Lecture Computer Networks



Similar documents
8.2 The Internet Protocol

Network layer: Overview. Network layer functions IP Routing and forwarding

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

IP - The Internet Protocol

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Internet Protocols Fall Lectures 7-8 Andreas Terzis

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

NETWORK LAYER/INTERNET PROTOCOLS

Future Internet Technologies

Subnetting,Supernetting, VLSM & CIDR

Ethernet. Ethernet. Network Devices

RARP: Reverse Address Resolution Protocol

Technical Support Information Belkin internal use only

Savera Tanwir. Internet Protocol

04 Internet Protocol (IP)

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

IP address format: Dotted decimal notation:

Overview of TCP/IP. TCP/IP and Internet

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Lecture 8. IP Fundamentals

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Networking Test 4 Study Guide

Internetworking and Internet-1. Global Addresses

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

- IPv4 Addressing and Subnetting -

PPS Internet-Praktikum. Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK)

Themen der Praktikumsnachmittage. PPS Internet-Praktikum. Zielsetzung. Infrastruktur im ETF B5

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Internet Protocols Fall Outline

Internet Protocols. Background CHAPTER

Chapter 13 Internet Protocol (IP)

ICS 351: Today's plan

2. IP Networks, IP Hosts and IP Ports

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Vorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments

IP addressing and forwarding Network layer

Unix System Administration

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Troubleshooting Tools

IP Subnetting and Addressing

Internet Architecture and Philosophy

IP Addressing A Simplified Tutorial

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Network Layer: Network Layer and IP Protocol

SUBNETS, CIDR, AND CLASSLESS ADDRESSING

(Refer Slide Time: 02:17)

PART IV. Network Layer

IP Addressing Introductory material.

Chapter 9. IP Secure

IP Addressing. IP Addresses. Introductory material.

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Internetworking and IP Address

Overview Computer Networking. IP Address Classes (Some are Obsolete) Outline. Lecture 9 IP Packets. CIDR IP addressing. Forwarding examples

How To Make A Network Address Prefix Smaller

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

IP Address Classes (Some are Obsolete) Computer Networking. Important Concepts. Subnetting Lecture 8 IP Addressing & Packets

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Internet Control Protocols Reading: Chapter 3

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Internet Protocol: IP packet headers. vendredi 18 octobre 13

CS 348: Computer Networks. - IP addressing; 21 st Aug Instructor: Sridhar Iyer IIT Bombay

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming IP routing

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Computer Networks/DV2 Lab

TCP/IP Network Essentials. Linux System Administration and IP Services

Internet Addresses (You should read Chapter 4 in Forouzan)

The Internet/Network Layer

Internet Protocols. Addressing & Services. Updated:

Datacommunication. Internet Infrastructure IPv4 & IPv6

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

We Are HERE! Subne\ng

1. How many unique network IDs are there in class A addresses? # of unique hosts?

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

1000 CCNA Certification Exam Preparation Questions and Answers:

SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Introduction to IP v6

Transport and Network Layer

Chapter 4 Network Layer

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Ethernet and IP A slightly less introductory networking class. Drew Saunders Networking Systems Stanford University

TCP/IP Basis. OSI Model

How do I get to

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

The Internet and TCP/IP David K. Hunter

The Internet. Internet Technologies and Applications

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Internet Protocol Address

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Transcription:

Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks Internet Protocol Version 4 (IPv4) Address Resolution Protocol (ARP) Internet Control Message Protocol (ICMP)

Page 2 Content Specifications Internet Protocol Version 4 (IPv4) Motivation Overview Tasks Fragmentation Addressing Routing Address Resolution Protocol (ARP) Internet Control Message Protocol (ICMP)

Page 3 Specifications The formal specification of the Internet protocols is standardized in the Request for Comments (RFCs). IP RFC 791 ICMP RFC 792 ARP RFC 826 TCP RFC 793 UDP RFC 768

Page 4 OSI and IP Protocol Stacks OSI Model Internet Protocol Suite 7. 6. 5. 4. 3. 2. 1. Application Presentation Session Transport Network Data Link Physical Application (e.g. FTP, TELNET) TCP or UDP IP LAN or WAN Technology (e.g. Ethernet)

Page 5 Motivation We have LANs with their local limitations (e.g. maximum segment length) and own addressing (e.g. Ethernet - 48 bit MAC Addresses) We want a connection between the LANs and hosts distributed all over the world

Page 6 Connected LANs Motivation (2) Internet Network 1 Network 2

Page 7 Motivation (3) What do we need? a protocol that supports as many kinds of LANs as possible uniform addresses routing

Page 8 Overview IP (Internet Protocol) is a connectionless and unreliable packet delivery system

Page 9 Connectionless Communication Service (also called datagram transmission) the data are divided into segments each segment is supplied with a header that contains destination and source address each datagram is transferred independently through the network

Page 10 Unreliable Service no guarantee that a packet is delivered correctly or doesn t get lost reliability must be provided by the upper layers (e.g. TCP)

Page 11 Tasks of IP Fragmentation Addressing and Routing

Page 12 Fragmentation In networks which are IP-connected, different frame sizes can be used (e.g. Ethernet and FDDI) when the size of a IP datagram exceeds the size of the underlying MTU, fragmentation occurs

Page 13 IP Addresses To every interface there can be assigned an IP address, which is a unique 32 bit address IP addresses are usually written as four decimal numbers, separated by points: W. X. Y. Z e.g. 134.60.40.100 W: 1. Byte, X: 2. Byte, Y: 3. Byte, Z: 4. Byte the IP addresses are assigned by a central authority the Network Information Center (NIC)

Page 14 Addressing (at the beginning) 5 Classes of IP Addresses class A C scheme: 2 parts first part for the network ID second part for the host ID class D Multicast Address (assigning a group of hosts) class E Addresses: reserved for future use

Page 15 IP Address Classes 32 Bit-Address 0 31 class A 0 2 8 net id 2 24 host id class B 1 0 216 net id 2 16 host id class C 1 1 0 224 net id 2 8 host id class D 1 1 1 0 multicast class E 1 1 1 1 0 reserved for future use

Page 16 Scaling Problems Exhaustion of the class-b network address space. (One fundamental cause of this problem is the lack of a network class of a size which is appropriate for mid-sized organization; class-c, with a maximum of 254 host addresses, is too small while class-b, which allows up to 65534 addresses, is too large to be widely allocated.) Growth of routing tables in Internet routers is beyond the ability to be managed effectively by current software (and people). Eventual exhaustion of the 32-bit IP address space.

Page 17 Addressing example Four "class c" addresses for one network: decimal binary Sub 1 192.168.0.0 11000000. 10101000. 00000000. 00000000 Sub 2 192.168.1.0 11000000. 10101000. 00000001. 00000000 Sub 3 192.168.2.0 11000000. 10101000. 00000010. 00000000 Sub 4 192.168.3.0 11000000. 10101000. 00000011. 00000000 four networks with the netmask Mask 255.255.255.0 11111111. 11111111. 11111111. 00000000

Page 18 Supernetting Organizations with more than one class C network can merge these networks by moving bits from the network portion of the address into the host portion of the address. Example: decimal binary Sub 1 192.168.0.0 11000000. 10101000. 00000000. 00000000 Sub 2 192.168.1.0 11000000. 10101000. 00000001. 00000000 Sub 3 192.168.2.0 11000000. 10101000. 00000010. 00000000 Sub 4 192.168.3.0 11000000. 10101000. 00000011. 00000000 one network with the netmask Mask 255.255. 252.0 11111111. 11111111. 11111100. 00000000

Page 19 Supernetting Chart equal bits Supernet Mask Number of Class C s Number of Hosts 14 255.252.0.0 1024 262144 15 255.254.0.0 512 131072 16 255.255.0.0 256 65536 17 255.255.128.0 128 32768 18 255.255.192.0 64 16384 19 255.255.224.0 32 8192 20 255.255.240.0 16 4096 21 255.255.248.0 8 2048 22 255.255.252.0 4 1024 23 255.255.254.0 2 512

Page 20 Subnetting Any organization with a network of any size can subdivide the available host address space according to its network topology Example: University of Ulm class B address: 134.60.X.Y X is used for local subnets Y is used for the hosts RFC 950, Internet Standard Subnetting Procedure

Page 21 Classless Inter-Domain Routing (CIDR) Bitwise Variable-Length Subnetting a.b.c.d/n n: from 0 to 32 RFC1519, an address assignment and aggregation strategy For example: 192.24.0.0/18 Mask 255.255.192.0 Networks 192.24.0.0 192.24.63.0 Hosts 16384 Routing prefix aggregation Two or more contiguous CIDR classes can be aggregated and advertised together

Page 22 Private Address Space There are 3 blocks of the IP address space reserved for private Internets: 10.0.0.0-10.255.255.255 (class A) 172.16.0.0-172.31.255.255 (class B) 192.168.0.0-192.168.255.255 (class C) RFC 1918, Address Allocation for Private Internets

Page 23 Single and Multihomed Host a host which is connected to one LAN is called single homed host a host which is connected to more than one LAN is called a multihomed host the host needs an IP address for each network

Page 24 Example Ethernet 134.60.1.x 134.60.1.60 Host 134.60.5.7 134.60.5.x Host Host 134.60.1.15 134.60.1.14 134.60.5.52 Host 134.60.5.99 134.60.1.99 Router Firewall 134.60.5.48 134.60.6.1 Internet

Page 25 IP Header 1 Byte 1 Byte 1 Byte 1 Byte Version IHL Type of Service Total Length TTL (Time to Live) Identification Protocol Flags Source Address Fragment Offset Header Checksum Destination Address Options Data

Page 26 IP Header Explanation (1) Version (4 bits): IPv4 (at the moment) or IPv6 IHL (4 bits): Internet Header Length (minimum 20 Bytes) Service Type (8 bits): Not widely supported. It specifies the wants of the service datagram. It contains 3-bit precedence from 0 (normal) to 7 (network control) 1-bit D: for delay preferred 1-bit T: for throughput preferred 1-bit R: for reliability preferred 2 remaining bits are unused

Page 27 Type of Service (8 Bits) Precedence D T R Unused 0 normal.. 7 network control 3 Bits 1 Bit 1 Bit 1 Bit 2 Bits reliability throughput delay Changed by by RFC RFC 2474 2474 and and 3168 3168

Page 28 IP Header Explanation (2) Total Length (16 bits): Length of header and data Each host must be able to handle a length of 576 Bytes, today most hosts accept longer packets, too Datagram Identification (16 bits): Used to allow the destination to re-assemble fragments. All fragments of a datagram contain the same identification. Fragmentation Flags: MF More Fragmentation DF Don t fragment Fragment Offset: tells where this fragment belongs in the current datagram

Page 29 IP Header Explanation (3) Time to Live (TTL) (8bits): Maximum number of routers to pass. Each router decrements that number; when it hits zero, the datagram is discarded. It was intended to record seconds, but now it is used to count hops. Protocol: layer 4 protocol (e.g. TCP, UDP) Header Checksum: If an error is found in the checksum, the datagram is discarded. A higher layer protocol has to care for retransmission. It has to be calculated by every router, because of the change of the TTL.

Page 30 Routing Each host and gateway in the Internet has a routing table Example for a routing table of a host: Destination Gateway Netmask Iface 134.90.1.1 134.60.50.1 255.255.255.255 ppp0 134.60.40.0 0.0.0.0 255.255.255.0 eth0 127.0.0.0 0.0.0.0 255.0.0.0 lo 0.0.0.0 134.60.40.99 0.0.0.0 eth0 The entry, for which the following statement results in the longest match of true values, is chosen: IP address of the datagram to send (binary AND) Netmask = Destination

Page 31 ARP (Address Resolution Protocol) Interface Cards (e.g. for Ethernet) only recognize MAC addresses they accept only Broadcasts and Frames with their own MAC address A host or gateway that wants to send an IP datagram to a host (with a known IP address) must find out which MAC address corresponds to that host. ARP (Address Resolution Protocol) is used.

Page 32 ARP (2) The host or gateway sends a broadcast message on the Ethernet that asks the host with the specified IP address to respond with its Ethernet address. Every host on the Ethernet receives this broadcast packet, but only the specified one will respond. For the future the result is cached in an ARP table.

Page 33 ARP (3) Host A Host B Host C Broadcast (IP C) Ethernet Reply (MAC C)

Page 34 ICMP (Internet Control Message Protocol) ICMP messages, delivered in IP packets, are used for out-of-band messages related to network operation or mis-operation. Since ICMP uses IP, ICMP packet delivery is unreliable, so hosts cannot count on receiving ICMP packets for any network problem.

Page 35 Some ICMP Functions (1) Announce network errors, such as a host or entire portion of the network being unreachable, due to some type of failure. Announce network congestion. When a router begins buffering too many packets, due to an inability to transmit them as fast as they are being received, it will generate ICMP Source Quench messages. Directed at the sender, these messages should cause the rate of packet transmission to be slowed. Of course, generating too many Source Quench messages would cause even more network congestion, so they are used sparingly.

Page 36 Some ICMP Functions (2) Assist Troubleshooting. ICMP supports an Echo function, which just sends a packet on a round-trip between two hosts. Ping, a common network management tool, is based on this feature. Ping will transmit a series of packets, measuring average round-trip times and computing loss percentages. Announce Timeouts. If an IP packet's TTL field drops to zero, the router discarding the packet will often generate an ICMP packet announcing this fact.