ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:



Similar documents
The Network Layer Functions: Congestion Control

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

UPPER LAYER SWITCHING

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model and the TCP/IP Protocol Suite

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Access Control: Firewalls (1)

Internet Packets. Forwarding Datagrams

Computer Networks Vs. Distributed Systems

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

Chapter 9. IP Secure

Data Communication Networks and Converged Networks

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Transport and Network Layer

The OSI and TCP/IP Models. Lesson 2

Protocol Data Units and Encapsulation

Networking Test 4 Study Guide

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Computer Networks. Main Functions

Internetworking. Problem: There is more than one network (heterogeneity & scale)

CS335 Sample Questions for Exam #2

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Communications and Computer Networks

Overview of Computer Networks

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Ethernet. Ethernet. Network Devices

MANAGEMENT INFORMATION SYSTEMS 8/E

Communication Systems Internetworking (Bridges & Co)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Lecture 8. IP Fundamentals

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

PART IV. Network Layer

Protocols and Architecture. Protocol Architecture.

Protocol Architecture

Internetworking and IP Address

Chapter 1: Introduction

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

PART OF THE PICTURE: The TCP/IP Communications Architecture

The IP Transmission Process. V1.4: Geoff Bennett

Network Security TCP/IP Refresher

Introduction to TCP/IP

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Communication Networks. MAP-TELE 2011/12 José Ruela

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

CSE 3461 / 5461: Computer Networking & Internet Technologies

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

524 Computer Networks

TCP and UDP with Bigger Addresses (TUBA), A Simple Proposal for Internet Addressing and Routing

ELEC3030 Computer Networks

Internet Architecture and Philosophy

Lecture 28: Internet Protocols

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks CS321

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Protocols. Packets. What's in an IP packet

ICTTEN8195B Evaluate and apply network security

High-Level Data Link Control

The Internet. Internet Technologies and Applications

Lecture Computer Networks

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Securing IP Networks with Implementation of IPv6

Internetworking II: VPNs, MPLS, and Traffic Engineering

Network layer: Overview. Network layer functions IP Routing and forwarding

04 Internet Protocol (IP)

Overview of TCP/IP. TCP/IP and Internet

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS

Internetworking and Internet-1. Global Addresses

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

Lecture 17 - Network Security

TCP/IP Fundamentals. Edmund Lam IT Audit Manager University of California 7/25/99 1

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

12. Firewalls Content

Objectives of Lecture. Network Architecture. Protocols. Contents

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Layered Architectures and Applications

Candidates should attempt FOUR questions. All questions carry 25 marks.

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

1 Introduction to mobile telecommunications

Introduction to IP v6

Data Link Protocols. TCP/IP Suite and OSI Reference Model

IP - The Internet Protocol

WAN Data Link Protocols

Transcription:

How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in the Internet) 131

Internetworking Problem: Networks with different protocol stacks how to let them talk to each other? Nonsolution: Why not enforce all networks to run same protocol stack? ask for troubles! and this is effectively saying no progress is allowed Solution: Construct some gateways that connect different kinds of networks Repeaters or hubs at physical layer: operate on bits, do not understand protocols, just regenerate signals Bridges or switches at data link layer: operate on frames, examine AC addresses, do minor protocol translation, e.g. Ethernet to 802.11 ultiprotocol at network layer: operate on packets, translate between different packet formats, possibly split up packets Connection to Internet Router SNA network Ethernet Switch ainframe FDDI ring AT network 802.11 Notebook computer Transport gateways at transport layer: coupling byte streams in different networks, interface between different transport connections Application gateways at application layer: translate message semantics between OSI and TCP/IP networks 132

Internetworking at Network Layer With a, packet is extracted from frame and address in packet is used to decide where to send it so has to understand network protocols Legend Header Trailer Switch Router S D S D LAN 1 LAN 2 (a) LAN 1 (b) LAN 2 Switch or bridge do not understand network protocols. In a switch (or bridge) entire frame is transported on basis of its AC address Two basic internetworking approaches: connection-oriented concatenation of virtual-circuit subnets, and connectionless datagram internet style 133

Concatenated Virtual Circuits A sequence of virtual circuits is set up from source through gateways (multiprotocol s) to destination SNA 1 X. 25 ultiprotocol AT Router OSI End-to-end concatenated virtual circuits 2 Host Each gateway maintain tables telling which virtual circuits pass through it, where they are to be routed and what new virtual circuit number is If one of constituent subnets does not support virtual circuits, simple concatenation becomes hard 134

Using Datagram This connectionless internetworking approach is similar to datagram service in subnets 1 s travel individually and can take different routes Router ultiprotocol 2 Host ain problem: Addressing different networks use completely different address systems. How do you address a host in a IP subnet when you are in a SNA subnet? Solution: Don t solve it, instead consider possibly some universal network protocol, e.g. IP, which can be carried through many networks 135

Tunneling Solving general internetworking problem is extremely hard, but thing becomes easier if source and destination are on same type of subnet tunnelling can be used Ethernet in Paris ultiprotocol Acts like a serial line WAN Tunnel 1 2 Ethernet in London Header IP Ethernet frame IP IP packet inside payload field of the WAN packet IP Ethernet frame ultiprotocol simply places source host s packet inside payload of WAN packet and sends through Essentially, what between two hosts subnets, WAN, can be seen as a tunnel extending from one multiprotocol to the other 136

Internetworking Routing Routing through an internetwork is similar to routing within a subnet but with added complications Two-level routing algorithm needed Interior gateway protocol used (a) within each network Exterior gateway protocol used between networks 1 Network A E 2 B 3 C 4 (ultiprotocol) D F 5 A E C (b) B F D Thus, one has intranetwork routing and internetwork routing Consider an internet packet starts out from its LAN addressed to the local multiprotocol routine (in the AC layer header) After the packet has reached the local, the network layer decides which mutliprotocol to forward the packet to using its own routing table If that can be reached using the packet s native network protocol, the packet is directly forward there Otherwise, it is tunnelled there (see previous slide), encapsulated in the protocol required by the intervening network 137

Fragmentation Different networks have different maximum packet sizes, and solution is to allow gateway to split a packet into smaller ones fragmentation Network 1 Network 2 G 1 G 2 G 3 G 4 G 1 fragments a large packet G 2 reassembles the fragments G 3 fragments again G 4 reassembles again (a) G 1 G 2 G 3 G 4 G 1 fragments a large packet The fragments are not reassembled until the final destination (a host) is reached (b) Transparent fragmentation: small-packet network splits packet and recombines fragments back. Others do not need to know Nontransparent fragmentation: destination host recombines fragments back 138

Fragmentation Reassembly A fragment may be fragmented again by successive intermediate networks when a fragment arrives at destination, we have to know exactly where it fits into original packet Solution: requires two sequence fields in header, original packet number and fragment number Number of the first elementary fragment in this packet number End of packet bit 1 byte 27 0 1 A B C D E F G H I J Header (a) 27 0 0 A B C D E F G H 27 8 1 I J Header (b) Header 27 0 0 A B C D E 27 5 0 F G H 27 8 1 I J Header Header Header (c) 139

Firewalls Sometimes it is better not all your computers can be easily reached by others, or vice versa firewall filtering Application gateway filtering Backbone Connections to outside networks Corporate network Security perimeter Inside LAN Outside LAN Firewall filter: standard with extra functionality to inspect packets Those packets meeting some criterion are forwarded normally, and those failed are dropped Application gateway: operates at application level 140

Summary Internetworking in general Internetworking at network layer Concatenated virtual circuits Connectionless internetworking Tunnelling Internetwork routing Transparent and nontransparent fragmentation, reassembly Firewalls 141