Fall, 2001CS 6401 Switching, Internet Protocol Outline Quiz 2 Solution Crossbar switch design Knockout switch design Introduction to Internet Protocol.

Slides:



Advertisements
Similar presentations
IPv4 - The Internet Protocol Version 4
Advertisements

CSE 461: IP/ICMP and the Network Layer. Next Topic  Focus:  How do we build large networks?  Introduction to the Network layer  Internetworks  Service.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Internet Control Message Protocol (ICMP)
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
1 Internet Networking Spring 2002 Tutorial 4 ICMP (Internet Control Message Protocol)
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
1 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
Spring 2003CS 4611 Internetworking COS 461 Spring 2003.
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
1 ELEN Lecture 13 LAN Bridges Routers, Switches, Gateways Network layer -IP Reading: 6.7,
Spring 2002CS 4611 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
Internet Command Message Protocol (ICMP) CS-431 Dick Steflik.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Chapter 4 Queuing, Datagrams, and Addressing
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
26-Aug-154/598N: Computer Networks Recap SBC UUNET Comcast Sprint End Users Internet First mile problem Last mile problem.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
ICMP : Internet Control Message Protocol. Introduction ICMP is often considered part of the IP layer. It communicates error messages and other conditions.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
1 Introduction to Computer Networks University of Ilam By: Dr. Mozafar Bag-Mohammadi Internetworking.
Fall 2010CMSC 1501 Internetworking. Fall 2010CMSC 1502 Assumptions Data pipe from every machine to every other machine. –Need not be single link (and.
A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008.
IP Forwarding.
CS 6401 Internetworking Outline Internet Architecture Best Effort Service Model.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
Spring 2010CS 3321 Chapter 4: Internetworking. Spring 2010CS 3322 Assumptions Data pipe from every machine to every other machine. –Need not be single.
CS 4396 Computer Networks Lab
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
ICMPv6 Error Message Types Informational Message Types.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
CSS432 Basic Internetworking Textbook Ch3.2
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
1 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
Packet Switch Network Server client IP Ether IPTCPData.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
Error and Control Messages in the Internet Protocol
Advanced Computer Networks
Internetworking Outline Best Effort Service Model
Router Construction Outline Switched Fabrics IP Routers
Net 323 D: Networks Protocols
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
Introduction to Computer Networks
Advanced Computer Networks
Networking and Network Protocols (Part2)
ITIS 6167/8167: Network and Information Security
Internet Control Message Protocol
Fred Kuhns Applied Research Laboratory
NET 323D: Networks Protocols
32 bit destination IP address
Presentation transcript:

Fall, 2001CS 6401 Switching, Internet Protocol Outline Quiz 2 Solution Crossbar switch design Knockout switch design Introduction to Internet Protocol PROJECT #2 DUE THURSDAY!!

Fall, 2001CS 6402 Quiz 2 Solution C D ABEF a) 6 b) Routing table for A MBCDEF {A}2 B5 C10 DInf {A,B}2 B5 C9 B-DInf {A.B.C}2 B5 C9 B-D6 C-EInf {A.B.C.D}2 B5 C9 B-D6 C-E10 C-E-F {A.B.C.D.E}2 B5 C9 B-D6 C-E10 C-E-F {A.B.C.D.E.F}2 B5 C9 B-D6 C-E10 C-E-F c) Fast, loop free convergence

Fall, 2001CS 6403 Switching Hardware Design Goals –throughput (depends on traffic model) –scalability (a function of n) Ports –circuit management (e.g., map VCIs, route datagrams) –buffering (input and/or output) Fabric –as simple as possible –sometimes do buffering (internal) –Dealing with contention is an issue Input port Input port Input port Input port Output port Output port Output port Output port Fabric

Fall, 2001CS 6404 Crossbar Switches Basic idea – connect every input n to every output –Simple design –Not generally scalable complexity grows at n 2 rate –Output port contention is an issue Head-of-the-line blocking when multiple input ports are sending to one output port

Fall, 2001CS 6405 Knockout Switch Knockout switch is a design for an output port which deals with contention on n outputs –Reduces complexity – almost a crossbar –Accepts l packets simultaneously where l < n –Design minimizes cost for typical traffic flows Three components –Packet filters recognize packet destinations Achieved by matching HW which considers port number –Concentrator selects up to l packets for a port Drops the other packets This is the hard part due to need for fairness Our focus –Queue buffers up to l packets at a time Simple FIFO queue

Fall, 2001CS 6406 The Concentrator The task of the concentrator is to fairly choose l out of n packets destined for a single output port. –Consider n = 8, l = 4 –Pair up packet and flip a coin to choose who “wins” and goes on to the next stage. –Each stage pairs “loosers” and “winners” in feedback format. –4 packets will be dropped at the last stage –All “winners” emerge at the same time – using delay elements

Fall, 2001CS 6407 Knockout Switch Concentrator D = delay elements to insure all packets exit at same time

Fall, 2001CS 6408 Output buffer of Knockout switch You could implement a FIFO that runs l times faster than the output of the concentrator –Since each cycle generates l packets A more efficient approach is to implement an array of l buffers preceded by a shifter –Shifter insures buffers are filled in round robin order Insures that buffers never differ by more than one packet in their level of occupancy –Packets are read out one at a time in round robin order Insures packet order is preserved There can be buffer overflow when number of packets arriving in each cycle is more than one for a period of time

Fall, 2001CS 6409 Knockout Switch Output Buffer (c) Shifter Buffers (b) Shifter Buffers (a) Shifter Buffers Three packets arrive Three more packets arrive and are shifted right by three positions. First packet leaves One packets arrives and is Shifted right by two positions. Second packet leaves

Fall, 2001CS Internet Protocol Runs on all hosts in the Internet and enables packets to be routed between systems –Key protocol for building networks –Kahn-Cerf Datagram delivery of packets –Connectionless and based on routing protocols Well defined packet format Global addressing –Means for identifying Internet hosts Fragmentation and reassembly –Since packets can be of varying size Error reporting

Fall, 2001CS An IP Internet – Network of Networks R2 R1 H4 H5 H3H2H1 Network 1 (Ethernet) H6 Network 3 (FDDI) Network 4 (point-to-point) H7R3H8 Network 2 (Ethernet)

Fall, 2001CS Protocol Stack – IP is Common to All R1 ETH FDDI IP ETH TCP R2 FDDI PPP IP R3 PPP ETH IP H1 IP ETH TCP H8

Fall, 2001CS Service Model Connectionless (datagram-based) Best-effort delivery (unreliable service) –packets are lost –packets are delivered out of order –duplicate copies of a packet are delivered –packets can be delayed for a long time Datagram format VersionHLen TOSLength IdentFlagsOffset TTLProtocolChecksum SourceAddr DestinationAddr Options (variable) Pad (variable) Data

Fall, 2001CS IPv4 Header Format VersionHLen TOSLength IdentFlagsOffset TTLProtocolChecksum SourceAddr DestinationAddr Options (variable) Pad (variable) Data

Fall, 2001CS Fragmentation and Reassembly Each network has some Maximum Transmission Unit (MTU) –Largest datagram that a network can carry in a frame Strategy –fragment when necessary (MTU < Datagram) –try to avoid fragmentation at source host Due to overhead of reassembly –re-fragmentation is possible –fragments are self-contained datagrams –delay reassembly until destination host Keep this functionality out of the network –do not recover from lost fragments End hosts try to reassemble fragmented packets –if a fragment is lost… End hosts are encouraged to do MTU discovery

Fall, 2001CS Example

Fall, 2001CS Ident = xOffset = 0 Start of header 0 Rest of header 1400 data bytes Ident = xOffset = 0 Start of header 1 Rest of header 512 data bytes Ident = xOffset = 512 Start of header 1 Rest of header 512 data bytes Ident = xOffset = 1024 Start of header 0 Rest of header 376 data bytes

Fall, 2001CS IPv4 Global Addresses Properties –globally unique –hierarchical: network + host Dot Notation – – – AS’s refer to a network type (assigned address range) NetworkHost A: NetworkHost B: NetworkHost C:

Fall, 2001CS Datagram Forwarding Every datagram contains destination’s address The “network part” of an IP address uniquely identifies a single physical network (AS) If directly connected to destination network, then forward to host If not directly connected to destination network, then forward to some router Forwarding table maps network number into next hop –Mapping is based on routing algorithm Each host has a default router Each router maintains a forwarding table

Fall, 2001CS Internet Control Message Protocol (ICMP) Echo (ping) Redirect (from router to source host) Destination unreachable (protocol, port, or host) TTL exceeded (so datagrams don’t cycle forever) Checksum failed Reassembly failed Cannot fragment

Fall, 2001CS ICMP Uses IP but is a separate protocol in the network layer ICMP HEADER IP HEADER PROTOCOL = 1 TYPE CODE CHECKSUM REMAINDER OF ICMP MESSAGE (FORMAT IS TYPE SPECIFIC) IP HEADER IP DATA

Fall, 2001CS Echo and Echo Reply TYPE CODE CHECKSUM IDENTIFIER SEQUENCE # DATA …. TYPE: 8 = ECHO, 0 = ECHO REPLY CODE; CODE = 0 IDENTIFIER An identifier to aid in matching echoes and replies SEQUENCE # Same use as for IDENTIFIER UNIX “ping” uses echo/echo reply

Fall, 2001CS Ping Example C:\WINDOWS\Desktop>ping Pinging asari.soi.wide.ad.jp [ ] with 32 bytes of data: Reply from : bytes=32 time=253ms TTL=240 Reply from : bytes=32 time=231ms TTL=240 Reply from : bytes=32 time=225ms TTL=240 Reply from : bytes=32 time=214ms TTL=240 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 214ms, Maximum = 253ms, Average = 230ms

Fall, 2001CS Redirect when no route to Destination TYPE CODE CHECKSUM NEW ROUTER ADDRESS IP HEADER + 64 bits data from original DG TYPE = 5 CODE = 0 = Network redirect 1 = Host redirect 2 = Network redirect for specific TOS 3 = Host redirect for specific TOS

Fall, 2001CS Destination Unreachable TYPE CODE CHECKSUM UNUSED IP HEADER + 64 bits data from original DG TYPE = 3 CODE 0 = Net unreachable 1 = Host unreachable 2= Protocol unreachable 3 = Port unreachable 4 = Fragmentation needed but DF set 5 = Source route failed

Fall, 2001CS Time Exceeded TYPE CODE CHECKSUM UNUSED IP HEADER + 64 bits data from original DG TYPE = 11 CODE 0 = Time to live exceeded in transit 1 = Fragment reassembly time exceeded

Fall, 2001CS Source Quench TYPE CODE CHECKSUM UNUSED IP HEADER + 64 bits data from original DG TYPE = 4; CODE = 0 Indicates that a router has dropped the original DG or may indicate that a router is approaching its capacity limit. Correct behavior for source host is not defined.

Fall, 2001CS Traceroute UNIX utility - displays router used to get to a specified Internet Host Operation –router sends ICMP Time Exceeded message to source if TTL is decremented to 0 –if TTL starts at 5, source host will receive Time Exceeded message from router that is 5 hopes away Traceroute sends a series of probes with different TTL values… and records the source address of the ICMP Time Exceeded message for each Probes are formatted to that the destination host will send an ICMP Port Unreachable message

Fall, 2001CS TraceRoute Example C:\windows\desktop> tracert Tracing route to asari.soi.wide.ad.jp [ ] over a maximum of 30 hops: 1 19 ms 27 ms 23 ms ms 13 ms 14 ms ms 29 ms 29 ms aar1-serial Minneapolismpn.cw.net [ ] 4 24 ms 27 ms 24 ms acr1.Minneapolismpn.cw.net [ ] 5 26 ms 22 ms 23 ms acr2-loopback.Chicagochd.cw.net [ ] 6 29 ms 29 ms 27 ms cand-w-private-peering.Chicagochd.cw.net [ ] 7 28 ms 24 ms 28 ms 0.so XL2.CHI2.ALTER.NET [ ] 8 26 ms 27 ms 28 ms 0.so XR2.CHI2.ALTER.NET [ ] 9 25 ms 24 ms 26 ms 292.at TR2.CHI4.ALTER.NET [ ] ms 74 ms 73 ms 106.ATM7-0.TR2.LAX2.ALTER.NET [ ] ms 76 ms 76 ms 198.ATM7-0.XR2.LAX4.ALTER.NET [ ] ms 75 ms 77 ms 192.ATM5-0.GW9.LAX4.ALTER.NET [ ] ms 73 ms 76 ms kdd-gw.customer.ALTER.NET [ ] ms 84 ms 91 ms ms 81 ms 86 ms cisco1-eth-2-0.LosAngeles.wide.ad.jp [ ] ms 174 ms 178 ms cisco5.otemachi.wide.ad.jp [ ] ms 196 ms 194 ms cisco2.otemachi.wide.ad.jp [ ] ms 182 ms 196 ms foundry2.otemachi.wide.ad.jp [ ] ms 185 ms 178 ms gsr1.fujisawa.wide.ad.jp [ ] ms 205 ms 201 ms asari.soi.wide.ad.jp [ ] Trace complete.