Class 4 Internet Protocols

Slides:



Advertisements
Similar presentations
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
Advertisements

Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Internet Control Message Protocol (ICMP)
1 TDC TDC 365 Network Interconnections Technologies Lecture #4 Notes Spring, 2009.
1 Internet Networking Spring 2002 Tutorial 4 ICMP (Internet Control Message Protocol)
CS335 Networking & Network Administration Tuesday, May 11, 2010.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
Internet Command Message Protocol (ICMP) CS-431 Dick Steflik.
1 K. Salah Module 5.3: Internet Control Message Protocol Why need ICMP? IP and ICMP ICMP Message Format ICMP Error Reporting messages ICMP Query messages.
1 Internet Control Message Protocol (ICMP) RIZWAN REHMAN CCS, DU.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
1 Internet Protocol: Forwarding IP Datagrams Chapter 7.
1 Chapter 6 – Internet Protocol: Connectionless Datagram Delivery 6.3 Internet Architecture and Philosophy Chapters are about this layer NETWORK.
Internet Control Message Protocol (ICMP)
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
© 2002, Cisco Systems, Inc. All rights reserved..
CCNA 2 Week 8 TCP/IP Suite Error Control Messages.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
Chapter 23 Internet Control Message Protocol used to report information and errors IP uses ICMP when it sends an error message ICMP uses IP to transport.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
1 Kyung Hee University Chapter 9 ICMP. 2 Kyung Hee University Introduction to Internet Control Message Protocol (ICMP)  IP protocol has no error-reporting.
Internet Protocol: Routing IP Datagrams Chapter 8.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
ICMPv6 Error Message Types Informational Message Types.
1 Connectivity with ARP and RARP. 2 There needs to be a mapping between the layer 2 and layer 3 addresses (i.e. IP to Ethernet). Mapping should be dynamic.
INTERNET CONTROL MESSAGE PROTCOL. ICMP n allows router to send error or control messages to another router or host n provides communication between IP.
Module 8 JEOPARDY CCNA2 v3 Module 8 RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
CCNA 2 Router and Routing Basics Module 8 TCP/IP Suite Error and Control Messages.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
ICMP The IP provides unreliable and connectionless datagram delivery. The IP protocol has no error-reporting or error-correcting mechanism. The IP protocol.
Internet Control Message Protocol (ICMP)
21-2 ICMP(Internet control message protocol)
Recall IPv4 Datagram Format
CCNA 2 v3 JEOPARDY Module 8 CCNA2 v3 Module 8 K. Martin.
Chapter 9 ICMP.
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
Error and Control Messages in the Internet Protocol
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol Version 4 (ICMPv4)
Net 323 D: Networks Protocols
Internet Control Message Protocol
Fred Kuhns Applied Research Laboratory
Presentation transcript:

Class 4 Internet Protocols CSCI 6433 David C. Roberts

A word about the homework

Typical Ethernet Configuration

Hub—Switch Differences What they do What a host sees Setup

Bus Network Topology

Star Network Topology

Star-Bus Network Topology

The Problem

Mixed Network

How the Switch Works

CAM Table Switch has a content-addressable memory (CAM) table with a list of MAC addresses and where to forward the Ethernet frame CAM table is built up by experience, allows selective forwarding instead of broadcast What happens if the CAM table capacity is exceeded?

Agenda Internet Protocol Routing Error and Control Messages

Internet protocol

Internet Services Much of the Internet’s success is due to the robustness and adaptability of this architecture.

Goals for IP Universally addressed—IP defines addressing mechanism for the network and uses these addresses for delivery Independent of underlying protocol—IP is designed to operate over any lower-level protocol that will work with TCP/IP Connectionless—operates without defined connections Unreliable—devices just send each datagram and then go on to the next one, don’t wait to check success No acknowledgement—datagrams are delivered without a “thank you” note

Basic Functions of IP Addressing: mechanism for unique addressing across the entire Internet Data Encapsulation and Packaging: accepts data from the transport layer protocols at a higher level, encapsulates them into an IP datagram, and passes them to the lower level for transmission Fragmentation and reassembly: If the message exceeds maximum frame size, IP fragments it into multiple datagrams, and reassembles them at the destination. If a router along the communication path fragments a datagram, the same reassembly takes place at the destination. Routing: sends a datagram to a distant network using routers

IP Operation

The Bigger Picture

Why Is IP Successful? It’s simple Hardware, software to implement it are simple Simplicity leads to low cost and high performance

IPv4 Datagram

IPv6 Header Format

IPv6 Base Header

Datagram Encapsulation Datagram can be any length. Desirable for datagram to be carried in a single physical frame. Physical network does not know about datagram header. Different physical networks have different frame sizes, so datagrams must sometimes be fragmented into frames. Routers must accept datagrams up to maximum MTU of the networks they connect to.

IPv4 Fragmentation Fragmentation can occur at any router along the path taken by a datagram. Fragment headers are like datagram header, except for flag that shows that it is a fragment.

IPv6 Fragmentation Source host required to find minimum MTU along path to the destination Message is to be sent in datagrams that will fit into minimum MTU on path to the destination Source host uses path MTU discovery (PMTUD) to find the MTU of the path to the destination Fragmented IPv6 datagrams use a Fragment Extension Header

Datagram Reassembly Where are fragments reassembled? At the destination When entering network with high enough MTU Reassembled at destination Avoids refragmentation and reassembly Allows each to be separately routed

IP Forwarding

Hosts and Routers Forward

Direct, Indirect Delivery Transmission of a datagram between two machines on a single physical network Also the final step in indirect delivery Indirect delivery Transmission of a datagram between two machines that are not connected to the same network Sender chooses router, sends datagram to it Router extracts datagram from message, encapsulates it and sends it to another router

Direct Delivery Sender encapsulates the datagram in a physical frame Next-hop address is bound to destination machine’s physical hardware address Resulting frame is sent directly to the destination machine Question: How does the sending machine know whether to use direct delivery?

Indirect Delivery Sending host encapsulates datagram in a frame and sends to the nearest router Router software extracts the encapsulated datagram and IP software selects the next router to receive it (or uses direct delivery) Datagram is placed into a frame and sent over the second physical network to the next router This continues until a router is reached that can use direct delivery

IP Operation

Table-Driven Forwarding Hosts and routers have IP forwarding tables Forwarding table gives “next hop”—where to send a datagram as its next step toward its destination Size of forwarding table is an issue Can’t have information about all possible hosts IP forwarding is done on a network basis Default next hop is used for networks not listed in routing table Host-specific routes are useful for some situations

Next-Hop Forwarding Next-hop forwarding helps to keep forwarding tables small Forwarding tables tend to have nearby networks Forwarding table is a set of pairs (N,R) N is network prefix for an Internet network R is the IP address of the “next hop” router to reach N Each R is a router that is reachable across a single network

Processing Incoming Datagrams Hosts discard datagrams not intended for them; but routers must forward them First, if datagram is for an attached network, then it is sent on the attached network If not, then TTL field is decremented; if it reaches zero, then datagram is discarded Routing table is used to select outgoing network, net hop address Datagram is sent to the next hop IP address

Default Routes IP forwarding software first looks for the destination network in its forward table If not found, then the default next-hop address is used Useful if many networks are reached through a single router

Broadcast and Multicast Forwarding becomes more complex when broadcast and multicast are included These will be covered later

Establishing Forwarding Tables IP forwarding relies on correct information in forwarding tables These must be correct across the entire Internet Their maintenance is a significant job To be discussed later

Summary Routing is the method used to forward IP datagrams Choice of where to send datagram is based on destination network address Routing algorithm chooses next hop for a datagram With few exceptions, routing is based on destination address only

Error and control messages (icmp)

Question Suppose a router can’t contact the next hop router to forward a datagram What should that router do? Should it contact the router that sent it the datagram?

Internet Control Message Protocol Initial purpose of ICMP was to allow routers to report the cause of delivery errors to hosts Any machine can send an ICMP message to any other machine, although some ICMP messages are sent only by routers ICMP is used to report problems to the source of the datagram Router finding an error cannot report the error to other routers that have processed the datagram

Error Reporting, Error Correction ICMP is an error reporting mechanism Error correction is the job of machine receiving the message Source may refer datagram back to the originating application or take other action

ICMP Message Encapsulation ICMP messages are encapsulated inside a datagram, travel the same way as every other datagram. Can ICMP messages be lost? Yes, in the same way as any other datagrams. Question: Can an IP datagram carrying an ICMP message, if it causes an error, cause another IP datagram to be sent with an ICMP message about the first ICMP message?

ICMP Message Types 12 Datagram Parameter Problem 13 Timestamp Request 14 Timestamp Reply 15 Information Request 16 Information Reply 17 Address Mask Request 18 Address Mask Reply 0 Echo Reply 3 Destination Unreachable 4 Source Quench 5 Redirect 8 Echo Request 9 Router Advertisement 10 Router Solicitation 11 Datagram Time Exceeded Obsolete—formerly used by host to find router address, now replaced by RARP and DHCP

ICMPv4 Message Types

ICMPv6 Message Types

Ping Echo Request and Echo Reply Host sends ICMP echo request Recipient sends ICMP echo reply to original sender Verifies that major pieces of transport system are working Host must route the datagram Routers must operate, route the datagram Destination machine must respond, its ICMP, IP software must be working ICMP Echo Request command is often called Ping

Echo Request and Reply Message Format Sender uses IDENTIFIER and SEQ NUMBER to match replies to requests Echo reply sends back the data included in the request ??: When is 8 used and when is 0 used?

Destination Unreachable (3) When router can’t forward or deliver an IP datagram, it sends destination unreachable message back to original source and drops the datagram Destination unreachable message is sent to the source whenever an error prevents router from routing or delivering a datagram. Source will know which address is unreachable, because prefix of datagram is included. Can router detect all errors that can cause datagram failure? No! So some failures will not have destination unreachable messages sent to the originator. CODE field further describes the problem, such as network or host unreachable, destination host or network unknown, fragmentation needed and DF set

Congestion and Flow Control Congestion—router is overrun with traffic. Router enqueues messages that can’t be processed in memory. If high traffic continues, memory can be exhausted. Sources of congestion: Many computers send datagrams through one router High-speed computer sends many datagrams through a router connected to its network Datagrams can be enqueued in memory temporarily If memory is exhausted, then datagrams are discarded and Source Quench messages are sent

Source Quench Source quench is a request for the source to slow rate of datagram transmission. Usually router sends one message for every datagram that is discarded Source can identify the datagram that was lost by using the datagram prefix

Circular Routes Time exceeded message says that hop count has reached zero, or message has timed out on arrival of fragments of a datagram. A routing loop can exist for some destinations. R1 sends to R2, R2 sends to R3, R3 sends to R1, etc. Datagram would travel forever if it was not killed. Hence, hop count is decremented every time a datagram passes a router; when it reaches zero, the packet is discarded. Code is 0 for time-to-live count exceeded, 1 for fragment reassembly time exceeded. Receiving host starts a timeout when the first fragment of a datagram is received, then sends an ICMP time exceeded message is timeout is passed before all fragments have been received.

Parameter Problem Incorrect datagram header prevents delivery, and datagram must be discarded What does POINTER field refer to? The octet in the message that caused the problem. Code 1 says that required option is missing.

Clock Synchronization First machine asks for timestamp, second machine sends current time of day 13 is request, 14 is reply This is a crude approach, depends on estimation of round-trip delay, which can vary. Many measurements can be made, and average taken for the round-trip delay, and used to synchronize clocks. Times in milliseconds since midnight, UT. Originate timestamp at time request was sent; receive is time of receipt of request, transmit time of transmission of reply.

Subnet Mask Subnet address mask specifies which part of IP address contains the network ID and which contains the host ID Subnet is use of part of the hostid as the physical network identification. We will talk about this later! For now, though, mask request and reply (to and from router) ask for subnet mask. Reply—contains network’s subnet address mask. IDENTIFIER, SEQUENCE NUMBER allow a machine to associate replies with requests.

Router Advertisement ICMP provides a method for a host to discover a router address dynamically, when router advertises its addresses; typically sent every ten minutes Host gets its information directly from a router. NUM ADDRS is number of addresses that follow (often 1) ADDR SIZE is size in 32-bit units LIFETIME how long host may use the address (default is 30 minutes, default for periodic retransmission is 10 minutes) Pairs are ROUTER ADDRESS and PREFERENCE LEVEL for the route—host chooses router with highest preference level Other methods are available (BOOTP, DHCP) that depend on database set up by network administrator.

Router Solicitation New host can’t wait 10 minutes to find a router! Solicitation allows host to request immediate advertisement. Message is sent to all-routers multicast (24.0.0.2), if supported. Otherwise, send to limited broadcast address (i.e., all 1’s for hostid). In response, router sends normal router advertisement.

Summary Datagram Delivery (Internet Protocol) Routing ICMP