Transcript Thailand

Example of Implementation
Kumpol Luengpetngam
Telecommunication Division, RTH:Bangkok
E-mail : [email protected]
Implementation of TCP/IP at RTH Bangkok
The Bangkok RTH has implemented TCP/IP
protocols for Tokyo RTH, Vientiane NMC and
Kuala Lumpur NMC for data collection and
exchange.
Bangkok TCP/IP Network
BANGKOK SIDE
Router DSU
MSS Host TCP/IP
Modem
Cisco
at Bangkok Port
Nokia
2600 BB 512
TOKYO SIDE
CAT
DSU
Modem
Nokia
BB 512
CAT
Frame Relay or
ISDN Provider
CAT
Frame Relay or
ISDN Provider
Router
NTU
Cisco
Modem
2600
Line Interface
NTU
Modem
TOT
PCM Mux
Provider
G 703(4W)
Router
TCP/IP MSS
Cisco
Port at Tokyo
2650
VIENTIANE SIDE
MSS Bangkok
TOT
DSU
Modem
MSS VIENTIANE
NARMPNU EXCHANGE
ETL
PCM 30 Mux
Provider
NTU
Modem
G 703(4W)
NTU
Modem
Line Interface
Router
TCP/IP MSS at
Cisco
Port Vientaine
1720
Status TCP/IP at RTH Bangkok
Tokyo
(AS 64520)
Kuala Lumpur
(AS 65154)
Vientiane
(AS 64771)
193.105.180.9
193.105.178.38
Frame Relay
Network
Frame Relay
Network
193.105.180.26
DDN
Network
193.105.180.10
193.105.180.25
193.105.178.37
Bangkok
(AS 64769)
General concepts of Addressing
for eligible hosts. Each center
declares a few official IP
addresses
an IP address for
an eligible host
A pair of official IP addresses for each
pure IP link are assigned by WMO.
The subnet mask is 255.255.255.252
which provides 62 subnets each
with 2 hosts (routers).
Frame Relay
Network
Bangkok
a pair of IP addresses
for a Frame Relay
links.
Tokyo
Tokyo
AS 64520
193.105.180.9/30
Kuala Lumpur193.105.178./38
AS 65154
Frame Relay
Networks
Vientiane
AS 64771
193.105.180.26
DDN Network
193.105.180.10/30
193.105.178./37
193.105.180.25
NAT (Network Address Translation)
MSS
128.7.7.8 <--> private address for THAI4
128.7.7.2 <--> private address for THAI2
Router for GTS connections
Cisco 2600 IOS Ver. 11.2 (3)T
Bangkok AS 64769
203.155.200.97
Firewall
Sentinet Ver2.1.3
Private IP address
THAI4
(MSS)
THAI2
(MSS)
System configuration at Bangkok
TCP/IP Supported Connection Diagram
Existing Workstation
and Plotter
GTS Circuit
128.7.7.x
LAN HUB
Digital Alpha 2100 Server
Firewall Cisco Router
Digital Alpha 4000 Server
Internet
128.0.7.x
LAN HUB
Firewall
Circuit configuration and Protocols in transport
** Bangkok - Tokyo circuit configuration in physical level
Circuit type
Carriers
Port speeds
Delay in network
: Frame relay Networks (NNI)
: CAT (Thailand portion)
: 64 kbps (TMD-CAT)
: 128 kbps (JMA-KDDI)
: Expecting less than a few of ten milliseconds
Circuit configuration and Protocols in transport
** Bangkok - Tokyo circuit configuration in logical level
Connectivity
: One Permanent Virtual Circuit (PVC
Identification of Multiplexing : Data Link Connection Identifier (DLCI)
DLCI Values
: 20 (Thailand portion)
: 20 (Japan portion)
Circuit configuration and Protocols in transport
• Bangkok - Tokyo circuit configuration in logical level (next)
Logical speed guarantee : Committed Information Rate (CIR)
: 16Kbps (Flow from Bangkok to Tokyo)
: 16Kbps (Flow from Tokyo to Bangkok)
Interface
: ITU-T Q.933 Annex A (Thailand portion)
: ITU-T Q.933 Annex A (Japan portion)
Circuit configuration and Protocols in transport
** Protocols
Link protocol
Network protocol
: Frame Relay
: IP v4 (Internet Protocol version 4)
: ICMP (Internet Control Message Protocol) for PING
Transport protocol : TCP (Transmission Control Protocol)
Routing protocol : Border Gateway Protocol version 4 (BGP-4)
Compression
: None
Traffic type
: Meteorological message in TCP socket stream.
File Transfer in future
TCP/IP Frame Relay sockets
 The mechanism for store-and-forward,
queing and
others message processing should be kept.
 The message structure in TCP socket stream
complies with the “Recommended practices and
procedure for the Implementation use and
Application of TCP/IP on the GTS” (Attachment II15 of manual on the GTS)
Routing
 Routing protocol
– BGP-4 (Border Gateway protocol version 4) is
used as dynamics routing protocol on the IP link.
Autonomouse System (AS)
 Autonomous System (AS)
Private AS number assigned by WMO secretariat.
The AS numbers for neighbour centres are:
Bangkok RTH
: AS 64769
Tokyo RTH
: AS 64520
Kuala Lumpur NMC : AS 65154
Vientiane NMC
: AS 64771
Filtering
 Filtering
– To allow only agreed protocols (port Number).
– To allow only agreed destination IP address.
– To allow only agreed source address.
Procedure for recover of missing data

Request/Repeat of missing text message
- Requests for missing text messages should be sent on
the text connection. T1T2 (in message header) of “BM”
should be used.
- A requested message should be retransmitted with its
original heading and with the lastest channel sequence
number.
The request formats
 Requesting a message
(SOH)
(CR)(CR)(LF) nnnn
(CR)(CR)(LF) BMRR01 CaCaCaCa YYGGgg
(CR)(CR)(LF) CCCC
(CR)(CR)(LF) SQN nnnn=
(CR)(CR)(LF)(ETX)
The request formats
 Requesting a selected number of messages
(SOH)
(CR)(CR)(LF) nnnn
(CR)(CR)(LF) BMRR01 CaCaCaCa YYGGgg
(CR)(CR)(LF) CCCC
(CR)(CR)(LF) SQN nnnn/nnnn/nnnn=
(CR)(CR)(LF)(ETX)
The request formats
 Requesting a continuous series of messages
(SOH)
(CR)(CR)(LF) nnnn
(CR)(CR)(LF) BMRR01 CaCaCaCa YYGGgg
(CR)(CR)(LF) CCCC
(CR)(CR)(LF) SQN nnnn-nnnn=
(CR)(CR)(LF)(ETX)
Request/Repeat of missing binary messages
 Requesting a message
(SOH)
(CR)(CR)(LF) nnnn
(CR)(CR)(LF) BIRR01 CaCaCaCa YYGGgg
(CR)(CR)(LF) CCCC
(CR)(CR)(LF) SQN nnnn=
(CR)(CR)(LF)(ETX)
The request formats
 Requesting a selected number of messages
(SOH)
(CR)(CR)(LF) nnnn
(CR)(CR)(LF) BIRR01 CaCaCaCa YYGGgg
(CR)(CR)(LF) CCCC
(CR)(CR)(LF) SQN nnnn/nnnn/nnnn=
(CR)(CR)(LF)(ETX)
The request formats
 Requesting a continuous series of messages
(SOH)
(CR)(CR)(LF) nnnn
(CR)(CR)(LF) BIRR01 CaCaCaCa YYGGgg
(CR)(CR)(LF) CCCC
(CR)(CR)(LF) SQN nnnn-nnnn=
(CR)(CR)(LF)(ETX)
TCP socket connections on operation basis
MSS :
202.245.39.11 (cadess1)
202.245.39.12 (cadess2)
MSS :
203.155.200.97
203.155.200.98
Active
Open
To: Tokyo (text)
Port : 25703
To: Tokyo (binary)
Port : 25704
Passive
Open
Port : 8025
To: Bangkok (text)
Port : 8026
To: Bangkok (binary)
BANGKOK
TOKYO
Bangkok-Tokyo
Passive
Open
Active
Open
FTP connection
- The only FTP connection, DDN to NMC Vientiane.
- Using two transmitting methods: PUT and GET.
- Output for maximum 10 messages per file or Maximum 30 seconds time-relay
consecutively.
MSS:
MSS:
172.16.2.100 (AMSS)
203.155.200.97
203.155.200.98
PUT to Vientiane
Get from Vientiane
BANGKOK
DDN
Get from Bangkok
PUT to Bangkok
VIENTIANE
TCP socket connections on operation basis
MSS :
161.142.139.230
MSS :
203.155.200.97
203.155.200.98
Active
Open
To: KL (text)
Port : 30006
To: KL (binary)
Port : 30007
Passive
Open
Port : 9024
To: Bangkok (text)
Port : 9025
To: Bangkok (binary)
BANGKOK
Passive
Open
Active
Open
Kuala Lumpur
Bangkok-Kuala Lumpur
Trouble shooting and problem resolution
Steps in resolving problems:
– Check the remote centre (If the security policy of the
remote centre allows it.)
– Check if the link to the “outside” network is reachable.
– Check the local network by trying to reach next
gateway.
– Check the local IP stack and configuration.
Basic tools for investigation
 Ping
– Ping will check if the destination IP address can be
reached.
# PING TK1
PING TK1 (202.245.39.11): 56 DATA BYTES
64 BYTES FROM 202.245.39.11: ICMP_SEQ=0 TTL=59 TIME=177 MS
64 BYTES FROM 202.245.39.11: ICMP_SEQ=1 TTL=59 TIME=166 MS
64 BYTES FROM 202.245.39.11: ICMP_SEQ=2 TTL=59 TIME=167 MS
64 BYTES FROM 202.245.39.11: ICMP_SEQ=3 TTL=59 TIME=165 MS
Basic tools for investigation (next)
----TK1 PING STATISTICS---4 PACKETS TRANSMITTED, 4 PACKETS RECEIVED, 0% PACKET LOSS
ROUND-TRIP (MS) MIN/AVG/MAX = 165/169/177 MS
# PING TKR
PING TKR (193.105.180.9): 56 DATA BYTES
64 BYTES FROM 193.105.180.9: ICMP_SEQ=0 TTL=253 TIME=162 MS
64 BYTES FROM 193.105.180.9: ICMP_SEQ=1 TTL=253 TIME=165 MS
64 BYTES FROM 193.105.180.9: ICMP_SEQ=2 TTL=253 TIME=167 MS
----TKR PING STATISTICS---3 PACKETS TRANSMITTED, 3 PACKETS RECEIVED, 0% PACKET LOSS
ROUND-TRIP (MS) MIN/AVG/MAX = 162/165/167 MS
#
Basic tools for investigation (next)
 Traceroute
– Traceroute is used to show which routes are transited
on the network between two centres. Firewall or packet
filter on router may block the traffic as part of local
security policy.
Basic tools for investigation (next)
# TRACEROUTE TK1
TRACEROUTE TO TK1 (202.245.39.11), 30 HOPS MAX, 40 BYTE PACKETS
1 SENT1 (128.7.7.200) 1 MS 1 MS 1 MS
2 ROUTER1 (203.155.200.99) 1 MS 1 MS 1 MS
3 TKR (193.105.180.9) 173 MS 193 MS 172 MS
4 TKR (193.105.180.9) 163 MS * 196 MS
5 * TKR (193.105.180.9) 149 MS *
6 TKR (193.105.180.9) 155 MS * 158 MS
Basic tools for investigation (next)
# TRACEROUTE TKR
TRACEROUTE TO TKR (193.105.180.9), 30 HOPS MAX, 40 BYTE PACKETS
1 SENT1 (128.7.7.200) 1 MS 1 MS 0 MS
2 ROUTER1 (203.155.200.99) 2 MS 1 MS 1 MS
3 TKR (193.105.180.9) 156 MS * 147 MS
#
Basic tools for investigation (next)
# NETSTAT -NR
ROUTING TABLES
DESTINATION GATEWAY
NETMASKS:
INET
255.255.0.0
FLAGS REFS USE INTERFACE
ROUTE TREE FOR PROTOCOL FAMILY 2:
DEFAULT
128.7.7.200 UGS
6 153463 TU0
63.174.196.210 128.0.7.200 UGHS 0 0 TU1
127.0.0.1 127.0.0.1
UH
1 32752 LO0
128/16
128.0.7.8
U
10 707939 TU1
128.7/16
128.7.7.8
U
38 3765211 TU0
161.142.139.230 128.7.7.200 UGHS 2 21309 TU0
Basic tools for investigation (next)
161.142.139.231 128.7.7.200 UGHS 2 7919 TU0
192.168.2.128 128.0.7.200 UGHS 0 9 TU1
203.144.197.3 128.0.7.200 UGHS 0 0 TU1
203.155.200.113 128.0.7.200 UGHS 0 0 TU1
206.79.34.9 128.0.7.200 UGHS 0 0 TU1
207.44.45.186 128.0.7.200 UGHS 0 143 TU1
207.44.45.187 128.0.7.200 UGHS 0 0 TU1
#