Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 1 routing at the network layer, related topics 1. IP addressing,

Slides:



Advertisements
Similar presentations
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Advertisements

CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv4 - The Internet Protocol Version 4
Fundamentals of Computer Networks ECE 478/578 Lecture #14: InternetWorking Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
CSE 461: IP/ICMP and the Network Layer. Next Topic  Focus:  How do we build large networks?  Introduction to the Network layer  Internetworks  Service.
1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
1 EE 122: Designing IP Ion Stoica TAs: Junda Liu, DK Moon, David Zats (Materials with thanks to Vern Paxson, Jennifer.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
Network Layer Packet Forwarding IS250 Spring 2010
IP Suite© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science Department.
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Chapter 5 The Network Layer.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
1 Internet Control Protocols Reading: Section 4.1 COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching Assistant:
Link-State Routing Reading: Sections 4.2 and COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in COS 105) Michael Freedman
Chapter 4 Queuing, Datagrams, and Addressing
Network Layer Moving datagrams. How do it know? Tom-Tom.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University.
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Router Architecture Overview
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Dr. John P. Abraham Professor UTPA
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
CS 4396 Computer Networks Lab
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Lecture 8: Internet Control Protocols Reading: Section 4.1 ? CMSC 23300/33300 Computer Networks
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
COMPUTER NETWORKS CS610 Lecture-30 Hammad Khalid Khan.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Introduction to Networks
CS4470 Computer Networking Protocols
CS 457 – Lecture 10 Internetworking and IP
What’s “Inside” a Router?
ECE 4450:427/527 - Computer Networks Spring 2017
IP - The Internet Protocol
Internetworking Outline Best Effort Service Model
Network Core and QoS.
Network Layer Mike Freedman COS 461: Computer Networks
IP - The Internet Protocol
Net 323 D: Networks Protocols
COS 461: Computer Networks
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
IP - The Internet Protocol
Network Layer: Control/data plane, addressing, routers
Introduction to Networks
ITIS 6167/8167: Network and Information Security
IP - The Internet Protocol
Network Core and QoS.
Presentation transcript:

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 1 routing at the network layer, related topics 1. IP addressing, masking, and IP packet format 2. DNS, ARP, RARP, DHCP, and ICMP 3. support for VPNs & tunnels 4. routing over internets - intradomain ( e.g., DV, OSPF ) - interdomain ( e.g., BGP ) Chapter 4: internetworking

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 2 summary: packet switching review efficient  can send from any input that is ready general  multiple types of applications accommodates bursty traffic  addition of queues store and forward  packets are self contained units  can use alternate paths – reordering contention (i.e., no isolation)  congestion  delay

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 3 internetwork (Internet) network of networks network: “physical” network “logical” network: interconnected physical networks “router”: boundary node

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 4 a simple internetwork

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 5 Internet Protocol (IP) example system –best known –largest (scale) –still, only an example (versions, “alt- IP”) service model (host-to-host) –global address scheme –“best effort” delivery (“unreliable”) loss, disorder, redundancy

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 6 IP packet format basic header: 20B 32b “words” frag/defrag word demux for header

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 7 IP packet header fields version number (4 bits)  indicates the version of the ip protocol  necessary to know what other fields to expect  typically “4” (for IPv4), and sometimes “6” (for IPv6) header length (4 bits)  number of 32-bit words in the header  typically “5” (for a 20-byte IPv4 header)  can be more when “IP options” are used type-of-service (8 bits)  allow packets to be treated differently based on needs  e.g., low delay for audio, high bandwidth for bulk transfer

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 8 IP Packet header fields (continued) total length (16 bits)  number of bytes in the packet  maximum size is 63,535 bytes ( )  … though underlying links may impose harder limits fragmentation information (32 bits)  packet identifier, flags, and fragment offset  supports dividing a large IP packet into fragments  … in case a link cannot handle a large IP packet Time-To-Live (TTL) (8 bits)  used to identify packets stuck in forwarding loops  … and eventually discard them from the network

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 9 fragmentation & reassembly of IP packets max txn unit (MTU) each frag is also a datagram example: PPP 532B max payload * * not reassembled here...

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 10 IP header (a) Ident = x Start of header Rest of header 1400 data bytes Offset = 00 (b) Ident = x Start of header Rest of header 512 data bytes Offset = 01 Ident = x Rest of header 512 data bytes Offset = 641 Start of header Ident = x Start of header Rest of header 376 data bytes Offset = 1280 offset of data only count by 8B

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 11 time-to-live (TTL) field potential robustness problem  forwarding loops can cause packets to cycle forever  confusing if the packet arrives much later time-to-live field in packet header  TTL field decremented by each router on the path  packet is discarded when TTL field reaches 0…  …and “time exceeded” message is sent to the source

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 12 application of TTL in traceroute time-to-live field in IP packet header  source sends a packet with a TTL of n  each router along the path decrements the TTL  “TTL exceeded” sent when TTL reaches 0 traceroute tool exploits this TTL behavior source destination TTL=1 Time exceeded TTL=2 Send packets with TTL=1, 2, … and record source of “time exceeded” message

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 13 IP packet header fields (continued) Protocol (8 bits)  identifies the higher-level protocol e.g., “6” for the Transmission Control Protocol (TCP) e.g., “17” for the User Datagram Protocol (UDP)  important for demultiplexing at receiving host indicates what kind of header to expect next can call proper protocol handler routine IP header TCP headerUDP header protocol=6 protocol=17

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 14 IP packet header fields (continued) Checksum (16 bits)  sum of all 16-bit words in the IP packet header  if any bits of the header are corrupted in transit  … the checksum won’t match at receiving host  receiving host discards corrupted packets Sending host will retransmit the packet, if needed = = 350 Mismatch!

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 15 IP packet header (continued) two IP addresses  source IP address (32 bits)  destination IP address (32 bits) destination address  unique identifier for the receiving host  allows each node to make forwarding decisions source address  unique identifier for the sending host  recipient can decide whether to accept packet  enables recipient to send a reply back to source

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 16 what if the source lies? source address should be the sending host  but, who’s checking, anyway?  you could send packets with any source you want why would someone want to do this?  launch a denial-of-service attack send excessive packets to the destination … to overload the node, or the links leading to the node  evade detection by “spoofing” but, the victim could identify you by the source address so, you can put someone else’s source address in the packets  also, an attack against the spoofed host spoofed host is wrongly blamed spoofed host may receive return traffic from the receiver

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 17 Ethernet v/s IP addressing recall Ethernet addresses: 1. are 48 bit & globally unique 2. are flat (not hierarchical!) 3. belong to network adaptor (e.g., Ethernet card) 4. once assigned to a card, cannot be changed IP addresses 1. are 32 bit & globally unique (except when using NAT) 2. are hierarchical (network part, host part) 3. belong to a computer/node/station 4. once assigned to a node, may be changed

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 18 some relevant questions to ask 1. how many IP addresses does a host have? 2. how many IP addresses does a router have? 3. how is routing different from forwarding? 4. how do we map IP addresses to Ethernet addresses? 5. how do logical names resolve to IP addresses?...

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 19 the DNS system hierarchy (from ch 9) educom princeton ■ ■ ■■ ■ ■ mit csee ux01ux04 physics ciscoyahoonasansfarpanavyacmieee Govmilorgnetukfr ■ ■ ■■ ■ ■ ■ ■ ■■ ■ ■ ■ ■ ■■ ■ ■ ■ ■ ■■ ■ ■ Princeton name server Cisco name server CS name server EE name server... Root name server... zones

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 20 IP address classes note: If host field is all zeros, then address belongs to network, not host 2b 1b b/2 b/ (126) (16m)

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 21 special IP addresses

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 22 creating subnets Original host address space subnet masks – used by routers for routing... why?

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 23 router implementation routers handle variable-size packets (unlike simple switches) but, switching fabrics handle fixed-size 'cells' -- thus, ports must frag/defrag packets into fixed size cells (what is another term for port?) packet forwarding has - centralized control (= single processing engine), or - distributed control (= multiple engines, typically, one per line card) recent development: network processing unit (NPU) - IP address lookup, CRC, checksum, frag/defrag, forwarding,... next slides adapted from: J. Rexford, Princeton

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 24 inside a high-end router Switching Fabric Processor Line card

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 25 router physical layout Juniper T series Cisco Crossbar Linecards

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 26 line cards (interface cards, adaptors) interfacing  physical link  switching fabric packet handling  packet forwarding  decrement time-to-live  buffer management link scheduling packet filtering rate limiting packet marking measurement to/from link to/from switch lookup Receive Transmit

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 27 switching fabric deliver packet inside the router  from incoming interface to outgoing interface  a small network in and of itself must operate very quickly  multiple packets going to same outgoing interface  switch scheduling to match inputs to outputs implementation techniques  bus, crossbar, interconnection network, …  running at a faster speed (e.g., 2x) than links  dividing variable-length packets into cells

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 28 packet switching R1 Link 1 Link 2 Link 3 Link 4 Link 1, ingressLink 1, egress Link 2, ingressLink 2, egress Link 3, ingressLink 3, egress Link 4, ingressLink 4, egress Choose Egress Choose Egress Choose Egress Choose Egress “4”

Don Montgomery, CSE 4344, School of Engineering, Southern Methodist UniversityChapter 4, slide 29 router processor so-called “loopback” interface  IP address of the CPU on the router control-plane software  implementation of the routing protocols  creation of forwarding table for the line cards interface to network administrators  command-line interface for configuration  transmission of measurement statistics handling of special data packets  packets with IP options enabled  packets with expired time-to-live field