of the set.

Figure 20.19 Format of an IPv6 datagram

Fragmentation in IPv6: The policy is same as that of IPV4. In IPV4, a source or router is responsible to fragment the datagram if necessary. In IPV6, only the source is responsible to fragment the datagram. A source uses a path MTU discovery technique to find the smallest MTU supported by any network on the path. If path MTU discovery technique is not used, the source must fragment the datagram to a size of 576 bytes or smaller.

Figure 20.20 Comparison of network layers in version 4 and version 6

Figure 20.21 Three transition strategies from IPv4 to IPv6

Figure 20.22 Three transition strategies Dual stack: A station should run IPV4 and IPV6 simultaneously until all the systems in the internet use IPV6. When it is necessary to send a packet to a destination, the source host queries the DNS (Domain name system). If the DNS returns and IPV4 address, the source sends an IPV4 packet, else if IPV6 address then it sends IPV6 packet.

Figure 20.23 Tunneling When two IPV6 host computers want to communicate with each other, and must pass through a network that uses IPV4 protocol, it is used. To pass through the IPV4 protocol region, the packet must have an IPV4 address. So IPV6 packet must be encapsulated into IPV4 packet, when the packet enters into the region and the protocol value is set to 41, and leaves IPV4 header when it exits the region.

Figure 20.24 Header translation It is necessary when majority of the internet has moved to IPV6, but some systems still use IPV4. Here source may want to use IPV6, but the receiver does not understand IPV6. Tunneling is not a solution here. Here header format must be changed totally through header translation.