The Internet. Internet Technologies and Applications



Similar documents
Transport and Network Layer

8.2 The Internet Protocol

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Network layer: Overview. Network layer functions IP Routing and forwarding

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

IP addressing and forwarding Network layer

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Chapter 4 Network Layer

IP - The Internet Protocol

Technical Support Information Belkin internal use only

Introduction to TCP/IP

2. IP Networks, IP Hosts and IP Ports

Internetworking and Internet-1. Global Addresses

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Future Internet Technologies

Router and Routing Basics

CS335 Sample Questions for Exam #2

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Lecture Computer Networks

RARP: Reverse Address Resolution Protocol

Ethernet. Ethernet. Network Devices

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

Internet Protocols. Background CHAPTER

Chapter 9. IP Secure

IP address format: Dotted decimal notation:

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Internet Protocol version 4 Part I

Address Resolution Protocol (ARP)

BGP. 1. Internet Routing

04 Internet Protocol (IP)

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Networking Test 4 Study Guide

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Cisco Configuring Commonly Used IP ACLs

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Network Layer: Network Layer and IP Protocol

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

NETWORK LAYER/INTERNET PROTOCOLS

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

IP Addressing Introductory material.

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Introduction to Routing

Route Discovery Protocols

IP Addressing. IP Addresses. Introductory material.

Introduction to LAN/WAN. Network Layer (part II)

Overview of TCP/IP. TCP/IP and Internet

Internetworking and IP Address

IP Addressing A Simplified Tutorial

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Internet Protocols. Addressing & Services. Updated:

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

CHAPTER 0 INTRODUCTION TO TCP/IP

Lecture 8. IP Fundamentals

Internet Control Protocols Reading: Chapter 3

Computer Networks. Main Functions

Protocols. Packets. What's in an IP packet

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Internet Architecture and Philosophy

20. Switched Local Area Networks

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Introduction to IP v6

Border Gateway Protocol (BGP)

User Datagram Protocol - Wikipedia, the free encyclopedia

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

Understanding Layer 2, 3, and 4 Protocols

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

Based on Computer Networking, 4 th Edition by Kurose and Ross

The TCP/IP Protocol Suite

Internet and IP addressing

10CS64: COMPUTER NETWORKS - II

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

DG Forwarding Algorithm

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Savera Tanwir. Internet Protocol

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Chapter 1 Personal Computer Hardware hours

Transcription:

The Internet Internet Technologies and Applications

Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking and internets Internet Protocol (IP) The Internet ITS 413 - The Internet 2

Internetworking Each access/core network may use different network technologies Depending on the requirements of users and operators We want any user to be able to communicate with any other user, independent of network technology Use a common network protocol (IP) and routers to connect the networks ITS 413 - The Internet 3

Internet Protocol Features of IP Connection-less, network layer, datagram packet switching system IP datagrams: delivery from source to destination No guarantees! (datagrams may be lost, arrive out-of-order, arrive in error) Multiplexing Protocol numbers are used to identify the type of data (e.g. TCP or UDP) IP addressing Fragmentation and Re-assembly IP is designed to support many different types of transport protocols, and operate over many different types of data link protocols ITS 413 - The Internet 4

IP in Internet 5 Layer Model Many other application protocols ICMP ARP 5 Physical Data Link Other LAN/WAN technologies Frame Relay PDH and SDH X.25 ATM IEEE 802 (Ethernet, Wireless LAN, ) Network Transport Others Application HTTP SMTP POP3 IMAP4 SNMP DNS Routing protocols

IP Hosts and Routers Hosts are the end-devices (stations) Assume hosts have single interface (only attached to one LAN/WAN) In practice, hosts can have multiple interfaces Hosts do not forward datagrams A host is either source or destination; if a host receives a datagram and the host is not the destination, then the host will discard the datagram Routers are the datagram packet switches Routers have two or more interfaces (since they connect LANs/WANs together) Routers forward datagrams Routers can act as a source or destination of datagrams (however this is mainly for management purposes) IP routing is the process of discovering the best path between source and destination Adaptive routing protocols execute on routers/hosts to find the path; the paths are stored in routing tables on routers and hosts IP forwarding is the process of delivering an IP datagram from source to destination ITS 413 - The Internet 6

IP Hosts and Routers Subnet A Subnet B Multiple subnets and routers Subnet Z Source Host Application Protocols Transport Protocols Router 1 Router 2 Router N Destination Host Application Protocols Transport Protocols IP IP IP IP IP DLL A DLL A DLL B DLL B DLL C DLL Y DLL Z DLL Z PHY A PHY A PHY B PHY B PHY C PHY Y PHY Z PHY Z Subnet A Subnet B Subnet Z IP is implemented at Layer 3 (Networking layer) in Hosts and Routers Typically as software in a host or router operating system There may be 0 or more Routers between a source Host and destination Host ITS 413 - The Internet 7

IP Datagram IP datagram consists of a variable length header and variable length of data Header has 20 bytes for required fields; then optional fields bringing maximum size to 60 bytes Data length is variable (but must be integer multiple of 8 bits in length); maximum size of datagram (that is, header + data) is 65,535 bytes 20 bytes ITS 413 - The Internet 8

IP Datagram Fields Version [4 bits]: version number of IP; current value is 4 (IPv4) Header Length [4 bits]: length of header, measured in 4 byte words; minimum value is 5 (20 bytes); maximum is 15 (60 bytes) DiffServ [6 bits]: Used for quality of service control. DiffServ and ECN used to be called Type of Service field. ECN [2 bits]: Used for notifying nodes about congestion Total Length [16 bits]: total length of the datagram, including header, measured in bytes. Max 65535 bytes in datagram Identification: sequence number for datagram Flags: 2 bits are used for Fragmentation and Re-assembly, the third bit is not used Don t Fragment bit: if set to 1, then the datagram will not be fragmented (it will be discarded if fragmentation is needed) More Fragments bit: if datagram is fragmented, then set to 1 on all fragments except the last fragment Fragment Offset [13 bits]: Indicates where this fragment belongs in the original datagram, measured in blocks of 8 bytes Time To Live [8 bits]: how long datagram should remain in internet. In practice used as a hop counter (a router decrements every time it is forwarded) Protocol [8 bits]: indicates the next higher layer protocol with a code (e.g. TCP = 6; UDP = 17; ICMP = 1) Header Checksum [16 bits]: error-detecting code applied to header only (to check for errors in the header); recomputed at each router Source Address [32 bits]: IP address of source host Destination Address [32 bits]: IP address of destination host Options: variable length fields to include options Padding: used to ensure datagram is multiple of 4 bytes in length Data: variable length of the data ITS 413 - The Internet 9

IP Addressing (Classless) 32 bit IP address is divided into two parts: Network portion: identifies the IP network (or subnet) within an internet Host portion: identifies a host within the IP network An address mask or subnet mask identifies where the split is: The mask is 32 bits: a bit 1 indicates the corresponding bit in the IP address is the network portion; a bit 0 indicates the corresponding bit in the IP address is the host portion IP address, 130.17.41.129: 10000010 00010001 00101001 10000001 Subnet mask, 255.255.252.0: 11111111 11111111 11111100 00000000 Network portion Host portion Network, 130.17.40.0: 10000010 00010001 00101000 00000000 The mask can be given in dotted decimal form or a shortened form, which counts the number of 1 bits The above example can be written as /22, and the IP address as 130.17.41.129/22 ITS 413 - The Internet 10

Special Cases for IP Addresses There are special case addresses that cannot be used to identify a particular host: Network Address The bits of the Host portion are 0 Used to identify the network, e.g. for routers to send to a network E.g. host 130.17.41.129/22 is on the network 130.17.40.0/22 Broadcast Address (Directed) The bits of the Host portion are 1 Used as a destination for broadcast directed to a specific network E.g. host 130.17.41.129/22 sends to 116.42.2.255/24, then all hosts on network 116.42.2.0/24 will receive the datagram Loopback Address The first 8 bits of Network portion are 01111111 (decimal: 127) Used as a destination address when a host sends to itself E.g. host 130.17.41.129/22 sends to 127.0.0.1, then the datagram will not be sent on the network, but instead to itself (130.17.41.129) Local Broadcast Address All 32 bits are 1 (255.255.255.255) Used as a destination for broadcast to the local network E.g. host 130.17.41.129/22 sends to 255.255.255.255, then all hosts on network 130.17.40.0/22 will receive the datagram Startup Source Address All 32 bits are 0 (0.0.0.0) Used as a source address by a host if the host doesn t know its own IP address E.g. host sends an address to a known server (or local broadcast address) asking for its own IP address; 0.0.0.0 is used as the source ITS 413 - The Internet 11

IP Routing IP does not include a routing protocol; any routing protocol may be used in an IP network Example: Link State Routing Each router records the state of its own links: who do they link to and what does the link cost? Each router sends a Link State Packet to all other routers in the network (using flooding) Repeated when the link state changes For all Link State Packets received, each router finds the least cost path from itself to every other node Dijkstra s algorithm Each router builds its routing table Routing table: in order to reach destination X, send to next node Y IP uses the routing table to determine where to forward IP datagrams ITS 413 - The Internet 12

The Internet Structure Today

Autonomous System (AS) Not practical to have all routers in the Internet participate in routing protocols With large number of routers, overhead from routing protocols becomes too large Routers owned by different organisations, that may use different, incompatible policies Routers are divided into groups based on the owner of a network A group of networks and routers controlled by a single administrative authority is called an autonomous system (AS) Although there are some large companies with AS, most AS correspond to Internet Service Providers (ISPs) Each AS has an AS Number assigned by IANA (or the regional internet registry, such as APNIC) ITS 413 - The Internet 14

AS Examples AS4637: Reach AS38040: TOT Internet Gateway AS2516: KDDI (Japan) Allocated addresses in Thailand, 1 Oct 2008 Source: http://internet.nectec.or.th/ Thailand Internet Map, 13 Oct 2008 Source: http://internet.nectec.or.th/ 15

Routing with Autonomous Systems Routing within an AS is performed using an Interior Gateway Protocol (IGP) Gateway means the same as Router in this context There are different IGPs available and in use; the owner of the AS may choose depending on their requirements RIP, OSPF, IS-IS, IGRP, EIGRP, Routing between AS s is performed using an Exterior Gateway Protocol (EGP) There is only one EGP used in the Internet: Border Gateway Protocol (BGP) Neighbour AS s use BGP to advertise which networks are reachable via each other ITS 413 - The Internet 16

Routers and Autonomous Systems ITS 413 - The Internet 17

Connecting Between Autonomous Systems Two autonomous systems that connect together are known as peers Usually (but not necessarily) an AS represents an ISP Connection between peers requires: Physical Connection Private peering Two peers connect their border routers with a point-to-point connection such as SDH Public peering Multiple peers connect via shared network (e.g. Ethernet), usually at the one location called Internet Exchange Point (IXP or IX) Agreement Often a commercial contract is established, and technical/commercial/social policies agreed upon Different types of agreements: Transit: ISP1 pays ISP2 for traffic of ISP1 to access Internet via ISP2 (ISP2 is usually much larger than ISP1) Peering: ISP1 and ISP2 exchange each others traffic freely ITS 413 - The Internet 18

ISPs, Transit, Peering and Tiers Tier 1 ISPs do not have to pay for transit for any destination on the Internet All Tier 1 ISPs peer with each other Currently about 15 Tier 1 ISPs in the world, including: AT&T, Qwest, NTT/Verio, Verizon, GlobalCrossing, Tier 2 ISPs are large ISPs that must pay for transit from some Tier 1 ISPs Tier 2 ISPs often peer with other ISPs Usually large regional or national ISPs Tier 3 ISPs usually pay for transit from Tier 2 (or 1) ISPs Customers (such as SIIT or you) pay for transit from one of the ISPs (Note the definition of tiers and peering differs across some sources; but the main concept of a hierarchy between ISPs, plus direct peering, applies) ITS 413 - The Internet 19

Example of Transit and Peers Peer Tier 1 AS1 Peer AS2 Peer AS3 Tier 2 AS6 AS4 AS5 AS4 AS7 Tier 3 AS8 AS9 AS10 AS11 AS12 AS13 AS14 AS15 NetA NetB NetC NetD NetE NetF NetG NetH NetI NetJ NetK NetL All links to a higher level AS (or ISP) are transit links: the customer pays for the traffic to transit the upstream ISPs network. All Tier 1 ISPs (AS) must peer with every other Tier 1 ISP ITS 413 - The Internet 20

Example of Transit and Peers Upstream Downstream Here three ISPs have reached agreement so that traffic between their networks is exchanged for free, that is, peering agreements. ITS 413 - The Internet 21

Internet Exchange Points Internet Exchange Points allow many ISPs to peer with each other ISPs have connections into IXPs, and the IXP runs a switched network (often Ethernet) to connect all ISPs IXPs are often large buildings or data centres; large IXPs support 100 s of ISPs AS4 Internet Exchange Point AS6 100/1000 Mb/s Ethernet AS5 ITS 413 - The Internet 22

Content Providers Content Providers are a special case of network in the Internet Example: Google/Youtube, Microsoft, Sony, Yahoo, Most traffic is outbound/upstream (going from Content Provider to ISP and then to customer) Connect to Tier 1/2 ISPs: pay for transit Also creating peering arrangements Example: Google have peering arrangements with multiple Tier2/3 ISPs Google traffic (such as Youtube videos) sent over the peer ISPs network is free Google does not have to pay a higher tier (such as Tier 1) for transit Customers of the ISP get faster access to Google content Peering arrangements between ISPs and Content Providers benefits: Lower transit costs for Content Providers Better service from ISPs; more customers ITS 413 - The Internet 23

Summary IP is used for internetworking the many different access/core networks together Idea: Allow any IP device to communicate with any other IP device in an internet The Internet today has some hierarchical structure Autonomous Systems (AS) typically correspond to Internet Service Providers (ISPs) Within an AS, routing is performed using one of many interior gateway protocols Between AS s, routing is performed using Border Gateway Protocol (BGP) End-users (individuals, businesses) pay for transit via ISPs ISPs pay for transit via other ISPs, and/or peer with ISPs ITS 413 - The Internet 24