Network Layer. Defines the characteristics of end-to-end transport of data between one edge of the network and the other.
|
|
- Arnold Warren
- 7 years ago
- Views:
Transcription
1 Network Layer Like the physical and data link layers, the network layer is present is all devices on the network. It's role is thus deceptively simple to move packets (datagrams) from a sending host to a receiving host. To do this, three network layer functions can be identified: 1) Path determination Must determine the route or path taken by packets as they flow from a sender to a receiver. Uses routing algorithms to calculate these paths. 2) Forwarding When a packet arrives at the input to a router, the router must move it to the appropriate output link. 3) Call Setup only for non-tcp/ip networks such as ATM. Routing refers to the overall network-wide process that determines the end-to-end paths that datagrams will take from source to destination. Forwarding refers to the router's local action of transferring a datagram from an input link interface to the appropriate output link interface. Uses a forwarding table of destination addresses. Network Service Model Defines the characteristics of end-to-end transport of data between one edge of the network and the other. Datagram or Virtual Circuit? The most importance abstraction provided by the network layer to the upper layers is whether or not the network layer uses virtual circuits. Three identifiable phases in a virtual circuit: 1. VC Setup: Sender -> NL (provides address) -> waits for the construction of the VC; a) determines path, and b) reserves resources. 2. Data Transfer data flows freely once the VC is built 3. VC Tear Down initiated by the sender (or receiver) which informs the NL of its desire to terminate the VC. Datagram Network Layer Routes do not maintain any state information. Instead, they forward a packet toward its destination by examining the packet's destination address, indexing a forwarding table with the destination address and forwarding the packet in the direction of the destination host. Because forwarding tables can be modified at any time, a series of packets sent from one host to another may follow different paths and may arrive out-of-order. Thus the basis of the Internet is based upon a best effort service ( no service at all ). Timing between packets is not guaranteed to be preserved packet receipt not guaranteed in the order in which they were sent delivery is not guaranteed The Internet Protocol (IP) [Layer Three, Network Layer] Three major components:
2 1. Network Layer Protocol (NL) defines NL addressing defines fields in the datagram header describes actions taken by routers and end systems bases on the datagram header fields 2. Path Determination determines the route a datagram follows from source to destination. 3. Error Reporting facility in datagrams and responds to requests for certain NL information. IPv4 Addressing A host typically has only one link into the network that the IP layer must use. Interface the boundary between the host and the physical link. Routers have multiple interfaces, one per each link. Each host and router interface must have its own IP address. Thus an IP address is technically associated with an interface rather than with the host or router. Must be globally unique. Each address is 32 bits long (four bytes) therefore there are 2 32 possible IP addresses (4,294,967,296) Uses a dotted-decimal notation each byte is separated by a period, in decimal form. Compose of two parts: network and host. IP Network address share the leftmost bits of an IP address and are interconnected to each other by a single physical link with no intervening routers. Example: /24 where the /24 represents a network mask indicating that the leftmost 24 bits of the 32 bit quantity define the network address. The remaining 8 bits would form the range of hosts available on this network. The original IP addressing scheme defined five classes of addresses (only four in use). A First 8 bits 2 7 networks (1st bit always 0) interfaces/hosts B First 16 bits 2 14 networks (prefix of 10) 16, interfaces/hosts C First 24 bits 2 21 networks (prefix of 110) 2,097,152 D Reserved for Multicast addresses 2 8 interfaces/hosts This scheme was called classful addressing and is no longer formally part of IP addressing because of its rigid structure that led to a shortage of IP address blocks to assign. In 1993, the IETF standardized on Classless Interdomain Routing (CIDR) (RFC 1519) which allowed the network part of the IP address to be any number of bits long. The /x indicates the number of leading bits that constitutes the network portion of the address. For example: an organization needs 2,000 addresses and is allocated 2,048 (x.x.x.x/21) or 2 11
3 Under the old system, they would have been assigned a Class B block of 65,536 addresses and thus wasting appropriatly 63,000 addresses. The site can furthermore sub-divide their remaining 11 bits into subnets to create individual networks within their organization. How do you obtain a Network address? Typically from your ISP, then you subdivide to meet your needs. Route aggregation is using a single network prefix to advertise multiple networks. Internet Corporation for Assigned Names and Numbers (ICANN) allocates IP address blocks and manages DNS root servers. Assigns domain names and resolves domain name disputes. How do you obtain a Host address? On routers, it is manually entered. On hosts, it can be manually entered or dynamically assigned using the Dynamic Host Configuration Protocol (DHCP). DHCP can assign a persistent IP address or a temporary IP address. How do you move a datagram from source to destination? 1. Same Network. Sending host consults own forwarding table to find an entry whose network address matches the leading bits in the IP address of the receiving host. The forwarding table show that the number of hops is one, indicating it is on the same network as itself. Can use ARP to send datagram to neighbor. 2. Different Network. Sending host consults own forwarding table and finds an entry whose network address matches the leading bits. The forwarding table show the number of hops is two, i.e., on another network. Table also contains the router address that handles that network. Uses ARP to send datagram to router interface. Note: the destination address remains the same; it is not changed to the router's address. When the datagram arrives at the router, it consults its own forwarding table and finds the correct interface to forward it to. If one hop, then it is on the same network as the router interface but if hops is greater than one, it would forward the datagram to the appropriate router. Forwarding tables play a central role in routing datagrams through the Internet. How do they deal with so many possibilities? They use algorithms. Datagram Format (Key Fields) Version Number 4 bits; used to interpret the remainder of the datagram Header Length due to IPv4's variable number of datagram options, these four bits are needed to determine where in the datagram the data actually begins. (Usually a 20 byte header). Type of Service (TOS) allows for different type of datagrams to be distinguished from each other, e.g., distinguish between real-time datagrams and non-real-time datagram traffic. Datagram Length total length (header + data) in bytes. 16 bit field where 2 16 is the
4 theoretical maximum size of a datagram (65,535 bytes). In reality, they are rarely greater than 1500 bytes and are often limited in size to 576 bytes. Identifier, Flags and Fragmentation Offset deal with fragmentation issues. Time-to-Live (TTL) - included to ensure that datagrams do not circulate forever. Decremented by one each time the datagram is processed by a router. If the TTL field reaches 0, the datagram must be discarded. Protocol only used when the datagram reaches its final destination. The value of this field indicates the specific transport layer protocol to which the data portion should be passed. 6=TCP, 17=UDP This code is analogous to the role of the port number in the transport layer segment. The glue that binds the network and transport layers together. Header Checksum aids a router in detecting bit errors in a received datagram. A router computes the header checksum for each received datagram and detects an error condition if the checksum carried in this field does not equal the computed checksum. Typical behavior is to discard the datagram if there is no match. Note: the checksum must be recomputed and stored at each router because the TTL and possibly other fields may change. Only the header is checksumed. Source and Destination IP Addresses - 32 bit IP addresses. There is an IP broadcast address: which is to all hosts on the same network. Options all the header to be extended; meant to be rarely used but complicates header processing due to variable length. Data payload IP Datagram Fragmentation Three datagram header fields are used to handle fragmentation (the deconstruction of datagrams due to the differing storage capacity of various data link layer frames). Identification Field needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. All fragments of a datagram contain the same identification value. Flags one bit is unused; the other two are Do not fragment (DF) and More Fragments (MF). DF is an order to the routers not to fragment the datagram because the destination is incapable of putting the pieces back together again (e.g., boot RAM requiring a single datagram). MF all fragments except the last one has this bit set. It is needed to know whne all fragments of a datagram has arrived. Fragment Offset tells where in the current datagram this fragment belongs. All fragments except the last one in a datagram must be a multiple of eight bytes, the elementary fragment unit. Since 13 bits are provided, there is a maximum of 8192 fragments per datagram giving a maximum datagram length of 65,536, one more than the total length field. Concerning Fragmentation Not all link layer protocols can carry packets of the same size. Ethernet has a maximum payload of 1500 bytes while other technologies have 576 byte maximums. Maximum Transfer Unit (MTU) maximum amount of data that a link layer packet can carry. Places a hard limit on the length of an IP datagram. The problem is that datagrams must
5 traverse multiple networks of differing technologies and link layer protocols, each with a different MTU. This causes the need to fragment datagrams. Datagram fragments need to be reassembled before they reach the transport layer on the destination host. The job of reassembly is placed on the end systems rather than the network routers following the KISS principle. Process Destination host receives a series of datagrams from the same source. 1. Must determine if any are fragments of the original datagrams. 2. If fragments exists: Must determine when it has received the last fragment and how the fragment received should be pieced back together. The destination host will use the identification, flag and fragmentation fields as described above. Router fragmentation technique: Each original datagram has an unique value in its Identification field that is incremented for each datagram of the total sent. When a router needs to fragment a datagram each fragment is given the same original identification number. Destination host can then use this common value to identify all of the fragments of the original datagram. Because the IP layer is unreliable, the MF flag is used: in all fragments except the last one, MF is set to '1' and the last fragment MF = '0'. To preserve fragment order and to determine if a fragment is missing, the offset field is filled in with byte order of the individual fragments created. For example, a datagram of 4,000 bytes (20 for the header and 3980 for data) needs to fit within a frame MTU of 1500: [1] (20+(0-1480)) [2] (20+( )) [3] (20+( )) Fragmentation places an additional burden on routers so it is desirable to keep fragmentation to a minimum. How? Limit the TCP/UDP segment to a relatively small size using the Maximum Segment Size (MSS) setting. Because all data link layer protocols supported by IP are supposed to have MTUs of at least 576 bytes (536 data + 20 TCP header + 20 IP header), fragmentation can be entirely eliminated by using a MSS of 536 bytes. This is why most TCP segments for bulk data transfer are 512 to 536 bytes long.
6 Internet Control Message Protocol (ICMP) (RFC 792) Used by hosts, routers and gateways to communicate network layer information to each other. The most typical usage is for error reporting; e.g. Destination Network Unreachable Often considered part of the IP layer but architecturally lies just above the IP layer, as ICMP messages are carried inside IP datagrams. When a host receives an IP datagram with ICMP specified as the upper-level protocol, it demultiplexes the packet to ICMP just like TCP or UDP. ICMP messages have a type and code field and also contain the header and the first eight bytes of the IP datagram that caused the ICMP message to be generated in the first place (so the sender can determine the packet that caused the error.) See Wikipedia article for header layer and typical error messages: Header The ICMP header starts after the IPv4 header and is identified by protocol number '1'. All ICMP packets will have an 8-byte header and variable-sized data section. The first 4 bytes of the header will be consistent. The first byte is for the ICMP type. The second byte is for the ICMP code. The third and fourth bytes are a checksum of the entire ICMP message. The contents of the remaining 4 bytes of the header will vary based on the ICMP type and code. ICMP error messages contain a data section that includes the entire IP header plus the first 8 bytes of data from the IP datagram that caused the error message. The ICMP datagram is then encapsulated in a new IP datagram. Bits Type Code Checksum 32 Rest of Header Type ICMP type as specified below. Code Subtype to the given type. Checksum Error checking data. Calculated from the ICMP header+data, with value 0 for this field. The checksum algorithm is specified in RFC Rest of Header Four byte field. Will vary based on the ICMP type and code. Select ICMP Messages 0 Echo Reply 0 Echo reply (used to ping) 3 Destination Unreachable 0 Destination network unreachable 1 Destination host unreachable 2 Destination protocol unreachable 3 Destination port unreachable 4 Fragmentation required, and DF flag set 8 Echo Request 0 Echo request (used to ping) 11 Time Exceeded 0 TTL expired in transit 1 Fragment reassembly time exceeded
7 ping Program 1. Sends a Type 8, Code 0 ICMP message to the specified host. 2. Destination host, seeing the echo request, sends back a Type 0, Code 0 echo reply First level troubleshooting tool. Just bounces datagrams off a target host to see if it is there but reveals its IP address, status and route/network availability. The output includes sequence numbers and round-trip times computed as minimum, average, maximum, and maximum deviation from the mean. If examined by a packet capture program such as Wireshark, you see that four pings take eight packets; request-reply pairs using ICMP. The source sends an Echo Request to the destination which is basically saying, Send an ICMP Echo Message back to me. The message is carried inside an IP datagram but it is not a Transport Layer protocol; it is part of the IP Layer. You use ping as a first choice to determine connectivity between hosts: Can you ping it? Has lost some usefulness in the Internet because firewalls now block ping replies for security reasons and as a defense against Denial of Service (DOS) attacks or Ping of Death. traceroute Program Used to determine the names and addresses of the routers between the source and destination hosts. The program running on the source machine sends a series of ordinary IP datagrams to the destination each with a incremented Time-to-Live value, e.g., Datagram TTL Action 1 1 Start timer 2 2 Start timer 3 3 Start timer When the nth datagram arrives at the nth router, the nth router observes that the TTL of the datagram has just expired. The IP protocol rule: discard datagram and send an ICMP warning message (Type 11 Code 0) to the source that includes the name of the router and its IP address. When the nth error message arrives at the source, it stops the timer associated with it and obtains the round-trip time. Dynamic Host Configuration Protocol (DHCP) Actually an application layer protocol (client server) that assigns an IP address and other configuration information to a particular host. Follows a four step process: 1) DHCP Server Discovery uses a DHCP discover message which the client sends within a UDP segment to port 67. But the client does not know even what network it is on. Uses as a destination and as the source. This broadcast will go to all machines on the local network. The discover message contains a transaction ID that allows subsequent responses to be matched to the discovery
8 request. 2) DHCP Server Offers the server responds back to the client with a DHCP offer message containing the transaction ID of the received discover message, the proposed IP address, network mask, and an IP address lease time (amount of time for which the IP address will be valid). 3) DHCP Request the client will accept the offer and respond with a DHCP request message, echoing back the configuration parameters. 4) DHCP ACK server responds with an ACK (acknowledgment) message confirming the requested parameters. This completes the interaction and the client can now use this address for the duration of the lease.
9 ICMP The only function of the IP layer is to provide addressing for and routing the IP datagrams. Although we categorized it as best effort and unreliable in today's modern equipment it works well with low error rates. It just lacks guarantees. Yet it does have an error detection mechanism for error reporting to the layers above it. Without error condition feedback, the natural response is to repeat the sending, which usually works but repetitive sending in the face of a serious error condition could make matters worse create unneeded congestion; e.g., Do not fragment flag set so all datagrams are rejected. ICMP Message Format The IP TOS field is set to 0 if the datagram is carrying ICMP. It has two formats, both starting with the same three fields: Type, Code, Checksum. Then depending on the Type, the following fields vary, e.g., Destination Unreachable Type 8 bits that define the major purpose of the ICMP message. Most indicate error conditions but two, 8 and 0 are Echo Request and Echo Reply. 3 = Destination Unreachable Type determines the remaining fields beyond the first three. Code 8 bits that provide additional information about the condition in the Type field; often unnecessary and left as 0. Some Types have many code values to allow the source to report the true problem, e.g., Destination Unreachable has 16 codes (0-15) defined. Checksum 16 bits used by internal process to trust results ICMP Type and Codes 40 defined message types and are reserved for future use. Only a handful have more than a single code value of 0 defined. Two major categories: 1) Error Messages no response expected 2) Queries response expected 3) Other Which are essential?
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationCS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013
CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented
More information04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More information- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationNetwork Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationNetwork layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
More informationNETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
More informationChapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
More informationInternet Protocols. Addressing & Services. Updated: 9-29-2012
Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationComputer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
More informationSavera Tanwir. Internet Protocol
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationPPS Internet-Praktikum. Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK)
PPS Internet-Praktikum Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) September 2011 Zielsetzung Von unserer Webpage: Das Ziel dieser PPS-Veranstaltung ist es,
More informationThemen der Praktikumsnachmittage. PPS Internet-Praktikum. Zielsetzung. Infrastruktur im ETF B5
PPS Internet-Praktikum Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) Themen der Praktikumsnachmittage Aufbau und Analyse eines kleinen Netzwerks Routing Anwendungen
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationClassful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics
Switching and Forwarding Switching and Forwarding Generic Router rchitecture Forwarding Tables: ridges/layer Switches; VLN Routers and Layer 3 Switches Forwarding in Layer 3 (Network Layer) Network Layer
More information2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
More informationIP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More information2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
More informationFuture Internet Technologies
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationGary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
More informationInternetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
More informationIP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
More informationInternet Addresses (You should read Chapter 4 in Forouzan)
Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment
More informationInternet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationIP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
More informationIP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface
IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces
More informationNetwork Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery
More informationInternet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
More informationSubnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
More informationInternet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
More informationIP Addressing. IP Addresses. Introductory material.
IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting
More informationInternet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
More informationDHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy
, ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationDynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationIP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets
Address Classes (Some are Obsolete) 15-441 15-441 Computer Networking 15-641 Class A 0 Network ID Network ID 8 16 Host ID Host ID 24 32 Lecture 8 Addressing & Packets Peter Steenkiste Fall 2013 www.cs.cmu.edu/~prs/15-441-f13
More informationScaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1
Scaling the Network: Subnetting and Other Protocols Networking CS 3470, Section 1 Today CIDR Subnetting Private IP addresses ICMP, IMAP, and DHCP Protocols 2 Packet Encapsulation ** Creative Commons: http://en.wikipedia.org/wiki/file:udp_encapsulation.svg
More informationOutline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More information(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
More informationNetwork Layer: Address Mapping, Error Reporting, and Multicasting
CHAPTER 21 Network Layer: Address Mapping, Error Reporting, In Chapter 20 we discussed the Internet Protocol (IP) as the main protocol at the network layer. IP was designed as a best-effort delivery protocol,
More informationUnix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationIP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
More informationSUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com
Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com SUPPORT DE COURS Matière : Réseaux 2 Niveau : 3 ème Année Licence en Informatique Option : Réseaux et
More informationInternetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
More informationIP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing
IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate
More informationRaritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
More informationLecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationThe Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
More informationHow Does Ping Really Work?
How Does Ping Really Work? George Mays, Global Knowledge Course Director, CCISP, CCNA, A+, Network+, Security+, I-Net+ Introduction Ping is a basic Internet program that most of us use daily, but did you
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationEfficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
More informationCS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More information(Refer Slide Time: 01:38 01:37)
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No: 29 IP Version 6 & Mobile IP Good day, in the last lecture we discussed
More informationComputer Networks. Main Functions
Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
More informationChapter 4 Network Layer
Chapter 4 Network Layer Reti degli Elaboratori Canale AL Prof.ssa Chiara Petrioli a.a. 2013/2014 We thank for the support material Prof. Kurose-Ross All material copyright 1996-2012 J.F Kurose and K.W.
More informationACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
More informationIP Subnetting. Subnetting
IP Subnetting Shailesh N. Sisat Prajkta S. Bhopale Vishwajit K. Barbudhe Abstract - Network management becomes more and more important as computer-networks grow steadily. A critical skill for any network
More informationChapter 11. User Datagram Protocol (UDP)
Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,
More informationLayer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery
More informationClassful IP Addressing (cont.)
Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful
More informationTCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
More informationThis tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
More informationPART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More information