An Introduction to Computer Networks

Download Report

Transcript An Introduction to Computer Networks

An Introduction
to
Computer Networks
Lecture 10: Internetworking
University of Tehran
Dept. of EE and Computer Engineering
By:
Dr. Nasser Yazdani
Univ. of Tehran
Introduction to Computer Network
1
Outline





Internetworking
Best Effort Service Model
Segmentation and Reassembly (SAR)
Global Addressing Scheme
Packet forwarding.
Univ. of Tehran
Introduction to Computer Network
2
Internetworking


Communication between networks, either directly
connected or switched
Problems:






Different Networking technologies (Heterogeneity).
So many Networks (Scaling).
Surviving in case of failure.
Different services
etc.,
Some terminologies:


“internetworking” refer to an arbitrary collection of
connected networks.
“Internet” the global internetwork.
Univ. of Tehran
Introduction to Computer Network
3
Goals of the DARPA project
0
Connect existing networks

1.
Survivability
-
2.
3.
4.
5.
6.
initially ARPANET and ARPA packet radio network
ensure communication service even in the
presence of network and router failures
Support multiple types of services
Must accommodate a variety of networks
Allow distributed management
Allow host attachment with a low level of effort
Univ. of
Tehran
Introduction to Computer Network
Allow
resource
accountability
4
IP Internet


Concatenation of Networks or
“networks of Networks”.
“R” is routers and “H” is hosts.
Network 1 (Ethernet)
H7
H2
H1
R3
H8
H3
Network 4
(point-to-point)
Network 2 (Ethernet)
R1
R2
H4
Network 3 (FDDI)
H5
Univ. of Tehran
H6
Introduction to Computer Network
5
IP Internet (cont)

Protocol Stack
H1
H8
TCP
IP
IP
ETH

R2
R1
ETH
FDDI
R3
IP
FDDI
IP
PPP
PPP
TCP
IP
ETH
ETH
Everything is running on top of IP, “IP
over everything”
Univ. of Tehran
Introduction to Computer Network
6
Service Model


Connectionless (datagram-based)
Best-effort delivery (unreliable service)





packets are lost. No recover from lost.
packets are delivered out of order
duplicate copies of a packet are delivered
packets can be delayed for a long time
Datagram format
0
8
4
Version HLen
16
TOS
Ident
•Contains all information
for routing of a packet.
TTL
19
Length
Flags
Protocol
Offset
Checksum
SourceAddr
DestinationAddr
Options (variable)
Data
Univ. of Tehran
31
Introduction to Computer Network
Pad
(variable)
7
Packet Headers
The current Version is 4 or IPv4.
 HLen- the Header Length: from 5-15 in 32-bit
words.
 Length- the total length of the packet including
headers. Max length is 64K.
TTL: Time To Live is expressed in second. It is to
prevent packet from permanently circulating in a
loop.
 Protocol: specify the packet application ex. 1 for
ICMP. It is for demultiplexing to higher layer
protocols.
 Checksum: is a 1-complement error checksum for
the header only.
Univ. of Tehran
Introduction to Computer Network
8
Packet Headers (Cont)

TOS: type of Service

Precedence
Specify the priority

Type of Services
0
2 | 3
Precedence
7
Type of service
D
T
R
C
Specify routing, for instance cheapest, fastest and
more reliable

D for Delay

T for Throughput

R for Reliability

C for low cost.

Note: Precedence is only for inside
channel queuing.
Univ. of Tehran
Introduction to Computer Network
9
Packet Headers (Cont)

Options
C
Class
Number
If C set, the option will copied to all fragments.
Otherwise, only to the first one.

Class 0 for control

Class 2 for debugging and measurement.
Options are rarely used in today except for
‘loose’ and ‘strict’ source routing parameters.
‘loose’ and ‘strict’ source option sometimes, is
used for IP encapsulation in another IP or
“Tunneling”
Univ. of Tehran
Introduction to Computer Network
10
Fragmentation and Reassembly
0
7|0
7|0
Identification
4
7|0
Flags
 Flags
 DF: Don’t Fragment
 MF: More Fragment coming
7
Fragment Offset
0
1
2
0
DF
MF
In fragmentation, IP copy the original header and only modify
The length, which is the new length, and offset.
Offset is used for reassembly.
 Note: Fragmentation may degrade the network performance.
That is why the IP packet should be the same of TCP packets
Modern TCP implement “Path MTU discovery”.
It start with large packet and with DF set flag, if it passed
TCP keeps the same packet size, otherwise, it reduces it.
Univ. of Tehran
Introduction to Computer Network
11
Fragmentation and Reassembly
(cont)


Each network has a Maximum Transfer Unit size,
MTU
Strategy
 fragment when necessary (MTU < Datagram)
 try to avoid fragmentation at source host
 re-fragmentation is possible
 fragments are self-contained datagrams
 use CS-PDU (not cells) for ATM
 delay reassembly until destination host
 do not recover from lost fragments
Univ. of Tehran
Introduction to Computer Network
12
Example
• Packet delivery from host H1 to host H8
H1
R1
ETH IP(1400)
Univ. of Tehran
R2
FDDIIP(1400)
R3
H8
PPP IP(512)
ETH IP(512)
PPP IP(512)
ETH IP(512)
PPP IP(376)
ETH IP(376)
Introduction to Computer Network
13
Example (cont)
The packets are fragmented as:
Start of header
Ident = x
1
Offset = 0
Rest of header
Start of header
Ident = x
0
512 data bytes
Offset = 0
Rest of header
1400 data bytes
Start of header
Ident= x
1 Offset= 512
Rest of header
512 data bytes
Start of header
Ident = x
0 Offset= 1024
Rest of header
376 data bytes
Univ. of Tehran
Introduction to Computer Network
14
Addressing

Each host in the network is identified by an
address having the following property.



globally unique
hierarchical: network + host
Address Classes


Class D for Multicasting
Class E for experiments
A:
B:
7
24
0 Network
1 0
Host
14
16
Network
Host
21

Address Notation



C:
1 1 0
Network
8
Host
10.3.2.4
128.96.33.81
192.12.69.77
Univ. of Tehran
Introduction to Computer Network
15
IP Addresses
Example:
Class “A” address
www.mit.edu
18.181.0.31
(18<128 => Class A)
Class “B” address
Class C)
Univ. of Tehran
mekong.stanford.edu
171.64.74.155
(128<171<128+64 =>
www.ece.ut.ac.ir
194.225.
Introduction to Computer Network
16
Addressing in IP




IP addresses are names of interfaces
Domain Name System (DNS) names are
names of hosts
DNS binds host names to interfaces
Routing binds interface names to paths
Univ. of Tehran
Introduction to Computer Network
17
How to assign IP Addresses?

Manually



Uniqueness
Too much and tedious job
Dynamically: use DHCP: Dynamic Host
Configuration Protocol.
Univ. of Tehran
Introduction to Computer Network
18
Making a Forwarding Decision
IP Address Space
Class A
Class B
Class A
212.17.9.4
Class B
Class C
Univ. of Tehran
Class C
D
Routing Table:
Exact
Match
212.17.9.0
Introduction to Computer Network
212.17.9.0 Port 4
19
Forwarding Datagrams



Every datagram contains a destination
address.
“Network ID” uniquely identifies a
physical network.
All hosts and routers sharing a Network
ID share same physical network.
Univ. of Tehran
Introduction to Computer Network
20
Forwarding an IP Router
• Lookup packet DA in forwarding table.
– If known, forward to correct port.
– If unknown, drop packet.
• Decrement TTL, update header Checksum.
• Forward packet to the outgoing interface.
• Transmit packet onto link.
Univ. of Tehran
Introduction to Computer Network
21
Address Translation

Map IP addresses into physical addresses



Techniques



destination host
next hop router
encode physical address in host part of IP address
table-based
ARP




table of IP to physical address bindings
broadcast request if IP address not in table
target machine responds with its physical address
table entries are discarded if not refreshed
Univ. of Tehran
Introduction to Computer Network
22
ARP Details

Request Format






HardwareType: type of physical network (e.g., Ethernet)
ProtocolType: type of higher layer protocol (e.g., IP)
HLEN & PLEN: length of physical and protocol addresses
Operation: request or response
Source/Target-Physical/Protocol addresses
Notes




table entries timeout in about 10 minutes
update table with source when you are the target
update table if already have an entry
do not refresh table entries upon reference
Univ. of Tehran
Introduction to Computer Network
23
ARP Packet Format
0
8
16
Hardware type = 1
HLen = 48
31
ProtocolType = 0x0800
PLen = 32
Operation
SourceHardwareAddr (bytes 0 – 3)
SourceHardwareAddr (bytes 4
SourceProtocolAddr (bytes 2
– 5) SourceProtocolAddr (bytes 0
– 3)
– 1)
TargetHardwareAddr (bytes 0 – 1)
TargetHardwareAddr (bytes 2
TargetProtocolAddr (bytes 0
– 5)
– 3)
•HLen = Hardware Address Length
•PLen = Protocol Address Length
Univ. of Tehran
Introduction to Computer Network
24
Internet Control Message
Protocol (ICMP)







Echo (ping)
Redirect (from router to source host)
Destination unreachable (protocol, port,
or host)
TTL exceeded (so datagrams don’t cycle
forever)
Checksum failed
Reassembly failed
Cannot fragment
Univ. of Tehran
Introduction to Computer Network
25
Tunneling


Big companies having different networks want to
connect them together.
Virtual Private Network (VPN)


Use leased line to connect networks.
Use Internet (Shared line).
Network 1

Sloution

R1
Internet
R2
Network 2
Virtual line
Encapsulate packets in R1 in IP packets for destination
R2.
Univ. of Tehran
Introduction to Computer Network
26
IP Address Problem (1991)

Inefficient use of Hierarchical Address Space



class C with 2 hosts (2/255 = 0.78% efficient)
class B with 256 hosts (256/65535 = 0.39%
efficient)
Address space depletion




In danger of running out of classes A and B
Class C too small for most domains
Very few class A – IANA (Internet Assigned
Numbers Authority) very careful about giving
Class B – greatest problem
Univ. of Tehran
Introduction to Computer Network
27
IP Address Utilization (‘98)
http://www.caida.org/outreach/resources/learn/ipv4space/
Univ. of Tehran
Introduction to Computer Network
28
Solutions for IP Address

Better utilize address space




Subnetting
Supperneting
Locally use unofficial IP addresses (NATing)
Use wider IP addresses

New version of IP, IPv6.
Univ. of Tehran
Introduction to Computer Network
29
Subnetting

Add another level to address/routing hierarchy:

subnet
Subnet masks define variable partition of host part

Subnets visible only within site
Network number
Host number
Class B address
1111111111111111111
0000000000000000
Subnet mask (255.255.0.0)
Network number
Univ. of Tehran
Subnet ID
Subnetted address
Host ID
Introduction to Computer Network
30
Subnet Example
Subnet
Net
host
Subnet mask: 255.255.255.128.
Subnet number: 128.96.34.0
128.96.34.15
H1
111….1.0xxx….x
128.96.34.1
R1
Subnet mask: 255.255.255.128
Subnet number: 128.96.34.128
128.96.34.130
128.96.34.139
128.96.34.129
H3
128.96.33.14
H2
R2
128.96.33.1 Forwarding
Subnet mask: 255.255.255.0
Subnet number: 128.96.33.0
Univ. of Tehran
table at router R1
Subnet #
128.96.34.0
128.96.34.128
128.96.33.0
Subnet Mask
255.255.255.128
255.255.255.128
255.255.255.0
Introduction to Computer Network
Next Hop
interface 0
interface 1
R2
31
Forwarding Algorithm
D = destination IP address
for each entry (SubnetNum, SubnetMask, NextHop)
D1 = SubnetMask & D
if D1 = SubnetNum
if NextHop is an interface
deliver datagram directly to D
else
deliver datagram to NextHop




Use a default router if nothing matches
Not necessary for all 1s in subnet mask to be
contiguous
Can put multiple subnets on one physical network
Subnets
not visible
fromtothe
rest
of the Internet 32
Univ. of Tehran
Introduction
Computer
Network
Supernetting



Assign block of contiguous network numbers to
nearby networks
Called CIDR: Classless Inter-Domain Routing
Represent blocks with a single pair
(first_network_address, count)



Restrict block sizes to powers of 2
Use a bit mask (CIDR mask) to identify block size
All routers must understand CIDR addressing
Univ. of Tehran
Introduction to Computer Network
33
Classless Addressing
CIDR
Class-based:
A
0
Classless:
B
128.9.0.0
65/8
0
C
D
232-1
142.12/19
128.9/16
216
232-1
128.9.16.14
Univ. of Tehran
Introduction to Computer Network
34
Classless Addressing
CIDR
128.9.19/24
128.9.25/24
128.9.16/20 128.9.176/20
128.9/16
0
232-1
128.9.16.14
Most specific route = “longest matching prefix”
Univ. of Tehran
Introduction to Computer Network
35
Forwarding Datagrams
128.17.20.1
R2
1
R1 2
3
R3
R4
128.17.16.1
Univ. of Tehran
e.g. 128.9.16.14 => Port 1
Prefix
Next-hop
Port
65/8
128.9/16
128.9.16/20
128.9.19/24
128.9.25/24
128.9.176/20
142.12/19
128.17.16.1
128.17.14.1
128.17.14.1
128.17.10.1
128.17.14.1
128.17.20.1
128.17.16.1
3
2
1
7
2
1
3
Introduction to Computer Network
36
Default Routing
R1
Default
Routing
R2
Univ. of Tehran
R3
Requires
Routing
Table
R4
Introduction to Computer Network
R5
Default
Routing
37
Inside a Router
1.
Forwarding
Table
2.
3.
Output
Scheduling
Interconnect
Forwarding
Decision
Forwarding
Table
Forwarding
Decision
Forwarding
Table
Forwarding
Decision
Univ. of Tehran
Introduction to Computer Network
38
NAT: Network Address
Translation

IP addresses need to be unique when we are going
outside of our network.


We can use whatever IP address as long as we are
functioning inside our own network.
Translate to a valid IP address when going
out. Do reverse when coming in.
Univ. of Tehran
Introduction to Computer Network
39
Mobile IP: Motivation

Connectivity everywhere




Overlapping, heterogeneous networks
Small, portable devices
Maintaining ongoing connections as the
user moves
Why maintain connectivity?


Avoid restarting applications/networks
Avoid losing “distributed state”
Univ. of Tehran
Computer Network
40
Problems?




The IP address associated with a mobile
host is network dependent!
When user connects to another network,
IP address needs to change
Packets belonging to ongoing connections
somehow need to be delivered to the
mobile host
Solutions?

Any solution should be transparent
Intuitive Solution




Take up the analogy of you moving from
one apartment to another
What do you do?
Leave a forwarding address with your old
post-office!
The old post-office forwards mails to your
new post-office, which then forwards
them to you
Basic Mobile IP
MH = mobile host
CH = correspondent host
HA = home agent
FA = foreign agent
(We’ll see later that FA
is not necessary or even
desirable)
CH
Home network
HA
Foreign network
FA
MH
•MH registers new “care-of address” (FA) with HA
•HA tunnels packets to FA
•FA decapsulates packets and delivers them to MH
Univ. of Tehran
Computer Network
43
Packet Tunneling
Packet from CH to MH
Source address = address of CH
Destination address = home IP address of MH
Payload
Home agent intercepts above packet and tunnels it
Source address = address of HA
Destination address = care-of address of MH
Source address = address of CH
Destination address = home IP address of MH
Original payload
Univ. of Tehran
Computer Network
44
host moves again
CH
Home network
HA
Foreign network #1
FA #1
MH
Foreign network #2
FA #2
MH
•MH registers new address (FA #2) with HA & FA #1
•HA tunnels packets to FA #2, which delivers them to MH
•Packets in flight can be forwarded from FA #1 to FA #2
Univ. of Tehran
Computer Network
45
Basic Mobile IP (cont)
Mobile hosts also send packets
CH
Home network
HA
Foreign network
FA
MH
•Mobile host uses its home IP address as source address
-Lower latency
-Still transparent to correspondent host
-No obvious need to encapsulate packet to CH
•This is called a “triangle route”
Univ. of Tehran
Computer Network
46
Mobile IP (RFC 2002)





Leaves Internet routing fabric unchanged
Does assume “foreign Agent ” exist
everywhere
Simple
Correspondent hosts don’t need to know
about mobility
Works both for changing domains and
network interfaces
Univ. of Tehran
Computer Network
47
IP Version 6

Features








128-bit addresses (classless)
multicast
real-time service
authentication and security
autoconfiguration
Any cast address
protocol extensions
Header


40-byte “base” header
extension headers (fixed order, mostly fixed length)




No fragmentation
source routing
authentication and security
other options
Univ. of Tehran
Introduction to Computer Network
48
IPV6: Packet format
0
4
Version
12
16
24
31
FlowLabel
TrafficClass
PayloadLen
NextHeader
HopLimit
…
SourceAddr (16 bytes)
…
DestinationAddr (16 bytes)
Next header/ Data

Next header: IP option and protocol fields in IPv4. If options
(i.e. fragmentation) indicated by this field, otherwise, it is
protocol fields.
Univ. of Tehran
Introduction to Computer Network
49