15-441 Computer Networking Lecture 9 – IP Addressing & Packets.

Slides:



Advertisements
Similar presentations
Discussion Monday ( ). ver length 32 bits data (variable length, typically a TCP or UDP segment) 16-bit identifier header checksum time to live.
Advertisements

1 IPv6. 2 Problem: 32-bit address space will be completely allocated by Solution: Design a new IP with a larger address space, called the IP version.
Computer Networking Lecture 9 – IP Packets, Routers.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
CSE 461: IP/ICMP and the Network Layer. Next Topic  Focus:  How do we build large networks?  Introduction to the Network layer  Internetworks  Service.
CS 356: Computer Network Architectures Lecture 10: IP forwarding
4: Network Layer4a-1 IP Addressing: introduction r IP address: 32-bit identifier for host, router interface r interface: connection between host, router.
8-1 Last time □ Network layer ♦ Introduction forwarding vs. routing ♦ Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding.
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
Winter CMPE 155 Week 8. Winter Router demos: background.
Computer Networking Lecture 8 – IP Addressing and Forwarding.
Chapter 5 The Network Layer.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar 1 ECSE-4670: Computer Communication Networks (CCN) Network Layer Shivkumar.
Computer Networking Lecture 9 – IP Packets.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Introduction to TCP/IP
Computer Networking Lecture 9 – IP Packets.
Computer Networking Lecture 10 – IP Packets, IPv6 & NAT.
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
CS 640: Introduction to Computer Networks
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Lecture 7 – IP Addressing and Forwarding
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
12 – IP, NAT, ICMP, IPv6 Network Layer.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_a
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
© 2002, Cisco Systems, Inc. All rights reserved..
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCOM 515 IP Routing. Syllabus Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static.
Dr. John P. Abraham Professor UTPA
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Computer Networking Lecture 9 – IP Addressing and Forwarding.
1 Network Layer Lecture 15 Imran Ahmed University of Management & Technology.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 7 - IP: Addressing and Forwarding.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Computer Networking Lecture 8 – IP Addressing and Forwarding.
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
CS 640: Introduction to Computer Networks Aditya Akella Lecture 9 - ARP, IP Packets and Routers.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
IP Internet Protocol. IP TCP UDP ICMPIGMP ARP PPP Ethernet.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
Computer Networking Lecture 9 – IP Packets.
Computer Networking Lecture 10 – IP Packets, Routers.
Computer Communication Networks
IP: Addressing, ARP, Routing
CS 457 – Lecture 10 Internetworking and IP
Dr. John P. Abraham Professor UTPA
Internetworking Outline Best Effort Service Model
Wide Area Networks and Internet CT1403
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Dr. John P. Abraham Professor UTPA
Lecture 8 – IP Addressing & Packets
Presentation transcript:

Computer Networking Lecture 9 – IP Addressing & Packets

Outline Review – ARP and switches puzzle CIDR IP addressing Forwarding examples IP Packet Format 2

3 Aside: Interaction with Link Layer How does one find the Ethernet address of a IP host? ARP Broadcast search for IP address E.g., “who-has tell ” sent to Ethernet broadcast (all FF address) Destination responds (only to requester using unicast) with appropriate 48-bit Ethernet address E.g, “reply is-at 0:d0:bc:f2:18:58” sent to 0:c0:4f:d:ed:c6

4 Caching ARP Entries Efficiency Concern Would be very inefficient to use ARP request/reply every time need to send IP message to machine Each Host Maintains Cache of ARP Entries Add entry to cache whenever get ARP response Set timeout of ~20 minutes

5 ARP Cache Example Show using command “arp -a” Interface: on Interface 0x Internet Address Physical Address Type b0-8e-83-df-50 dynamic b0-8e-83-df-50 dynamic b3-8a-35-bf dynamic b-f3-5f-42 dynamic c dynamic a6-ba-2b dynamic e-9b-fd dynamic d0-b7-c5-b3-f3 dynamic a0-c9-98-2c-46 dynamic a6-ba-c3 dynamic a dynamic b0-8e-83-df-50 dynamic

6 Monitoring Packet Traffic Experiment Ran TCPDUMP for 15 minutes connected to CMU network No applications running But many background processes use network Lots of ARP traffic (71% of total) Average 37 ARP requests / second (why all from CS hosts?) Only see responses from own machine (why?) Total Messages

7 Monitoring Packet Traffic Other Traffic Mostly UDP Encode low-level protocols such as bootp Nothing very exciting (why?) Answers for UDP and ARP Total IP Messages On a switched network you only see broadcast traffic or traffic sent to/from you TCP is never sent broadcast

8 ARP Cache Example Show using command “arp -a” Interface: on Interface 0x Internet Address Physical Address Type b0-8e-83-df-50 dynamic b0-8e-83-df-50 dynamic b3-8a-35-bf dynamic b-f3-5f-42 dynamic c dynamic a6-ba-2b dynamic e-9b-fd dynamic d0-b7-c5-b3-f3 dynamic a0-c9-98-2c-46 dynamic a6-ba-c3 dynamic a dynamic b0-8e-83-df-50 dynamic

9 ARP Cache Surprise How come 3 machines have the same MAC address? Interface: on Interface 0x Internet Address Physical Address Type b0-8e-83-df-50 dynamic b0-8e-83-df-50 dynamic b3-8a-35-bf dynamic b-f3-5f-42 dynamic c dynamic a6-ba-2b dynamic e-9b-fd dynamic d0-b7-c5-b3-f3 dynamic a0-c9-98-2c-46 dynamic a6-ba-c3 dynamic a dynamic b0-8e-83-df-50 dynamic

10 CMU’s Internal Network Structure CMU routers kept reasonable tables host LAN 1... router gigrouter.net.cs.cmu.edu host jmac.library.cmu.edu Forwarding Table Entry /23 via , 21:45:05, Vlan255 router hl-vl255.gw.cmu.edu

11 Proxy ARP Provides Link-Layer Connectivity Using IP Routing Local router (gigrouter) sees ARP request Uses IP addressing to locate host Becomes “Proxy” for remote host Using own MAC address Requestor thinks that it is communicating directly with remote host host LAN 1... router gigrouter.net.cs.cmu.edu b0-8e-83-df-50 host jmac.library.cmu.edu

Outline Review – ARP and switches puzzle CIDR IP addressing Forwarding examples IP Packet Format 12

13 IP Address Classes (Some are Obsolete) Network IDHost ID Network IDHost ID 816 Class A 32 0 Class B 10 Class C 110 Multicast Addresses Class D 1110 Reserved for experiments Class E

14 IP Address Utilization (‘97) -- broken

15 IP Address Problem (1991) Address space depletion In danger of running out of classes A and B Why? Class C too small for most domains Very few class A – very careful about giving them out Class B – greatest problem Class B sparsely populated But people refuse to give it back Large forwarding tables 2 Million possible class C groups

16 Classless Inter-Domain Routing (CIDR) – RFC1338 Allows arbitrary split between network & host part of address Do not use classes to determine network ID Use common part of address as network number E.g., addresses have the first 20 bits in common. Thus, we use these 20 bits as the network number  /20 Enables more efficient usage of address space (and router tables)  How? Use single entry for range in forwarding tables Combined forwarding entries when possible

17 Aggregation with CIDR Original Use: Aggregate Class C Addresses One organization assigned contiguous range of class C’s e.g., Microsoft given all addresses X X Specify as CIDR address /18 Represents 2 6 = 64 class C networks Use single entry in routing table Just as if were single network address cf2ec xx xxxxxxxx Decimal Hexadecimal Binary Upper 18 bits frozenLower 14 bits arbitrary

18 CIDR Example Network is allocated 8 class C chunks, to Allocation uses 3 bits of class C space Remaining 20 bits are network number, written as /21 Replaces 8 class C routing entries with 1 combined entry Routing protocols carry prefix with destination network address Longest prefix match for forwarding

19 CIDR Illustration Provider is given / / / / /23 Provider

20 CIDR Implications Longest prefix match!! / / / / /23 or Provider 2 address Provider 1Provider /23

21 Size of Complete Routing Table Source: report.org Shows that CIDR has kept # table entries in check Currently require 124,894 entries for a complete table Only required by backbone routers

22 IP Addresses: How to Get One? Network (network portion): Get allocated portion of ISP’s address space: ISP's block /20 Organization /23 Organization /23 Organization /23... ….. …. …. Organization /23

23 IP Addresses: How to Get One? How does an ISP get block of addresses? From Regional Internet Registries (RIRs) ARIN (North America, Southern Africa), APNIC (Asia-Pacific), RIPE (Europe, Northern Africa), LACNIC (South America) How about a single host? Hard-coded by system admin in a file DHCP: Dynamic Host Configuration Protocol: dynamically get address: “plug-and-play” Host broadcasts “DHCP discover” msg DHCP server responds with “DHCP offer” msg Host requests IP address: “DHCP request” msg DHCP server sends address: “DHCP ack” msg

24 IP Address Utilization (‘06)

25 IP Address Utilization (‘06)

26 IP Address Utilization (late‘10)

27

28

What Now? 29

What Now? Last /8 given to RIR in 1/2011 Mitigation Reclaim addresses (e.g. Stanford gave back class A in 2000) More NAT? Resale markets Slow down allocation from RIRs to LIRs (i.e. ISPs) IPv6? 30

Outline Review – ARP and switches puzzle CIDR IP addressing Forwarding examples IP Packet Format 31

32 Host Routing Table Example From “netstat –rn” Host when plugged into CS ethernet Dest  routing to same machine Dest  other hosts on same ethernet Dest  special loopback address Dest  default route to rest of Internet Main CS router: gigrouter.net.cs.cmu.edu ( ) Destination Gateway Genmask Iface eth eth lo eth0

33 Routing to the Network H2 H3 H4 R / Provider 10.1/ / / /23 R H1 Packet to arrives Path is R2 – R1 – H1 – H2

34 Routing Within the Subnet Routing table at R2 H2 H3 H4 R / / / / /23 R H1 DestinationNext HopInterface lo0 Default or 0/0provider / / / Packet to Matches /

35 Routing Within the Subnet H2 H3 H4 R / / / / /23 R H1 Routing table at R1 DestinationNext HopInterface lo0 Default or 0/ / / / Packet to Matches /31 Longest prefix match /

36 Routing Within the Subnet H2 H3 H4 R / / / / /23 R H1 Routing table at H1 DestinationNext HopInterface lo0 Default or 0/ / / Packet to Direct route Longest prefix match

37 Outline CIDR IP addressing Forwarding examples IP Packet Format

38 IP Service Model Low-level communication model provided by Internet Datagram Each packet self-contained All information needed to get to destination No advance setup or connection maintenance Analogous to letter or telegram versionHLenTOSLength IdentifierFlagOffset TTLProtocolChecksum Source Address Destination Address Options (if any) Data Header IPv4 Packet Format

39 IPv4 Header Fields Version: IP Version 4 for IPv4 HLen: Header Length 32-bit words (typically 5) TOS: Type of Service Priority information Length: Packet Length Bytes (including header) Header format can change with versions First byte identifies version Length field limits packets to 65,535 bytes In practice, break into much smaller packets for network performance considerations ver- sio n HLe n TOSLength Identifier Fl ag s Offset TTLProtocolChecksum Source Address Destination Address Options (if any) Data

40 IPv4 Header Fields Identifier, flags, fragment offset  used primarily for fragmentation Time to live Must be decremented at each router Packets with TTL=0 are thrown away Ensure packets exit the network Protocol Demultiplexing to higher layer protocols TCP = 6, ICMP = 1, UDP = 17… Header checksum Ensures some degree of header integrity Relatively weak – 16 bit Options E.g. Source routing, record route, etc. Performance issues Poorly supported ver- sio n HLe n TOSLength Identifier Fl ag s Offset TTLProtocolChecksum Source Address Destination Address Options (if any) Data

41 IPv4 Header Fields Source Address 32-bit IP address of sender Destination Address 32-bit IP address of destination Like the addresses on an envelope Globally unique identification of sender & receiver ver- sion HLen TOSLength Identifier Fla gs Offset TTLProtocolChecksum Source Address Destination Address Options (if any) Data

42 IP Delivery Model Best effort service Network will do its best to get packet to destination Does NOT guarantee: Any maximum latency or even ultimate success Sender will be informed if packet doesn’t make it Packets will arrive in same order sent Just one copy of packet will arrive Implications Scales very well Higher level protocols must make up for shortcomings Reliably delivering ordered sequence of bytes  TCP Some services not feasible Latency or bandwidth guarantees

43 IP Fragmentation Every network has own Maximum Transmission Unit (MTU) Largest IP datagram it can carry within its own packet frame E.g., Ethernet is 1500 bytes Don’t know MTUs of all intermediate networks in advance IP Solution When hit network with small MTU, fragment packets host router MTU = 4000 MTU = 1500 MTU = 2000

44 Reassembly Where to do reassembly? End nodes or at routers? End nodes Avoids unnecessary work where large packets are fragmented multiple times If any fragment missing, delete entire packet Dangerous to do at intermediate nodes How much buffer space required at routers? What if routes in network change? Multiple paths through network All fragments only required to go through destination

45 Fragmentation Related Fields Length Length of IP fragment Identification To match up with other fragments Flags Don’t fragment flag More fragments flag Fragment offset Where this fragment lies in entire IP datagram Measured in 8 octet units (13 bit field)

46 IP Fragmentation Example #1 host router MTU = 4000 IP Header IP Data Length = 3820, M=0

47 IP Fragmentation Example #2 router MTU = 2000 IP Header IP Data Length = 3820, M= bytes IP Header IP Data Length = 2000, M=1, Offset = bytes IP Data IP Header Length = 1840, M=0, Offset = bytes

48 IP Fragmentation Example #3 IP Header IP Data Length = 2000, M=1, Offset = bytes IP Data IP Header Length = 1840, M=0, Offset = bytes host router MTU = 1500 IP Header IP Data Length = 1500, M=1, Offset = bytes IP Header IP Data Length = 520, M=1, Offset = bytes IP Header IP Data Length = 1500, M=1, Offset = bytes IP Header IP Data Length = 360, M=0, Offset = bytes

49 IP Reassembly Fragments might arrive out-of- order Don’t know how much memory required until receive final fragment Some fragments may be duplicated Keep only one copy Some fragments may never arrive After a while, give up entire process IP Header IP Data Length = 1500, M=1, Offset = 0 IP Header IP Data Length = 520, M=1, Offset = 1480 IP Header IP Data Length = 1500, M=1, Offset = 1980 IP Header IP Data Length = 360, M=0, Offset = 3460 IP Data IP Data IP Data IP Data

50 Fragmentation and Reassembly Concepts Demonstrates many Internet concepts Decentralized Every network can choose MTU Connectionless Each (fragment of) packet contains full routing information Fragments can proceed independently and along different routes Best effort Fail by dropping packet Destination can give up on reassembly No need to signal sender that failure occurred Complex endpoints and simple routers Reassembly at endpoints

51 Fragmentation is Harmful Uses resources poorly Forwarding costs per packet Best if we can send large chunks of data Worst case: packet just bigger than MTU Poor end-to-end performance Loss of a fragment Path MTU discovery protocol  determines minimum MTU along route Uses ICMP error messages Common theme in system design Assure correctness by implementing complete protocol Optimize common cases to avoid full complexity

52 Internet Control Message Protocol (ICMP) Short messages used to send error & other control information Examples Ping request / response Can use to check whether remote host reachable Destination unreachable Indicates how packet got & why couldn’t go further Flow control Slow down packet delivery rate Redirect Suggest alternate routing path for future messages Router solicitation / advertisement Helps newly connected host discover local router Timeout Packet exceeded maximum hop limit

53 IP MTU Discovery with ICMP Typically send series of packets from one host to another Typically, all will follow same route Routes remain stable for minutes at a time Makes sense to determine path MTU before sending real packets Operation Send max-sized packet with “do not fragment” flag set If encounters problem, ICMP message will be returned “Destination unreachable: Fragmentation needed” Usually indicates MTU encountered host router MTU = 4000 MTU = 1500 MTU = 2000

54 MTU = 4000 IP MTU Discovery with ICMP host router MTU = 1500 MTU = 2000 IP Packet Length = 4000, Don’t Fragment router ICMP Frag. Needed MTU = 2000

55 MTU = 4000 IP MTU Discovery with ICMP host MTU = 1500 MTU = 2000 IP Packet Length = 2000, Don’t Fragment router ICMP Frag. Needed MTU = 1500 router

56 MTU = 4000 IP MTU Discovery with ICMP When successful, no reply at IP level “No news is good news” Higher level protocol might have some form of acknowledgement host MTU = 1500 MTU = 2000 IP Packet Length = 1500, Don’t Fragment router

57 Important Concepts Base-level protocol (IP) provides minimal service level Allows highly decentralized implementation Each step involves determining next hop Most of the work at the endpoints ICMP provides low-level error reporting IP forwarding  global addressing, alternatives, lookup tables IP addressing  hierarchical, CIDR IP service  best effort, simplicity of routers IP packets  header fields, fragmentation, ICMP

58 Next Lecture How do forwarding tables get built? Routing protocols Distance vector routing Link state routing

EXTRA SLIDES

60 Some Special IP Addresses : local host (a.k.a. the loopback address Host bits all set to 0: network address Host bits all set to 1: broadcast address

61 Finding a Local Machine Routing Gets Packet to Correct Local Network Based on IP address Router sees that destination address is of local machine Still Need to Get Packet to Host Using link-layer protocol Need to know hardware address Same Issue for Any Local Communication Find local machine, given its IP address host LAN 1... router WAN Destination =

62 Address Resolution Protocol (ARP) Diagrammed for Ethernet (6-byte MAC addresses) Low-Level Protocol Operates only within local network Determines mapping from IP address to hardware (MAC) address Mapping determined dynamically No need to statically configure tables Only requirement is that each host know its own IP address op Sender MAC address Sender IP Address Target MAC address Target IP Address op: Operation 1: request 2: reply Sender Host sending ARP message Target Intended receiver of message

63 ARP Request Requestor Fills in own IP and MAC address as “sender” Why include its MAC address? Mapping Fills desired host IP address in target IP address Sending Send to MAC address ff:ff:ff:ff:ff:ff Ethernet broadcast op Sender MAC address Sender IP Address Target MAC address Target IP Address op: Operation 1: request Sender Host that wants to determine MAC address of another machine Target Other machine

64 ARP Reply Responder becomes “sender” Fill in own IP and MAC address Set requestor as target Send to requestor’s MAC address op Sender MAC address Sender IP Address Target MAC address Target IP Address op: Operation 2: reply Sender Host with desired IP address Target Original requestor

65 ARP Example Exchange Captured with windump Windows version of tcpdump Requestor: blackhole-ad.scs.cs.cmu.edu ( ) MAC address 0:2:b3:8a:35:bf Desired host: bryant-tp2.vlsi.cs.cmu.edu ( ) MAC address 0:3:47:b8:e5:f3 TimeSource MACDest MAC 09:37: :2:b3:8a:35:bf ff:ff:ff:ff:ff:ff : arp who-has tell :37: :3:47:b8:e5:f3 0:2:b3:8a:35:bf : arp reply is-at 0:3:47:b8:e5:f3

Now for some really bad jokes… I tried to come up with an IPv4 joke, but the good ones were all already exhausted. The sad thing about IPv6 jokes is that almost no one understands them and no one is using them yet. WHO HAS any ARP jokes? Fragmentation jokes...are always…...told in parts. An IPv4 address space walks in to a bar, "A strong CIDR please. I'm exhausted. 66