1 Chapter 4: Internetworking (Internet Protocol) Dr. Rocky K. C. Chang 16 March 2004.

Slides:



Advertisements
Similar presentations
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv4 - The Internet Protocol Version 4
Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6
CSE 461: IP/ICMP and the Network Layer. Next Topic  Focus:  How do we build large networks?  Introduction to the Network layer  Internetworks  Service.
TCP/IP TCP/IP architecture
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5-1 Internet Protocol (IP): Packet Format, Fragmentation, Options Shivkumar Kalyanaraman Rensselaer.
Network Layer Packet Forwarding IS250 Spring 2010
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Chapter 5 The Network Layer.
1 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
Spring 2003CS 4611 Internetworking COS 461 Spring 2003.
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 Internetworking: addressing, forwarding, resolution, fragmentation Shivkumar Kalyanaraman Rensselaer.
1 The Classic Internet Protocol (RFC 791) Dr. Rocky K. C. Chang 18 September 2006.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Module 10. Internet Protocol (IP) is the routed protocol of the Internet. IP addressing enables packets to be routed from source to destination using.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
DHCP: Dynamic Host Configuration Protocol
Network Layer – Subnetting and Control Protocols Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_a
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
1 Internet Protocol. 2 Connectionless Network Layers Destination, source, hop count Maybe other stuff –fragmentation –options (e.g., source routing) –error.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
CS 4396 Computer Networks Lab
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Lecture 15 Internetworking: Address Structure Fragmentation and Reassembly.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
THE CLASSIC INTERNET PROTOCOL (RFC 791) Dr. Rocky K. C. Chang 20 September
The Internet Network layer
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
3. INTERNETWORKING (PART 3: IP) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 18 February
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
© 2003, Cisco Systems, Inc. All rights reserved.
Computer Communication Networks
IP - The Internet Protocol
Scaling the Network: The Internet Protocol
3. Internetworking (part 3: IP)
CS 457 – Lecture 10 Internetworking and IP
IP - The Internet Protocol
Advanced Computer Networks
Internetworking Outline Best Effort Service Model
Wide Area Networks and Internet CT1403
Chapter 15. Internet Protocol
IP - The Internet Protocol
Scaling the Network: The Internet Protocol
ITIS 6167/8167: Network and Information Security
IP - The Internet Protocol
Computer Networks Protocols
Presentation transcript:

1 Chapter 4: Internetworking (Internet Protocol) Dr. Rocky K. C. Chang 16 March 2004

2 1. The IP technology (except routing) IP service model IP protocol family IP datagram structure IP datagram fragmentation and reassembly IP subnets IP forwarding mechanisms IP tunnels Other IP layer protocols

3 2. The IP service model The IP service model consists of –an addressing scheme to identify an IP host, and –a datagram (connectionless) model of data delivery. IP provides a best-effort service. –IP makes its best effort to send a datagram to its destination. –The best-effort service does not guarantee reliable datagram delivery, i.e., an unreliable service.

4 3. Internet protocol suite (incomplete) … FTPHTTPNV TFTP TCP UDP IP NET 1 2 n Application Transport Network Data-link ICMP IGMP ARP & RARP Ping DNS RTP SSL

5 4. IP datagram VersionHLen TOSLength IdentFlagsOffset TTLProtocolChecksum SourceAddr DestinationAddr Options (variable) Pad (variable) Data

6 4. IP datagram Version: 4 for the current IP. Type of service (TOS) for specifying how a router should handle this datagram. Header length handles a variable-length header. –20-byte IP header without IP options A 16-bit length limits the size of an IP datagram to 65,535 bytes, including the IP header. Identification, flags, and offset are used for packet fragmentation and reassembly.

7 4. IP datagram Time to live (TTL) limits the the number of times that a datagram processed by routers. Protocol specifies the type of payload, e.g., 6 for TCP and 17 for UDP. Checksum is a 16-bit word checksum. IP options, e.g., –Source routing –Record route

8 5. MTU and packet fragmentation Each network chooses a maximum packet size that can be sent on it, Maximum Transmission Unit (MTU). For example, –1500 bytes for 10-Mbps Ethernet –4352 bytes for FDDI –17914 bytes for 16-Mbps token ring Note that all MTUs are smaller than IP datagram’s maximum size. One internetworking problem is to accommodate various MTU values.

9 5. MTU and packet fragmentation To send datagrams to a directly attached host, use the network’s MTU. To send datagrams to a nondirectly attached host, use the path MTU. –Path MTU is the minimum of the networks’ MTUs on the path from the source to destination. If the actual MTU used is larger than the path MTU, packet fragmentation occurs. –Fragmentation occurs when a router attempts to forward it to a network with a smaller MTU.

10 5. MTU and packet fragmentation H1R1R2R3H8 ETHIP(1400)FDDIIP(1400)PPPIP(512) PPPIP(376) PPPIP(512) ETHIP(512) ETHIP(376) ETHIP(512)

11 Ident = xOffset = 0 Start of header 0 Rest of header 1400 data bytes (a) Ident = xOffset = 0 Start of header 1 Rest of header 512 data bytes (b) Ident = xOffset = 512 Start of header 1 Rest of header 512 data bytes Ident = xOffset = 1024 Start of header 0 Rest of header 376 data bytes

12 5. MTU and packet fragmentation Each IP fragment contains enough information for forwarding to the destination. A fragmented IP datagram will be reassembled only at the destination node. If any fragments do not arrive within a certain time, other received fragments in the datagram will be discarded. Fragmentation could occur multiple times to an IP datagram.

13 6. IP subnets IP subnets introduce additional levels within an IP network: –A network address, a subnet ID, and a host ID. IP subnets offer flexibility in allocating addresses to different sizes of sub-networks. A subnet mask is used to indicate which bits are referred to the network and subnet ID. –Each network interface stores subnet mask and its unicast IP address.

14 6. IP subnets Subnetting for a class B address: Network numberHost number Class B address Subnet mask ( ) Subnetted address Network numberHost IDSubnet ID

15 6. IP subnets Subnet mask: Subnet number: H1 R Subnet mask: Subnet number: R2 H Subnet mask: Subnet number: H3

16 7. IP forwarding mechanisms Assume that both routers and hosts already have appropriate routing tables in place. –Routing tables for routers are constructed from routing protocols. –Routing tables for hosts are constructed from other means. Problem: Given a routing table, how do hosts and routers forward datagrams?

Examples of routing tables For example, R1’s routing table: –Network/SubnetSubnet MaskNext Hop – upper int. – lower int. – For example, H1’s routing table: –Network/SubnetSubnet MaskNext Hop – upper int. –

Host’s forwarding mechanisms A host sends a datagram to another host on the same LAN or not. –In the former, it sends the datagram to the destination directly. –In the latter, it sends the datagram to a default router. –In both cases, the host uses ARP cache or ARP to find out the corresponding MAC addresses.

A general forwarding mechanism

Characteristics of IP forwarding Both hosts and routers are involved in forwarding. –Compared with routers, a host makes a much simpler binary decision. IP forwarding is done on a hop-by-hop basis. It is assumed that the next-hop router is really closer to the destination. IP forwarding is able to specify a route to a network, and not have to specify a route to every host.

21 8. IP tunnels Two network nodes (hosts or routers) may “tunnel” IP datagrams between them. –Other nodes on the path are not aware of the other datagram encapsulated by the outer datagram. –A tunnel configured from R1 to R2, which is assigned with a virtual number of 0: NetworkNext Hop 1Interface 0 2Virtual interface 0 DefaultInterface 1

22 8. IP tunnels Network interfaces configured as tunnel endpoints perform IP-in-IP encapsulation. –When sending datagrams to each other, the sender uses its IP address as the source address and the other’s IP address as the destination address. –Each performs IP-in-IP encapsulation/decapsulation and then IP routing. –A datagram may traverse several IP tunnels before arriving at the destination.

An example of IP tunnels IP header, Destination = 2.x IP payload IP header, Destination = IP header, Destination = 2.x IP payload IP header, Destination = 2.x IP payload Network 1R1 Internetwork Network 2R

Uses of IP tunnels Mobile IP: IP tunnel between a foreign agent (or a mobile host) and a home agent. Mbone (Multicast backbone): IP tunnels connect islands of multicast-enabled IP networks. IPv6: IP tunnels will be used for IPv4-IPv6 transition. IPSec: IP tunnels with security is used in establishing Virtual Private Networks (VPNs).

Virtual private networks C A Corporation X private network B KL M Corporation Y private network C AB KL M Physical links Virtual circuits (a) (b)

26 9. Dynamic host configuration protocol DHCP provides a framework for passing configuration information to hosts. –IP addresses, address of a default router, etc. DHCP is a client-server system, including a relay agent. DHCP operation: –A DHCP client initially broadcasts a DISCOVER message to find a DHCP server. If the server is not directly connected to the client, a relay agent on the LAN will forward this message to the server.

27 9. Dynamic host configuration protocol –The server sends an OFFER message back to the relay agent, which then forwards it in either unicast or broadcast back to the client. –Upon accepting an OFFER from a DHCP server, the client sends a REQUEST message to that server. –The final step is for the server to send a REQUEST ACK back to the client. DHCP provides IP addresses to clients for a finite lease duration. –The client either renews the lease or rebinds to another new address.

28 9. Dynamic host configuration protocol DHCP relay DHCP server Other networks Unicast to server Broadcast Host

Internet control message protocol The main functions associated with the ICMP are error reporting, reachability test, and route- change notification. ICMP reports errors to the source for host unreachable, lost of fragments, etc. Ping program uses ICMP echo request and reply to test a host’s aliveness. ICMP sends a re-direct message for a better route back to the source.

Internet control message protocol Host R1 R2 (1) IP datagram (2) IP datagram (3) ICMP redirect to the destination