1 Introduction to Computer Networks University of Ilam By: Dr. Mozafar Bag-Mohammadi Internetworking.

Slides:



Advertisements
Similar presentations
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv4 - The Internet Protocol Version 4
CSE 461: IP/ICMP and the Network Layer. Next Topic  Focus:  How do we build large networks?  Introduction to the Network layer  Internetworks  Service.
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
1 Switching and Forwarding Bridges and Extended LANs.
1 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
Spring 2003CS 4611 Internetworking COS 461 Spring 2003.
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
1 ELEN Lecture 13 LAN Bridges Routers, Switches, Gateways Network layer -IP Reading: 6.7,
Spring 2002CS 4611 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
1 Switching and Forwarding Bridges and Extended LANs.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
IP Routing, Format, Fragmentation Chapters 20-21, 23.
26-Aug-154/598N: Computer Networks Recap SBC UUNET Comcast Sprint End Users Internet First mile problem Last mile problem.
29-Aug-154/598N: Computer Networks Switching and Forwarding Outline –Store-and-Forward Switches.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_a
Fall 2010CMSC 1501 Internetworking. Fall 2010CMSC 1502 Assumptions Data pipe from every machine to every other machine. –Need not be single link (and.
A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008.
CS 6401 Internetworking Outline Internet Architecture Best Effort Service Model.
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals.
1 IP : Internet Protocol Computer Network System Sirak Kaewjamnong.
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
Dr. John P. Abraham Professor UTPA
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
CSS432: Internetworking 1 CSS432 Internetworking Textbook Ch4.1 Professor: Munehiro Fukuda Augmented by Rob Nash.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
Fall, 2001CS 6401 Switching, Internet Protocol Outline Quiz 2 Solution Crossbar switch design Knockout switch design Introduction to Internet Protocol.
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
Spring 2010CS 3321 Chapter 4: Internetworking. Spring 2010CS 3322 Assumptions Data pipe from every machine to every other machine. –Need not be single.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
1 Introduction to Computer Networks University of Ilam By: Dr. Mozafar Bag-Mohammadi Internetworking.
Univ. of TehranComputer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr. Nasser Yazdani.
1 Chapter 4: Internetworking (Introduction) Dr. Rocky K. C. Chang 16 March 2004.
1 Chapter 4: Internetworking (Internet Protocol) Dr. Rocky K. C. Chang 16 March 2004.
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
CSS432 Basic Internetworking Textbook Ch3.2
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
Basics of Computer Networks (cont.) CprE 592-YG Computer and Network Forensics Yong Guan 3216 Coover Tel: (515)
1 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
Packet Switch Network Server client IP Ether IPTCPData.
2002 년 2 학기인터넷통신망 년 2 학기. 인터넷통신망 2 Acknowledgement Some figures and texts are from: –Govindan –Kurose –Peterson & Davie –Huitema –Halabi –Retana,
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fall, 2001CS 6401 Switching and Routing Outline Routing overview Store-and-Forward switches Virtual circuits vs. Datagram switching.
Scaling the Network: The Internet Protocol
Packet Switching Outline Store-and-Forward Switches
Switching and Forwarding Bridges and Extended LANs
IP - The Internet Protocol
Advanced Computer Networks
Internetworking Outline Best Effort Service Model
Chapter 20 Network Layer: Internet Protocol
2. Fragmentation and Reassembly
Net 323 D: Networks Protocols
Introduction to Computer Networks
Scaling the Network: The Internet Protocol
Packet Switching Outline Store-and-Forward Switches
ITIS 6167/8167: Network and Information Security
Presentation transcript:

1 Introduction to Computer Networks University of Ilam By: Dr. Mozafar Bag-Mohammadi Internetworking

2 Communication between networks. Problems:  Different Networking technologies (Heterogeneity).  So many Networks (Scaling). Some terminologies:  “internetworking” refer to an arbitrary collection of connected networks.  “Internet” the global internetwork.  “Network” either directly connected or switched network using any LAN technology such as Ethernet, Token ring, ATM, etc.

3 IP Internet Concatenation of Networks or “networks of Networks”. “R” is routers and “H” is hosts. R2 R1 H4 H5 H3 H2 H1 Network 2 (Ethernet) Network 1 (Ethernet) H6 Network 3 (FDDI) Network 4 ( point-to-point) H7R3H8

4 IP Internet (cont) Protocol Stack Everything is running on top IP R1 ETH FDDI IP ETH TCP R2 FDDI PPP IP R3 PPP ETH IP H1 IP ETH TCP H8

5 Source Routing All routing information is provided by the source. The address can be implemented by a linked list in the packet header.

6 Networking Technologies Circuit Based Packet Based Virtual CircuitsConnectionless TDM Telephony SONET/SDH Frame Relay ATM IP X.25 CLNP (ISO) SNA (IBM) Appletalk IPX (Novell) DWDM Connection Oriented (variable rate, store-and-forward) (constant rate)

7 Virtual Circuit Switching Problems with source routing:  The source must know the whole topology of network.  The number of switches (header) is variable. 2 nd solution: use the telephone model or virtual circuits.  Explicit connection setup (and tear-down) phase. This is called signaling.  Each flow is identified by a Virtual Circuits Identifier (VCI).  Switch needs to maintains a VC table.

8 Virtual Circuit Switching (cont) Subsequence packets follow the same circuit Sometimes called connection-oriented model. VCIs is swapped in the switches. Example: Lookup table Switch 3 Host B Switch 2 Host A Switch 1 In-portIn-VCIOut-portOut-VCI

9 Virtual Circuit Model Typically wait full RTT for connection setup before sending first data packet. While the connection request contains the full address for destination, each data packet contains only a small identifier, making the per- packet header overhead small. If a switch or a link on the path fails, the connection is broken and a new one needs to be established. Connection setup provides an opportunity to reserve resources.

10 Datagram Switching No connection setup phase since it is costly. Each packet forwarded independently Sometimes called connectionless model Switch 3 Host B Switch 2 Host A Switch 1 Host C Host D Host E Host F Host G Host H Analogy: postal system Each switch maintains a forwarding (routing) table

11 Datagram Model There is no round trip time delay waiting for connection setup; a host can send data as soon as it is ready. Source host has no way of knowing if the network is capable of delivering a packet or if the destination host is even up. Since packets are treated independently, it is possible to route around link and node failures. Since every packet must carry the full address of the destination, the overhead per packet is higher.

12 Connection Oriented vs. Connectionless Connection Oriented Connectionless Best-effort delivery (Send and Pray) packets are lost. No recover from lost. packets are delivered out of order duplicate copies of a packet are delivered packets can be delayed for a long time Connection set up. Signaling reserves resources along the end-to-end path Traffic flows Connection torn down and resources freed

13 Encapsulation Example Ethernet Header IP Header TCP Header HTTP Header …. HTTP Data …. An Ethernet segment transmitting HTTP data.

14 IP Headers  The current Version is 4 or IPv4.  HLen- the Header Length: from 5-15 in 32-bit words.  Length- the total length of the packet including headers. Max length is 64K. VersionHLen TOSLength IdentFlagsOffset TTLProtocolChecksum SourceAddr DestinationAddr Options (variable) Pad (variable) Data

15 Packet Headers  TTL: Time To Live is expressed in second. It is to prevent packet from permanently circulating in a loop.  Protocol: specify the packet application ex. 1 for ICMP. It is for demultiplexing to higher layer protocols.  Checksum: is a 1-complement error checksum for the header only.

16 Packet Headers (Cont) TOS: type of Service  Precedence Specify the priority  Type of Services Specify routing, for instance cheapest, fastest and more reliable D for Delay T for Throughput R for Reliability C for low cost. Note: Precedence is only for inside channel queuing. 0 2 | 3 7 Precedence Type of service DTRC

17 Packet Headers (Cont) Options If C set, the option will copied to all fragments. Otherwise, only to the first one.  Class 0 for control  Class 2 for debugging and measurement. Options are rarely used in today except for ‘loose’ and ‘strict’ source routing parameters. ‘loose’ and ‘strict’ source option sometimes, is used for IP encapsulation in another IP or “Tunneling” CClassNumber

18 Fragmentation and Reassembly 0 7|0 7|0 4 7|0 7 IdentificationFlagsFragment Offset 012 0DFMF  Flags  DF: Don’t Fragment  MF: More Fragment coming In fragmentation, IP copy the original header and only modify The length, which is the new length, and offset. Offset is used for reassembly.  Note: Fragmentation may degrade the network performance.  TCP implement “Path MTU discovery”. It start with large packet and with DF set flag, if it passed, TCP keeps the same packet size, otherwise, it reduces it.

19 Fragmentation and Reassembly (cont) Each network has a Maximum Transfer Unit size, MTU Strategy  fragment when necessary (MTU < Datagram)  try to avoid fragmentation at source host  re-fragmentation is possible  fragments are self-contained datagrams  delay reassembly until destination host  do not recover from lost fragments

20 Example Packet delivery from host H1 to host H8 H1R1R2R3H8 ETHIP(1400)FDDIIP(1400)PPPIP(512) PPPIP(376) PPPIP(512) ETHIP(512) ETHIP(376) ETHIP(512)

21 Example (cont) Ident = xOffset = 0 Start of header 0 Rest of header 1400 data bytes Ident = xOffset = 0 Start of header 1 Rest of header 512 data bytes Ident = x Offset = 512 Start of header 1 Rest of header 512 data bytes Ident = xOffset = 1024 Start of header 0 Rest of header 376 data bytes The packets are fragmented as:

22 Addressing Each host in the network is identified by an address having the following property.  globally unique  hierarchical: network + host Network Number Host Number

23 IPv4 Implementation of Addresses Thirty Two Bits: Dotted Quad notation for “human readability”

24 Classful Addresses 0nnnnnnn 10nnnnnnnnnnnnnn 110nnnnn hhhhhhhh n = network address bit h = host identifier bit Class A Class C Class B

25 The Classful Address Space Leads to very inefficient allocation of addresses …

26 IP Addresses Example: Class “A” addresswww.mit.edu (18 Class A) Class “B” addressmekong.stanford.edu (128 Class B)

27 Classless Addressing CIDR ABCD / /19 65/8 Classless: Class-based:

28 Classless Addressing CIDR / / / / /24 Most specific route = “longest matching prefix”

29 Forwarding Datagrams “Network ID” uniquely identifies a physical network.  All hosts and routers sharing a Network ID share same physical network. Every datagram contains a destination address. Is the datagram for a host on directly attached network?  If no, consult forwarding table to find next-hop.  If only one next-hop, can use default routing.

30 Forwarding Datagrams 128.9/ / / / / /19 65/8 PrefixPort Next-hop R1 R2 R3 R e.g => Port

31 Default Routing R1 R2R3R4R5 Default Routing Requires Routing Table Default Routing

32 Inside a Router Forwarding Decision Forwarding Decision Forwarding Decision Forwarding Table Forwarding Table Forwarding Table Interconnect Output Scheduling

33 IP Forwarding Process Forwarding Process IP Forwarding Table Router 1. Remove a packet from an input queue 3. Match packet’s destination to a table entry 2. Check for sanity, decrement TTL field 4. Place packet on correct output queue If queues get full, just drop packets! If queues get full, just drop packets!

34 Address Translation Map IP addresses into physical addresses  destination host  next hop router ARP  table of IP to physical address bindings  broadcast request if IP address not in table  target machine responds with its physical address  table entries are discarded if not refreshed

35 ARP Details Request Format  HardwareType: type of physical network (e.g., Ethernet)  ProtocolType: type of higher layer protocol (e.g., IP)  HLEN & PLEN: length of physical and protocol addresses  Operation: request or response  Source/Target-Physical/Protocol addresses Notes  table entries timeout in about 10 minutes  update table with source when you are the target  update table if already have an entry  do not refresh table entries upon reference

36 ARP Packet Format TargetHardwareAddr (bytes 2–5) TargetProtocolAddr (bytes 0–3) SourceProtocolAddr (bytes 2–3) Hardware type = 1ProtocolType = 0x0800 SourceHardwareAddr (bytes 4–5) TargetHardwareAddr (bytes 0–1) SourceProtocolAddr (bytes 0–1) HLen = 48PLen = 32Operation SourceHardwareAddr (bytes 0–3)

37 Internet Control Message Protocol (ICMP) Echo (ping) Redirect (from router to source host) Destination unreachable (protocol, port, or host) TTL exceeded (so datagrams don’t cycle forever) Checksum failed Reassembly failed Cannot fragment