Internet Technologies 3-Networking. F. Ricci 2010/2011

Similar documents
Internet Concepts. What is a Network?

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

TCP/IP Basis. OSI Model

Objectives of Lecture. Network Architecture. Protocols. Contents

Protocols and Architecture. Protocol Architecture.

Lecture 28: Internet Protocols

Overview of Computer Networks

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Internet Protocols. Addressing & Services. Updated:

Ethernet. Ethernet. Network Devices

Transport and Network Layer

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Chapter 5. Data Communication And Internet Technology

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Networking Test 4 Study Guide

Technical Support Information Belkin internal use only

The OSI and TCP/IP Models. Lesson 2

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

Final for ECE374 05/06/13 Solution!!

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Computer Networks CS321

Mathatma Gandhi University

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Protocols. Packets. What's in an IP packet

Lab - Observing DNS Resolution

Terminology. Internet Addressing System

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Internet Control Protocols Reading: Chapter 3

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

BASIC ANALYSIS OF TCP/IP NETWORKS

How do I get to

Protocol Data Units and Encapsulation

The TCP/IP Reference Model

Introduction to Network Operating Systems

CSE 3461 / 5461: Computer Networking & Internet Technologies

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Network Models and Protocols

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Internet Protocol Address

Layered Architectures and Applications

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Communication Networks. MAP-TELE 2011/12 José Ruela

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Advanced Higher Computing. Computer Networks. Homework Sheets

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Introduction to TCP/IP

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Computer Networks & Security 2014/2015

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

CPS221 Lecture: Layered Network Architecture

Connecting with Computer Science, 2e. Chapter 5 The Internet

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

How To Understand The Layered Architecture Of A Network

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Networking Technology Online Course Outline

Internetworking and IP Address

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

Basic Network Configuration

Introduction to computer networks and Cloud Computing

Computer Networks III

Introduction to Computer Networks

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

How To Understand And Understand Network Theory

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Data Communication Networks Introduction

Data Communication and Computer Network

IP address format: Dotted decimal notation:

The OSI Model: Understanding the Seven Layers of Computer Networks

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

The Internet. Internet Technologies and Applications

SSVVP SIP School VVoIP Professional Certification

Communications and Networking

Connecting to and Setting Up a Network

Architecture and Performance of the Internet

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

8.2 The Internet Protocol

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Introduction Chapter 1. Uses of Computer Networks

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Transport Layer Protocols

TCP/IP, Addressing and Services

Networking 4 Voice and Video over IP (VVoIP)

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

OSI Reference Model: An Overview

IT4405 Computer Networks (Compulsory)

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Using MIS 3e Chapter 6A Appendix

Transcription:

Internet Technologies 3-Networking F. Ricci 2010/2011

Content Protocol Hierarchies Services and protocols Service Primitives Connection-Oriented and Connectionless Services Reference models OSI reference model TCP/IP reference model IP numbers Network address translation Domain Name System

Protocol Hierarchies Layers, protocols, and interfaces

Protocol Hierarchies (I) Networks protocols are organized as a stack of layers or levels Why? To reduce the design complexity The number, the type, the function of the layers may differ from network to network Each layer: offers some services to the layer above shade the details of how the service is implemented Logically, each layer of one machine talks with the same layer on another machine No data are actually transferred from higher layers - only at the lowest level! The rules of this conversation are called protocol Network architecture: a set of layers and protocols.

Service and Protocol Services: mechanism for computers to interact (application layer) - typically refers to the overall solution (e.g. a file transfer service) A service is a set of primitives (operations) that a layer provides to the layer above Protocol describes the details of how interaction works: Set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities Ex: HTTP service builds on TCP/IP protocol Service is like an abstract data type, it defines the operations, and the protocol (and the lower layer services) is like the implementation.

Services to Protocols Relationship The relationship between a service and a protocol

Protocol Hierarchies (2) The philosopher-translator-secretary architecture

Protocol Hierarchies (3) Example information flow supporting virtual communication in layer 5.

Service Primitives A service is specified by a set of primitives (operations) available to a user process to access the service S C S C C Five service primitives for implementing a simple connection-oriented service (byte-stream).

Service Primitives (2) Packets sent in a simple client-server interaction on a connection-oriented network.

Reference Model (OSI) Conversations between a machine and its neighbour Source and destination talks

Reference model (I) Application layer: service location support multimedia wired and wireless access to www Presentation layer: conversion of data structures from abstract to concrete, e.g., a banking record - (not in TCP/IP) Session layer: dialogue control (not in TCP/IP) Transport layer: accept data from the above layer, split in smaller units and pass to the network layer establish an end-to-end connection quality of service flow and congestion control Network layer: control the operation in a subnet routing packets addressing - handover between networks.

Reference model (II) Data link layer: transform a raw transmission in a line free of undetected transmission errors Accessing the medium multiplexing (break the data in data frames) - error correction synchronization Physical layer: conversion of stream of bits into signals Signals are a function of time and location If someone sends 1 it must received as 1 How many volts used to represent 1 How many nanoseconds 1 is long In wireless networks: carrier generation - frequency selection signal detection encryption

Wave propagation http://www.isvr.soton.ac.uk/spcg/tutorial/tutorial/startcd.htm

Signals A [V] Different representations of signals amplitude (amplitude domain) frequency spectrum (frequency domain) phase state diagram (amplitude M and phase ϕ in polar coordinates) A [V] Q = M sin ϕ t[s] ϕ I= M cos ϕ ϕ f [Hz] Composed signals transferred into frequency domain using Fourier transformation Digital signals need: infinite frequencies for perfect transmission modulation with a carrier frequency for transmission (analog signal!)

Digital modulation Modulation of digital signals known as Shift Keying Amplitude Shift Keying (ASK): very simple low bandwidth requirements very susceptible to interference 1 0 1 1 0 1 t Frequency Shift Keying (FSK): needs larger bandwidth t Phase Shift Keying (PSK): more complex robust against interference 1 0 1 t

Sending Data Along Wires Connection-oriented - Circuit switched Persistent connection set up between sender and receiver Example: telephone system Connectionless - Packet switched Data partitioned into packets and sent individually from sender to receiver Reassembled at receiver

Comparison of Switching Technologies Circuit switched Advantages Only route once Latency and bandwidth constant Disadvantages Idle resources unavailable for other connections Large setup time Single point of failure Distributed state Packet switched Advantages Efficient use of wires Small startup overhead Disadvantages Route each packet Per packet overhead Bursty traffic is intermittent

TCP/IP Aimed at connecting multiple networks in a seamless way First defined by Cerf and Kahn in 1974 Built on connectionless technology information is sent as a sequence of datagrams (at the network level) IP (network layer) is responsible for routing the individual datagrams TCP (transport layer) is responsible for breaking up the messages into datagrams, reassembling them at the other end, in the right order resending anything that get lost.

The TCP/IP reference model Link Layer

Terminology http://en.wikipedia.org/wiki/internet_protocol_suite

IEEE standard 802.11 mobile terminal fixed terminal application TCP IP LLC 802.11 MAC 802.11 PHY Transport layer Network layer Data link layer Physical link l. access point 802.11 MAC 802.11 PHY LLC infrastructure network 802.3 MAC 802.3 PHY application TCP IP LLC 802.3 MAC 802.3 PHY

Internet Layer (IP) Permit hosts to inject packets into any network and have them travel independently to the destination They may arrive in a different order than they were sent (the upper layers reorder them) Defines the official form of the IP packets Deliver packets were they are supposed to arrive (routing) Avoid congestions of the packets.

Transport Layer (TCP - UDP) Allows the peer entities to carry on a conversation TCP Transmission Control Protocol: reliable connection-oriented protocol allowing a bytestream originating in one machine to be delivered to another Fragments the byte-stream in packets reassembled at destination UDP User Datagram Protocol: unreliable (i.e., the upper layer must take care), connectionless protocol Used when prompt delivery is more important Transmission of speech and video (streaming).

TCP/IP and the Reference Model Protocols and networks in the TCP/IP model initially.

Internet Protocols TCP/IP and DNS are only two Internet Protocols there are many others HTTP (HTTPS) HyperText Transfer Protocol: request/response protocol between clients and servers (get HTML pages) SMTP (Simple Mail Transfer Protocol): send mail message POP3 (Post Office): to retrieve e-mail from a remote server over a TCP/IP connection FTP (File Transfer): for exchanging files SSL (Secure Socket Layer): cryptographic protocols which provide secure communications

Application and Transport Application Application-layer protocol electronic mail SMTP TCP remote terminal access Telnet Underlying Transport Protocol TCP Web HTTP TCP File transfer FTP TCP Remote file server NFS typically UDP Streaming multimedia proprietary typically UDP Internet telephony proprietary typically UDP Network Management SNMP typically UDP Routing Protocol RIP typically UDP Name Server DNS typically UDP

IPv4 Addresses Every host on the Internet has a unique IP address. This is a 32 bit number 4.294.967.296 (2 32 ) possible unique addresses In practice less because some numbers are reserved for "private networks" and "multicast" Normally noted as Dotted Quads 192.0.34.163 In 32 Bits this reads: 11000000000000000010001010100011 k i=0 2 i = 2 k +1 1 10100011 = 163 1*2 7 + 0*2 6 + 1*2 5 + 0*2 4 + 0*2 3 + 0*2 2 + 1*2 1 + 1*2 0 = 128 + 32 + 2 + 1 = 163

IP Addresses IP addresses are specified in the "source address" and "destination address" of IP packets IP address does not refer to a Host, but to a network interface (a host may be in two networks, e.g., your laptops, ethernet and wifi) Network numbers are managed by a nonprofit organization: ICANN Internet Corporation for Assigned Names and Numbers ICANN delegates part of the address space to various regional authorities E.g. in Italy

IP Addresses Formats Now this is obsolete, has been replaced by another scheme (CIDR - Classless Inter-Domain Routing ).

Classless Inter-Domain Routing Re-division of Class-A, -B and -C networks so that smaller (or larger) blocks of addresses may be allocated to various entities (Internet service providers, or their customers) or local area networks /8 means 8 bits in the mask, i.e., the 8 highest bits are fixed, cannot vary Examples of reserved blocks 10.0.0.0/8 Private network 127.0.0.0/8 Loopback 172.16.0.0/12 Private network 192.168.0.0/16 Private network 255.255.255.255 Broadcast Private networks: these ranges are not routable outside of private networks and private machines cannot directly communicate with public networks. http://en.wikipedia.org/wiki/ipv4

Addressing in Action IP Address Subnet Mask The last 8 bits used for hosts Gateway Local router to forward traffic to DNS server Translates names to IP addresses If you look at that properties you will not find any address because you get these from DHCP

Mac equivalent Private Network fixed 161 = 10100001 240 = 11110000 175 = 10101111

ipconfig

Subnets A campus network consisting of LANs for various departments Each subnet has its own router connected to the main router Outside the network the subnetting is not visible

Subnet When a packet arrives to the main router (for an IP address) it looks at the address of the subnet and send it to the correct router (of the subnet) Ex: instead of having 14 bits for the network address and 16 for the host: Some bits are taken away from the host number to create a subnet number, e.g., 6 bits

Subnet Mask A class B network subnetted into 64 (2 6 ) subnets Subnet mask is written typically as: 255.255.252.0? Why 252? 11111100 = 252 6 bits are common to all the host in the subnet, and the last 2 down can vary. http://www.binaryconvert.com/

Example My subnet mask is: 255.255.240.0 11111111 11111111 11110000 00000000 My computer has IP is: 10.10.168.16 00001010 00001010 10101000 00010000 Hence the other addresses in the same subnet are from: 00001010 00001010 10100000 0000000 to: 00001010 00001010 10101111 1111111 Or in other words; from: 10.10.160.0 (reserved) to: 10.10.175.255 (broadcast to the subnet) 10.10.160.1 is the router of the subnet

IP addresses are scarce If an ISP has more users than IP addresses for hosts it could assign dynamically the address to a PC when it calls up This does not work for business customers: they want to be always connected or with your flat rate ADSL You may also have more than one computer attached to the ADSL Solution: NAT (Network Address Translation) One single IP address for interconnecting Each internal host has an IP number in a list used only internally.

NAT Network Address Translation The packet exits as sent by 198.60.42.12 But when a packets comes for host 1, how we may know it is for it?

NAT Internal addresses (/8 means 8 bits in the mask, i.e., the 8 highest bits are fixed, cannot vary) 10.0.0.0 10.255.255.255/8 (16.777.216 hosts) 172.16.0.0 172.31.255.255/12 (1.048.576 hosts) 192.168.0.0 192.168.255.255/16 (65.536 hosts) The packets originating from a internal host store a source port identifier 16 bits NAT assigns to all the packets originating from an internal host a new source port and stores the association host-port in a table The destination port of an incoming packet is the source port identifier of the internal host that originated the request.

Example The IP seen from outside when I make an http request http://www.kloth.net/services/wru.php My local IP number is instead 10.10.161.15

IP numbers and Host names We could send an email to fricci@193.206.186.140 but no one can remember the numbers (? With telephones we do!) and if the mail server is moved to another host? DNS allows us to use names instead of these difficult IP addresses To decouple machine names from machine addresses

When you click on a http://www.unibz.it The browser determines the URL (sees what is selected) The browser ask DNS for the IP address of www.unibz.it DNS replies with 193.206.186.140 The browser makes a TCP connection to port 80 on 193.206.186.140 It sends over a request asking for path "/" and default filename The www.unibz.it server sends the file /index.html The TCP connection is released The browser displays all the text in index.html (formatting the text according to the instructions contained in the page).

Domain Name Service (DNS) In ARPANET there was just a file, hosts.txt, listing all the hosts and their IP numbers DNS is a distributed database maps host names --> numerical IP Address Hierarchical Namespace Top-level domain (root domain) more that 200 http://www.iana.org/domains/root/db/.com,.net,.org Second-level domain hotmail.com, stanford.edu Sub domains www.yahoo.com, movies.yahoo.com

DNS and Routing Both are Hierarchical IP Routing Hierarchy is left to right (128.12.132.29) DNS Hierarchy is right to left (www.stanford.edu) Domain names are case insensitive Naming is a logical partition (organizational boundary) not a physical one Leaf nodes of the DNS can contain one host but even thousands (think about www.google.com!)

The DNS Name Space A portion of the Internet domain name space Leaves are hosts To get a second level domain, e.g., ricci.com, you go to a register for.com and ask if this is available

http://www.kloth.net/services/nslookup.php

Resource Records Every domain (single host or a top-level domain) has a set of resource records (one for each type of info on the domain) When you query a domain name to DNS you get back some resource records structured as: Domain_name : the domain to which the record applies Time_to_live : large numbers (e.g. 86400 secs) for stable information Class : IN for Internet information Type : the type of information Value : the value of the info

Type field of a resource record The principal DNS resource records types:

DNS lookup for unibz.it http://www.dnswatch.info

Name Servers Part of the DNS name space showing the division into zones.

Name Server To avoid single-point-failure DNS is divided into non overlapping zones One zone contain a part of the tree and name servers holding the information for that zone A zone has a primary name server and one or more secondary name servers http://www.internic.net/zones/named.root) http://www.root-servers.org/ When a resolver A has a query it passes it to a local name server B If the queried domain is under the jurisdiction of B, this returns the information requested If the domain is remote the local name server send a query to the top-level name server And this down to the relevant subdomain name server.

Example How a resolver (running on flits.cs.vu.nl) looks up a remote name (cs.yale.edu) in eight steps

www.dnswatch.info primary server

*.unibz.it subdomains http://searchdns.netcraft.com/?host

IP addresses of unibz.it subdomains Domain IP unibz.it 193.206.186.101 www.unibz.it 193.206.186.140 www.inf.unibz.it 193.206.186.198 http://aws.unibz.it 193.206.186.168 http://pro.unibz.it 193.206.186.142 My computer (not a domain!) 193.206.186.101 (NAT)