Internetworking. Problem: There is more than one network (heterogeneity & scale)



Similar documents
Internet Control Protocols Reading: Chapter 3

Internet Protocols Fall Lectures 7-8 Andreas Terzis

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Internetworking and Internet-1. Global Addresses

IP - The Internet Protocol

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

8.2 The Internet Protocol

04 Internet Protocol (IP)

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Lecture Computer Networks

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

RARP: Reverse Address Resolution Protocol

Lecture 8. IP Fundamentals

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Technical Support Information Belkin internal use only

Ethernet. Ethernet. Network Devices

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

IP Address Classes (Some are Obsolete) Computer Networking. Important Concepts. Subnetting Lecture 8 IP Addressing & Packets

Network Security TCP/IP Refresher

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

The Internet. Internet Technologies and Applications

2. IP Networks, IP Hosts and IP Ports

Network layer: Overview. Network layer functions IP Routing and forwarding

Network Layer, Part 1 Internet Architecture. History

Address Resolution Protocol (ARP)

Internet Architecture and Philosophy

Chapter 9. IP Secure

Network Layer: Network Layer and IP Protocol

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

PART IV. Network Layer

IP addressing and forwarding Network layer

Definition. A Historical Example

Introduction to IP v6

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Transport and Network Layer

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

IP address format: Dotted decimal notation:

CS 348: Computer Networks. - IP addressing; 21 st Aug Instructor: Sridhar Iyer IIT Bombay

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Overview of TCP/IP. TCP/IP and Internet

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Future Internet Technologies

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

NETWORK LAYER/INTERNET PROTOCOLS

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

- IPv4 Addressing and Subnetting -

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

How do I get to

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Subnetting,Supernetting, VLSM & CIDR

Internet Protocols. Background CHAPTER

Chapter 4 Network Layer

Networking Test 4 Study Guide

SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com

Chapter 12 Supporting Network Address Translation (NAT)

IP Addressing Introductory material.

Internet Protocols. Addressing & Services. Updated:

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Master Course Computer Networks IN2097

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

ACHILLES CERTIFICATION. SIS Module SLS 1508

Chapter 13 Internet Protocol (IP)

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Network Models and Protocols

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Computer Networks. Main Functions

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Computer Networks/DV2 Lab

Firewalls und IPv6 worauf Sie achten müssen!

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

High-Level Data Link Control

Internetworking and IP Address

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

Internet Protocol Version 6 (IPv6)

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Security Technology White Paper

Network Layer: and Multicasting Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Guideline for setting up a functional VPN

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Transcription:

Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication Every seeming equality conceals a hierarchy. --- Mason Cooley Acknowledgement: this lecture is partially based on the slides of Dr. Larry Peterson

Outline Best Effort Service Model Global Addressing Scheme Datagram forwarding Address translation (ARP) Host configuration (DHCP) Error reporting (ICMP) Virtual private networks and IP tunnels

Outline Best Effort Service Model Global Addressing Scheme Datagram forwarding Address translation (ARP) Host configuration (DHCP) Error reporting (ICMP) Virtual private networks and IP tunnels

IP Internet Network 1 (Ethernet) Concatenation of Networks H1 H2 H3 H7 R3 H8 Network 2 (Ethernet) R1 Network 4 (point-to-point) R2 H4 Network 3 (FDDI) Protocol Stack: H1 -> H8 H5 H6 H1 H8 TCP R1 R2 R3 TCP IP IP IP IP IP ETH ETH FDDI FDDI PPP PPP ETH ETH

Service Model Connectionless (datagram-based) No need for connection setup and related control logic (e.g., assigning VC id and setting up forwarding table) Best-effort delivery (unreliable service) packets can be lost packets can be delivered out of order duplicate copies of a packet can be delivered packets can be delayed for a long time

IP datagram format 0 4 8 16 19 31 Version HLen TOS Length Ident Flags Offset TTL Protocol Checksum SourceAddr DestinationAddr HLen: header length in # of 32-bit words TOS: types of service to differentiate different application traffic Length: datagram length (including header) in # of bytes Options (variable) Data Pad (variable) <Ident, Flags, Offset>: fragmentation & reassembly TTL: avoiding loops (# of hops) Protocol: demultiplexing key Checksum: calculated by regarding IP header as a sequence of 16-bit works

Fragmentation and Reassembly Each network has some maximum transmission unit (MTU) Design decisions fragment when necessary (MTU < Datagram) try to avoid fragmentation at source host by choosing datagram size to be no more than MTU for the link associated with source re-fragmentation is possible when a downstream link has smaller MTU than an upstream link fragments are self-contained datagrams delay reassembly until destination host, for simplicity: not knowing the right size to reassemble efficiency: not knowing whether will be fragmented again do not recover from lost fragments; i.e., a whole IP datagram is discarded if a single fragment gets lost thus fragmentation is a good thing to avoid, for instance, by performing path MTU discovery

Example Start of header Ident = x 0 Offset = 0 Rest of header unfragmented packet H1 R1 R2 R3 H8 R1 R2 R3 (a) 1400 data bytes ETH IP (1400) FDDI IP (1400) PPP IP (512) ETH IP (512) PPP IP (512) ETH IP (512) Ident = x Start of header 1 Offset = 0 PPP IP (376) ETH IP (376) Rest of header (b) 512 data bytes ID of the original/unfragmented packet Ident = x Start of header 1 Offset = 64 Rest of header fragmented packets M (more) bit in the IP Flag field Ident = x 512 data bytes Start of header 0 Offset = 128 * 8 bytes Rest of header 376 data bytes

Outline Best Effort Service Model Global Addressing Scheme Datagram forwarding Address translation Host configuration (DHCP) Error reporting (ICMP) Virtual private networks and IP tunnels

Global Addresses Properties globally unique global support by different technologies hierarchical: network + host Classful addressing & Dot Notation Class A: 10.3.2.4 Class B: 128.96.33.81 Class C: 192.12.69.77 (a) (b) (c) 7 24 0 Network Host 14 16 1 0 Network Host 21 8 1 1 0 Network Host Classless addressing (to be discussed)

Outline Best Effort Service Model Global Addressing Scheme Datagram forwarding Address translation Host configuration (DHCP) Error reporting (ICMP) Virtual private networks and IP tunnels

Datagram Forwarding Strategy every datagram contains destination s address if directly connected to destination network (via a local physical network), then forward to host if not directly connected, then forward to some router forwarding table maps network number into next hop each host has a default router each router maintains a forwarding table

Example forwarding table: R2 Network 1 (Ethernet) H1 H2 H3 H7 R3 H8 Network 2 (Ethernet) R1 H4 Network 3 (FDDI) R2 Network 4 (point-to-point) Network Number Next Hop 1 R3 2 R1 H5 H6 3 interface 1 4 interface 0 Hierarchical addressing improves scalability: routers maintain table for networks rather than hosts

Outline Best Effort Service Model Global Addressing Scheme Datagram forwarding Address translation Host configuration (DHCP) Error reporting (ICMP) Virtual private networks and IP tunnels

Address Translation Map IP addresses into physical/link-layer addresses destination host next hop router Techniques encode physical address in host part of IP address (-) constrains the length of physical address table-based look up Address resolution protocol (ARP) table of IP to physical address bindings broadcast request if IP address not in table target machine responds with its physical address table entries are discarded if not refreshed (e.g., within 10 minutes)

ARP Packet Format 0 8 16 31 Hardware type = 1 ProtocolType = 0x0800 HLen = 48 PLen = 32 Operation SourceHardwareAddr (bytes 0-3) SourceHardwareAddr (bytes 4-5) SourceProtocolAddr (bytes 0-1) SourceProtocolAddr (bytes 2-3) TargetHardwareAddr (bytes 0-1) TargetHardwareAddr (bytes 2-5) TargetProtocolAddr (bytes 0-3) HardwareType: type of physical network (e.g., Ethernet) ProtocolType: type of higher layer protocol (e.g., IP) HLEN & PLEN: length of physical and protocol addresses Operation: request or response Source/Target-Physical/Protocol addresses

ARP Details ARP Request carries information about IP & physical addresses of the source A node receiving the ARP request updates table with source when it is the target refreshes table if it already has an entry for the source otherwise, does not refresh/update table Why?

Outline Best Effort Service Model Global Addressing Scheme Datagram forwarding Address translation Host configuration (DHCP) Error reporting (ICMP) Virtual private networks and IP tunnels

Dynamic host configuration protocol (DHCP) Automatically configure information such as IP address, gateway/default router, DNS, etc. Reduces the overhead and probability of errors in manual configuration Uses available IP addresses efficiently: not all nodes are up all the time Also support fixed binding of IP and MAC-address through manual configuration at DHCP server side System setup: clients DHCP server

DHCP: with relay agent Not want to maintain a DHCP server for every network Unicast to server DHCP relay Other networks DHCP server Broadcast Host

Outline Best Effort Service Model Global Addressing Scheme Datagram forwarding Address translation Host configuration (DHCP) Error reporting (ICMP) Virtual private networks and IP tunnels

Internet Control Message Protocol (ICMP) ICMP sits over IP Error reporting: from routers to source hosts Destination unreachable (e.g., due to link failure) TTL exceeded (so datagrams don t cycle forever) Checksum failed Reassembly failed Utilities Redirect (from router to source host): a router informs a host of better route (e.g., in helping a host setting the best default router ) Echo (ping) is implemented using ICMP packets

ping

Outline Best Effort Service Model Global Addressing Scheme Datagram forwarding Address translation Host configuration (DHCP) Error reporting (ICMP) Virtual private networks and IP tunnels

Virtual private networks (VPN) To provide controlled connectivity among hosts for reasons such as security VPN via Virtual circuits, LAN switching, etc (over a single network) IP tunneling (over network of networks)

VPN via virtual circuits (frame relay, ATM, etc.) C Physical links A Corporation X private network B Two separate private networks K L M (a) Corporation Y private network K C L Physical links Two VPNs sharing common switches A M B (b) Virtual circuits

VPN via IP tunneling Network 1 Internetwork R1 R2 Network 2 10.0.0.1 IP header, IP header, IP header, Destination = 2.x Destination = 10.0.0.1 Destination = 2.x IP payload IP header, Destination = 2.x IP payload IP payload

Benefits of IP tunneling Supplemented with encryption, a tunnel becomes a private link Incremental deployment of new network services (i.e., nodes in between two devices may not support the service) E.g., MBone for network-layer multicast Q: how are peer-to-peer networks different from VPNs via IP tunneling? Force a packet to be delivered to a particular place even if its original header might suggest otherwise E.g., Mobile IP: packet redirection at the home host

Overhead of IP tunneling Increased header overhead, especially for short packets Management cost: configuring tunnels, etc

Summary of IP Deal with heterogeneity Best-effort service: minimum assumption about underlying networks A global, common address space A common IP packet format Deal with scale Hierarchical (network + host) address: reduces information maintained at routers (scale in control state) Automatic configuration: DHCP, etc. (scale in management) IP tunneling for VPN