RARP: Reverse Address Resolution Protocol
|
|
|
- Ashlyn Wilson
- 9 years ago
- Views:
Transcription
1 SFWR 4C03: Computer Networks and Computer Security January Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it normally obtains its IP address from a configuration file that is read from a disk file. But a system without a disk, such as an X terminal or a diskless workstation, needs some other way to obtain its IP address. Each computer on a network has a unique hardware address, assigned by the manufacturer of the network interface. The principle of RARP is for the diskless workstation to read its unique hardware address from the interface card and send an RARP request (an RARP request broadcast in a frame over the network) asking for someone to reply with the diskless system s IP address (in an RARP reply). The format of an RARP request is identical to an ARP (Address resolution protocol) request discussed in Lecture 2. The only differences are that the frame type (in the frame header) is (8035) 16 for an RARP request or reply, and the operation field in the Ethernet data portion has the value 3 for an RARP request and 4 for an RARP reply. An RARP server attached to the physical network normally provides the mapping from a hardware address to an IP address for many hosts (the diskless systems on the network). The mapping is contained in a disk file (normally /etc/ethers on Unix systems. The reply from the server is unicast (to the sender of the RARP request). As with ARP requests, RARP requests are sent as hardware (Ethernet) level broadcasts. This means they are not forwarded by routers. Thus the server must be present on the same physical network as the diskless workstation. To allow diskless stations to bootstrap even when the main RARP server is down, multiple RARP servers are provided on a single network. As the number of servers increases, the network traffic increases, since every server sends an RARP reply to every RARP request. The diskless system normally uses the first RARP reply that it receives. Furthermore, there is a chance that each RARP server can try to respond at about the same time, increasing the probability of collisions on an Ethernet (This is not a problem with ARP, because only a single host sends an ARP reply)
2 Internet Protocols: The protocol that defines the unreliable, connectionless, delivery mechanism is called the Internet Protocol (IP). IP provides three basic definitions: 1. The IP protocol defines the basic unit of data transfer for internet software. 2. It provides the routing function, i.e., choosing a path over which data is to be sent. 3. IP includes a set of rules that embody the ides of unreliable packet delivery. The rules characterize how hosts and routers should process packets, how and when error messages should be generated, and the conditions under which packets can be discarded. These form part of the Internet Control Message (ICMP) protocol suite. The IP service is connectionless because each packet is treated independently from all others. The service is unreliable because delivery is not guaranteed, and packets may well be lost, duplicated, delayed, or delivered out of order. Finally, the service is best-effort delivery because the software makes an earnest attempt to deliver packets; unreliability arises only when the resources are exhausted or the underlying networks fail. The key idea in IP is to keep the network relatively simple and put any necessary intelligence in the end hosts. The IP layer resembles the postal system. On top of the IP layer, the end hosts implement transport layer protocols that coordinate the end-to-end delivery of data between applications. Internet Datagrams: The basic transfer unit in the IP layer is called an IP datagram. Like a typical Ethernet frame discussed in Lecture 2, a datagram is divided into header and data areas. The IP datagram travels (encapsulated) in the data portion of an Ethernet frame. The typical datagram format appears in Figure 7.3 of Comer. The fields in the datagram header are typically set by the operating system on the sending machine. Although an IP router forwards a packet based on the destination address, the header includes additional fields that facilitates the successful communication between sender and receiver: 1. Version number (4 bits): The 4 bit version number typically has a value of 4. Knowing the version number enables the routers and the receiving host to interpret the rest of the header correctly. Any other version of the protocol, such as IPv6, may have a different format. 2. Header length (4 bits): The 4-bit header length indicates the number of 4-byte words in the header. The basic IP header is 20 bytes long (five 4-byte words), but longer headers are possible when IP options are used. The length of the IP header is always a multiple of 32 bits. 3. Type of service (8 bits): The 8 type of service (TOS) bits were originally included in the IP header to influence the path the packet follows through the network. For example, paths may have different performance properties, such as low-delay, high-throughput, or high-reliability. A packet from a large file transfer might be forwarded on a high-throughput 7-9-2
3 path because file transfer delays depend on the bandwidth available between the sender and the receiver. A detailed description of the TOS fields appears in Section of Comer. 4. Total length (16 bits): The 16-bit total length field indicates the total number of bytes in the packet. An IP packet can be up to bytes long. However, most link-layer technologies cannot handle such large packets, and therefore may impose a smaller maximum transmission unit (MTU). For example, may LAN s use Ethernet, which has an MTU of 1500 bytes. The limitation on the MTU can be handled in two ways. In the first approach, the sending machine avoids sending IP packets that exceed the MTU of the links along the path to the receiving machine. But, typically the application does not know the MTU values in advance. In the second approach, an oversized IP packet is divided into two or more fragments by the sender or a router. The fragmentation of IP packets is supported by the next three fields in the IP header - the 16 bit identifier, the 3-bit flags, and the 13-bit offset. 5. Identification (16 bits): The 16-bit identifier field contains a unique value for each IP packet from the sender. Before forwarding a packet to an outgoing link, an IP router checks that the packet size does not exceed the link s MTU. A packet that is too large is fragmented. Each fragment of the packet has the same identifier. This enables the destination to recognize that the fragments belong together. The fragments are reassembled only at the destination, and a single IP packet is delivered to a higher-layer protocol such as TCP or UDP. 6. IP flags (3 bits): Two of the three 1-bit flags relate to the fragmentation process; the other bit is reserved for future use. The more fragments bit is set to 1 for all but the last fragment of a packet. This ensures that the destination can determine whether all of the fragments have arrived. Fragmentation can be disabled by setting the don t fragment bit. Upon receiving an oversized packet with the don t fragment bit set, the router discards the packet and notifies the sender. The notification is sent using the Internet Control Message Protocol (ICMP). The don t fragment bit plays an important role in learning the maximum packet size permitted by the routers along the path through the network. The sender can experiment by sending packets of various sizes with the don t fragment bit set to see whether any of the routers along the path generates an error. The communication software on most computers imposes a de facto MTU (576 or 1500 bytes) that is small enough to avoid fragmentation inside the network. 7. Fragment offset (13 bits): The 13 bit fragment offset field contains the offset (in 8-byte units) of the fragment from the beginning of the original IP packet. Using 8-byte units enables the 13 bit field to identify offsets within an IP packet that is upto 2 16 ( ) bytes long. Togethe, the offset and the length enable the destination to determine what range of bytes is covered by this fragment. Once all the fragments have arrived, the destination can reassemble the packet. 8. Time to live (TTL) (8 bits): The 8-bit TTL field limits the number of hops in the path traversed by the packet. The sender sets the TTL field 7-9-3
4 to an initial value. Then each router along the path decrements the field by one. When the TTL reaches 0, the packet is discarded, and an ICMP error message is sent to the sender. This procedure addresses a potential robustness problem in IP routing. Sometimes a misconfigured router or a link failure can cause a temporary routing loop. As a result, a packet may repeatedly travel over the same set of links, not making any progress toward the destination. The packet may eventually reach the destination long after the two end points have stopped communicating. The arrival of such a very old packet may confuse the recipient. Discarding packets with expired TTLs avoids this problem. 9. Protocol (8 bits): The 8-bit protocol field identifies the higher-level protocol (TCP, UDP, ICMP) responsible for sending the IP packet. Knowing the protocol is important for the recipient of the packet to interpret the data after the IP header. 10. Header checksum (16 bits): The 16-bit checkum provides a way to detect if any of the bits in the header is corrupted as the packet travels through the network. Before transmitting the packet, the sender computes the 16-bit sum of the bits in the IP header and includes the result in the header checksum field. An IP packet with an incorrect header checksum is discarded by the receiving machine. Routers along the path update the header checksum as part of forwarding an IP packet to account for any changes in the header, such as decrementing the TTL field. It is important to note that the checksum applies only to the IP header and not to the contents of the packet. IP does not check whether the data was corrupted. This is the task of a high-level protocol such as TCP or UDP. 11. Source IP address (32 bits): The IP header includes the 32 bit address that identifies the sender of the packet. This allows the recipient or an intermediate router to contact the sender. For example, the receiving application may want to send a reply message. In addition, an intermediate router may need to know the source address to send an ICMP error message. 12. Destination IP address (32 bits): The 32-bit destination address is necessary to identify the intended recipient of the packet. Upon receiving a packet, a router uses the destination IP address to determine the next hop en route to the destination. 13. IP options (variable length): The final field of the IP header contains a variable-length list of optional information, ending on a 32 bit boundary. IP options can be used to exercise additional control over routing or security or to have routers add a timestamp to the packet. A description of some options appears in Section 7.8 of Comer. Internet Routing: Routing refers to the process of choosing a path over which to send packets, and router refers to the computer making the choice. We distinguish hosts from routers; host computers can be configured to act as routers, but we will assume, unless otherwise specified, that host computers do not perform the router s function of transferring packets from one network to another. We can divide routing into two forms: 7-9-4
5 1. Direct Delivery over a single network: To see that a host computer lies on a directly connected network, the sender has simply to extract the network id portion of the destination IP address, and this is the same as the network portion of its own IP address. In this case, the sender simply encapsulates the datagram within an Ethernet frame, maps the destination IP address to a physical address (using the ARP protocol discussed in Lecture 2, and Chapter 5 of Comer), and uses the network hardware to deliver it. No router is involved in this case. 2. Indirect Delivery: This is more difficult than direct delivery because the sender must identify a router to which the datagram can be sent. In this case, the sender encapsulates the datagram in a physical frame, and sends it to the nearest (in most cases a default) router. The sender then invokes an ARP request to map the router IP address (not the destination IP address) to a physical address, and sends the input datagram to the router using the physical network. Once the frame reaches the router, the software extracts the IP datagram, and the router selects the next router (next hop) en route to the next destination. The datagram is again placed in a frame and sent over the next physical network to a second router, and so on, until it can be delivered directly. To select the next hop, the router consults its routing tables. Typically, a routing table consists of ordered pair (N,R), where N is the IP address of a destination network, and R is the IP address of the next router (next hop) along the path to network N. The routing table thus contains one step along the path from router R to the destination network, the router itself is unaware of the complete path to the destination. The routing tables contain the IP addresses of the destination network, and the individual host to keep the routing tables small, and to make routing efficient. Thus, all traffic destined for the same network takes the same path. The IP routing algorithm: This is the Algorithm in Figure 8.3 of Comer. For ease of exposition, I have a simplified version of this Algorithm below: RouteDatagram(Datagram, RoutingTable) 1. Extract destination IP address, D, from the datagram, and compute the network prefix, N 2. If N matches the network prefix of the router IP address then deliver datagram to directly destination D over that network. else if N matches a network IP address specified in the table then send datagram to next-hop specified in table else if if the table contains a default route then send datagram to the default router specified in the table else declare a routing error end if A few points regarding this algorithm are now in order: 1. In case the network prefix N matches the network portion of the IP address of the router, the datagram is sent directly to the destination in a 7-9-5
6 physical frame, after an ARP request resolves the physical address of the destination D. 2. In the 2nd and 3rd cases, the datagram is sent to a next hop router specified in the table. An ARP request resolves the physical address of this next hop router, and the datagram is forwarded to this router in a physical frame. At all times, the IP datagram contains only the IP address of the final destination. The IP address of the next-hop router is discarded once one has resolved the physical address of this router. 3. In the final case, the router sends an ICMP message to the original sender whose IP address is specified in the IP datagram. Figure 8.2 in Comer illustrates an example on which you can test this routing algorithm. Subnets: Subnetting is a technique used to allow a single network address to span multiple physical networks. Instead of dividing a 32 bit IP address into a network prefix and a host suffix, subnetting divides the address into a network portion and a local portion. The interpretation of the network portion remains the same as for networks that do not use subnetting. This network portion needs to be advertised to the rest of the internet. However, the interpretation of the local portion of an address is left up to the site. The local portion is in turn divided into subnet and host id portions. The result is a form of hierarchical addressing that also leads to corresponding hierarchical routing. As an example, consider McMaster University, and two departments at Mac, namely the Computing & Software (CAS) and ECE departments. Let the Mc- Master University physical network have the class B address (the network id is the first 2 octets of the 32 bit IP address). Also, the CAS and ECE department physical networks have the IP addresses and (the subnet id here is the 3rd octet of the IP address) respectively. Finally, let s say Kartik s host machine karmarkar.cas.mcmaster.ca has the IP address (the host id of Kartik s machine is contained in the last octet of the IP address). A site using subnet addressing needs to choose a 32 bit subnet mask for its network. Bits in the subnet mask are set to 1 if machines on the network treat the corresponding bit in the IP address as part of the subnet prefix, and 0 if they treat the bit as part of the host identifier. A subnet mask also has 1 s for all bits that correspond to the network portion of the address. For the McMaster University example above, the 32 bit mask is in dotted decimal representation. Usually, subnet masks choose contiguous bits of the IP address. Subnet routing algorithm: The standard IP routing algorithm mentioned above must be modified to work with subnet addresses. All hosts and routers attached to a network that uses subnet addressing use a modified algorithm known as subnet routing. In the standard routing algorithm it is possible to determine the net id and the host id of the IP address from the first 3 bits which encode the address type, i.e., class A, B or C. With subnets, it is not possible to decide which 7-9-6
7 bits correspond to the network and which to the host from the address alone. Instead, the modified algorithm maintains an additional field called subnet mask in the routing table. The entry in this field specifies the subnet mask used with the network in that entry. The unified routing algorithm is given in Figure 10.8 of Comer. I present a simplified version of this algorithm below. For simplicity, I assume that ther is no default entry in the table. Route-IP-Datagram(Datagram, Routing-Table) 1. Extract destination IP address, D, from datagram. 2. Let N be the bitwise-and of D and the subnet mask associated with the router physical networks. 3. If N matches the network address to which the router attaches then send datagram directly to the destination over the network else for each entry in the routing table do Let N be the bitwise-and of D and the subnet mask if N matches the network address field of the entry then route the datagram to the specified next hop address end for end if 4. Declare a routing error. As an example of the subnet addressing algorithm consider the network on Figure 8.2 of Comer. However, let the network addresses of the four networks be , , and Let the IP addresses of the router Q be and , those of router R be and , and those of S and respectively. Also let the routing table for router R be Now let the destination IP address in the datagram be Network Subnet Next Number Mask Hop Deliver Directly Deliver Directly Router R consults its routing table, and finds that a bitwise and of and yields Since the router R attaches directly to this physical network, this datagram is delivered directly. Recommended Reading 1. Chapter 6 of Comer [1], and Chapter 5 of Stevens [2] for a discussion of the RARP protocol. 2. Chapter 7 of Comer and Chapter 3 of Stevens for a discussion of the IP protocol
8 3. Chapter 8 of Comer for a discussion on the routing algorithm. 4. Chapter 10 of Comer, especially Section for subnet addressing, and Sections for the subnet routing algorithm. Also, Section 3.4 of Stevens for subnet addressing, and Chapter 9 of Stevens for the general routing algorithm. References [1] D.E. Comer, Internetworking with TCP/IP: Principles, Protocols, and Architectures, 4th edition, Prentice Hall, NJ, [2] W. Richard Stevens, TCP/IP Illustrated, Volume I: The Protocols, Addison Wesley Professional Computing Series,
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Internet Protocols. Addressing & Services. Updated: 9-29-2012
Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Savera Tanwir. Internet Protocol
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)
Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: [email protected]
Internet Protocol version 4 Part I
Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : [email protected]
Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : [email protected] SUPPORT DE COURS Matière : Réseaux 2 Niveau : 3 ème Année Licence en Informatique Option : Réseaux et
Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.
Layer Introduction Datagrams and Virtual ircuits Routing Traffic ontrol Main Objective Data delivery from source to destination Node (Router) Application Presentation Session Transport Data Link Data Link
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
Lecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
Internet Control Message Protocol (ICMP)
SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Internet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Future Internet Technologies
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
Network Layer: Address Mapping, Error Reporting, and Multicasting
CHAPTER 21 Network Layer: Address Mapping, Error Reporting, In Chapter 20 we discussed the Internet Protocol (IP) as the main protocol at the network layer. IP was designed as a best-effort delivery protocol,
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
03 Internet Addressing
SE 4C03 Winter 2007 03 Internet Addressing William M. Farmer Department of Computing and Software McMaster University 13 January 2007 IP Addresses There are two Internet naming systems: 1. The primary
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Chapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
The Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013
CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented
Neighbour Discovery in IPv6
Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: [email protected] Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract
5. Classless and Subnet Address Extensions 최 양 희 서울대학교 컴퓨터공학부
5. Classless and Subnet Address Extensions 최 양 희 서울대학교 컴퓨터공학부 1 Introduction In the original IP addressing scheme, each physical network is assigned a unique network address Individual sites can have the
IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing
IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Subnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Network Layer, Part 1 Internet Architecture. History
Network Layer, Part 1 Internet Architecture These slides are created by Dr. Huang of George Mason University. Students registered in Dr. Huang s courses at GMU can make a single machine readable copy and
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
Internet Addresses (You should read Chapter 4 in Forouzan)
Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
DG Forwarding Algorithm
DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router
PART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
A PPENDIX L TCP/IP and OSI
A PPENDIX L TCP/IP and OSI William Stallings Copyright 2010 L.1 PROTOCOLS AND PROTOCOL ARCHITECTURES...2! L.2 THE TCP/IP PROTOCOL ARCHITECTURE...5! TCP/IP Layers...5! TCP and UDP...7! Operation of TCP/IP...7!
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing
Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas
IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow
HOST AUTO CONFIGURATION (BOOTP, DHCP)
Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration
IPv4 Addressing Simplified. by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011
IPv4 Addressing Simplified by Ken Foster B.S. IT Information; Security and Forensics Kaplan University January 23, 2011 The concept of IP Addressing is foundational to overall routing in general. Without
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
