Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.

Slides:



Advertisements
Similar presentations
Ch 20. Internet Protocol (IP) Internetworking PHY and data link layers operate locally.
Advertisements

Chapter 20 Network Layer: Internet Protocol
Internet Protocol/ Network Layer.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
U N I T - 3.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Internet Protocol/ Network Layer. 2 Position of IP in TCP/IP protocol suite.
IPv4 - The Internet Protocol Version 4
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Internet Protocol (IP)
1 K. Salah Module 5.2: Internet Protocol CO vs. CL protocols IP Features –Fragmentation –Routing IP Datagram Format IPv6.
Network Layer Packet Forwarding IS250 Spring 2010
1 TDC TDC 365 Network Interconnections Technologies Lecture #4 Notes Spring, 2009.
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
1 Kyung Hee University Part 4 : Network Layer. 2 Kyung Hee University Role and Position of Network Layer o Network layer in the Internet model is responsible.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
Network Layer Last Update Copyright Kenneth M. Chipps Ph.D.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Dr. John P. Abraham Professor UTPA
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ECE 4110 – Internetwork Programming IP Protocol. 2 * From TCP/IP Protocol Suite, B. A. Forouzan, Prentice Hall Position of IP in TCP/IP Protocol Suite.
Network Layer: Internet Protocol.
Chapter 19 Network Layer Protocols Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
Communications Services Connection Oriented Service  A connection is established  Data is sent or received over this connection  Connection may be terminated.
Chapter 20 Network Layer: Internet Protocol
1 Kyung Hee University Chapter 8 Internet Protocol (IP)
TCP/IP Protocol Suite 1 Chapter 8 Upon completion you will be able to: Internet Protocol Understand the format and fields of a datagram Understand the.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Chapter 8 Internet Protocol (IP)
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
Internet Protocol Version 4 VersionHeader Length Type of Service Total Length IdentificationFragment Offset Time to LiveProtocolHeader Checksum Source.
COMPUTER NETWORKS CS610 Lecture-30 Hammad Khalid Khan.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
IP Fragmentation. Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on rcving side,
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Internet Protocol Version4.
IPv4 IPv4 The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. Datagram Fragmentation Checksum Options Topics.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 19 Network Layer Protocols
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
IP - The Internet Protocol
IP - The Internet Protocol
Internet Protocol Version4
Chapter 20 Network Layer: Internet Protocol
Internet Protocol Version4
Dr. John P. Abraham Professor UTPA
Internetworking Outline Best Effort Service Model
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Dr. John P. Abraham Professor UTPA
Chapter 20. Network Layer: IP
Net 323 D: Networks Protocols
Chapter 7 Internet Protocol Version 4 (IPv4)
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
Internet Protocol (IP)
ITIS 6167/8167: Network and Information Security
NET 323D: Networks Protocols
Presentation transcript:

Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1

INTERNETWORKING In this section, we discuss internetworking, connecting networks together to make an internetwork or an internet. 20.2

Network Layer Need ◦ A frame has no routing info. ◦ DL layer has no routing info. ◦ For a router with 3+ NIC’s,  how to deliver a packet through multiple links.  How to find a next hop router Responsibility ◦ Host-to-host delivery ◦ For routing packets through the router and switches. 20.3

Links between two hosts 20.4

Network layer in an internetwork 20.5

Network Layer 20.6 Source ◦ Creating a packet from the upper layer.  The header contains source and destination IP addresses. ◦ Checking the routing table to find the routing info (eg. Outgoing interface, or machine address of the next hop) ◦ If the packet is larger than MTU, fragment it.  Note that it is different from L4 segmentation/reassembly Router ◦ Routing the packet by consulting the routing table for each incoming packet and find the i/f that the packet must be sent to. Destination ◦ Address verification. ◦ For fragmented frames, wait for all fragmentations then reassemble them before delivering the packet to the upper layer.

Network layer at the source, router, and destination 20.7

Internet as an L3 Switching at the network layer in the Internet uses the datagram approach to packet switching. ◦ Use of globally unique address for each packet Communication at the network layer in the Internet is connectionless. ◦ Each packet is treated independently by the intermediate routers. ◦ Packets in a message may travel through different paths. Why? 20.8

IPV4 The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. 20.9

Position of IPv4 in TCP/IP protocol suite 20.10

IPv4 datagram format 20.11

IPv4 Header Variable length: byte (multiple of 4) Contains routing information

IPv4 Format Version (4-bit): currently 4. Header length (4-bit): the length of the IP header in 4-byte unit. Type of Services(TOS): ◦ This field was not used earlier because of the lack of standard ◦ DiffServ uses this field for differentiate packet types. Total length ◦ to defines the total length of the datagram including the header in bytes. ◦ 16-bit number, the maximum IP size is limited to 2 16 bytes, or 64 Kbytes

IPv4 Format Identification ◦ A source node gives a unique ID to each packet. ◦ Identification, Flags, Fragmentation offset fields are used for fragmentation (will be covered later) Time to Live (TTL) ◦ A packet has a limited lifetime in the network to avoid zombie packets. ◦ Designed to hold a timestamp, and decreased by each router. A packet is discarded by a router if TTL is zero. ◦ Revised to hold the maximum number of hops the packet can travel thru the network. Each router decrements it by one. Protocol ◦ To define payload protocol type ◦ 1 for ICMP ◦ 2 for IGMP ◦ 6 for TCP ◦ 17 for UDP ◦ 89 for OSPF 20.14

IPv4 Format Header checksum ◦ Refer RFC 1071 ◦ An IP header is slightly modified by each router. At least TTL field. ◦ The checksum must be re-calculated by routers which is a kind of general compuers with more than one network interface. ◦ The checksum must be efficiently calculated with no need of special hardware. Source IP address and Destination IP address Options ◦ Variable length ◦ For new protocols Padding ◦ To make the header a multiple of 32-bit words 20.15

20.16 An IPv4 packet has arrived with the first 8 bits as shown: The receiver discards the packet. Why? Solution There is an error in this packet. The 4 leftmost bits (0100) show the version, which is correct. The next 4 bits (0010) show an invalid header length (2 × 4 = 8). The minimum number of bytes in the header must be 20. The packet has been corrupted in transmission. Example 20.1

20.17 In an IPv4 packet, the value of HLEN is 1000 in binary. How many bytes of options are being carried by this packet? Solution The HLEN value is 8, which means the total number of bytes in the header is 8 × 4, or 32 bytes. The first 20 bytes are the base header, the next 12 bytes are the options. Example 20.2

20.18 In an IPv4 packet, the value of HLEN is 5, and the value of the total length field is 0x0028. How many bytes of data are being carried by this packet? Solution The HLEN value is 5, which means the total number of bytes in the header is 5 × 4, or 20 bytes (no options). The total length is 40 bytes, which means the packet is carrying 20 bytes of data (40 − 20). Example 20.3

20.19 An IPv4 packet has arrived with the first few hexadecimal digits as shown. 0x How many hops can this packet travel before being dropped? The data belong to what upper-layer protocol? Solution To find the time-to-live field, we skip 8 bytes. The time-to-live field is the ninth byte, which is 01. This means the packet can travel only one hop. The protocol field is the next byte (02), which means that the upper-layer protocol is IGMP. Example 20.4

Fragmentation A IP packet can travel through many different networks using different L2 (Data Link layers). The source node has no idea of the path and data link layer its packets will travel. MTU ◦ Each DL has its own frame format and limitation. ◦ One of such limitation is the maximum size of the frame, which is imposed by software, hardware, performance, and standards

MTUs for some networks 20.21

Fragmentation of IP The source node usually does not fragment the packet. Instead, L4 will segment the data into a size that can fit into L3 and L2 of the source. But, there is a possibility that a packet travel thru a link whose MTU is smaller than one of the source node. ◦ Then, the packet must be fragmented to go forward the next hop. ◦ Each fragment has its own header mostly repeated from the original packet. ◦ A fragmented packet can be further fragmented into even smaller packet. ◦ Fragmented packets will be re-assembled only by the final destination. Why?

Identification ◦ The source host generates the unique ID Flags (3-bits) ◦ Unused bit ◦ DF bit (Don’t Fragment)  1 – force the router not to fragment the packet. If the packet length is greater than the MTU, the router will discard the packet and send an error message to the source ◦ MF bit (More Fragment)  1 – tell the destination whether or not more fragments follow Offset ◦ Unit of 8-byte (why?) ◦ Between the beginning of the packet to be fragmented and the beginning of the fragment Intelligent Router (Switch) uses these fields for efficiency. ◦ PPD (Partial Packet Discard) ◦ EPD (Early Packet Discard) Fields for Fragmentation

Fragmentation example 20.24

Detailed fragmentation example 20.25

20.26 A packet has arrived with an M bit value of 0. Is this the first fragment, the last fragment, or a middle fragment? Do we know if the packet was fragmented? Solution If the M bit is 0, it means that there are no more fragments; the fragment is the last one. However, we cannot say if the original packet was fragmented or not. A non-fragmented packet is considered the last fragment. Example 20.5

20.27 A packet has arrived with an M bit value of 1. Is this the first fragment, the last fragment, or a middle fragment? Do we know if the packet was fragmented? Solution If the M bit is 1, it means that there is at least one more fragment. This fragment can be the first one or a middle one, but not the last one. We don’t know if it is the first one or a middle one; we need more information (the value of the fragmentation offset). Example 20.6

20.28 A packet has arrived with an M bit value of 1 and a fragmentation offset value of 0. Is this the first fragment, the last fragment, or a middle fragment? Solution Because the M bit is 1, it is either the first fragment or a middle one. Because the offset value is 0, it is the first fragment. Example 20.7

20.29 A packet has arrived in which the offset value is 100. What is the number of the first byte? Do we know the number of the last byte? Solution To find the number of the first byte, we multiply the offset value by 8. This means that the first byte number is 800. We cannot determine the number of the last byte unless we know the length. Example 20.8

20.30 A packet has arrived in which the offset value is 100, the value of HLEN is 5, and the value of the total length field is 100. What are the numbers of the first byte and the last byte? Solution The first byte number is 100 × 8 = 800. The total length is 100 bytes, and the header length is 20 bytes (5 × 4), which means that there are 80 bytes in this datagram. If the first byte number is 800, the last byte number must be 879. Example 20.9

20.31 Figure shows an example of a checksum calculation for an IPv4 header without options. The header is divided into 16-bit sections. All the sections are added and the sum is complemented. The result is inserted in the checksum field. Example 20.10

Internet Checksum only for the header, but not for the payload ◦ Each router modifies the IP header, but not the payload. ◦ No special hardware can be used.  Computationally efficient. ◦ The upper layers will check the integrity of the payload by their own schemes. ◦ The detail will be covered later

20.33 Figure Example of checksum calculation in IPv4

IPV6 The network layer protocol in the TCP/IP protocol suite is currently IPv4. Although IPv4 is well designed, data communication has evolved since the inception of IPv4 in the 1970s. IPv4 has some deficiencies that make it unsuitable for the fast-growing Internet

20.35 Figure IPv6 datagram header and payload

20.36 Figure Format of an IPv6 datagram

20.37 Table 20.6 Next header codes for IPv6

20.38 Table 20.7 Priorities for congestion-controlled traffic

20.39 Table 20.8 Priorities for noncongestion-controlled traffic

20.40 Table 20.9 Comparison between IPv4 and IPv6 packet headers

20.41 Figure Extension header types

20.42 Table Comparison between IPv4 options and IPv6 extension headers

TRANSITION FROM IPV4 TO IPV6 Because of the huge number of systems on the Internet, the transition from IPv4 to IPv6 cannot happen suddenly. It takes a considerable amount of time before every system in the Internet can move from IPv4 to IPv6. The transition must be smooth to prevent any problems between IPv4 and IPv6 systems

20.44 Figure Three transition strategies

20.45 Figure Dual stack

20.46 Figure Tunneling strategy

20.47 Figure Header translation strategy

20.48 Table Header translation