1 / 74

William Stallings Data and Computer Communications

William Stallings Data and Computer Communications. Chapter 15 Internetwork Protocols. Internetworking Terms (1). Communications Network Facility that provides data transfer service An internet Collection of communications networks interconnected by bridges and/or routers

dianan
Download Presentation

William Stallings Data and Computer Communications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. William StallingsData and Computer Communications Chapter 15 Internetwork Protocols

  2. Internetworking Terms (1) • Communications Network • Facility that provides data transfer service • An internet • Collection of communications networks interconnected by bridges and/or routers • The Internet - note upper case I • The global collection of thousands of individual machines and networks • Intranet • Corporate internet operating within the organization • Uses Internet (TCP/IP and http)technology to deliver documents and resources

  3. Internetworking Terms (2) • End System (ES) • Device attached to one of the networks of an internet • Supports end-user applications or services • Intermediate System (IS) • Device used to connect two networks • Permits communication between end systems attached to different networks

  4. Internetworking Terms (3) • Bridge • IS used to connect two LANs using similar LAN protocols • Address filter passing on packets to the required network only • OSI layer 2 (Data Link) • Router • Connects two (possibly dissimilar) networks • Uses internet protocol present in each router and end system • OSI Layer 3 (Network)

  5. Internetworking Protocols

  6. Requirements of Internetworking • Link between networks • Routing and delivery of data between processes on different networks • Accounting services • Support for different network architectures • different addressing schemes • different packet size limits • etc.

  7. Architectural Approaches • Connection oriented • Connectionless

  8. Connection Oriented • Not only the individual LANs, but also the ISs that connect them are included in virtual circuits • maybe concatenation of several logical connections • e.g. X.75 used to interconnect X.25 packet switched networks • Connection oriented not often used

  9. Connectionless Operation • Corresponds to datagram mechanism in packet switched network • Each packet treated separately • Network layer protocol common to all routers • Known generically as the internet protocol (IP) • Developed initially for ARPANET • Lower layer protocol needed to access particular network at each router

  10. Connectionless Internetworking (General) • Advantages • Flexible and robust • e.g. in case of congestion or node failure, packets find their way easier than connection-oriented services • Can work with different network types • does not demand too much services from the actual network • No unnecessary overhead for connection setup • Unreliable • Not guaranteed delivery • Not guaranteed order of delivery • Packets can take different routes • Reliability is responsibility of next layer up (e.g. TCP)

  11. IP Operation

  12. Design Issues • Routing • Datagram lifetime • Fragmentation and re-assembly • Error control • Flow control

  13. Routing • End systems and routers maintain routing tables • Indicate next router to which datagram should be sent • Static • May contain alternative routes • Dynamic • Flexible response to congestion and errors • status reports issued by neighbors of down routers • Source routing • Source specifies route as sequential list of routers to be followed • for security and priority reasons • Route recording

  14. Datagram Lifetime • Datagrams could loop indefinitely • Unnecessary resource consumption • Transport protocol needs upper bound on datagram life • Datagram marked with lifetime • Time To Live field in IP • Once lifetime expires, datagram discarded (not forwarded) • Hop count • Decrement time to live on passing through a each router • Time count • Need to know how long since last router • global clock is needed

  15. Fragmentation and Reassembly • Different maximum packet sizes for different networks • routers may need to split the datagrams into smaller fragments • When to re-assemble • At destination • Packets get smaller as data travel • inefficiency due to headers • Intermediate reassembly • Need large buffers at routers • All fragments must go through same router • Inhibits dynamic routing

  16. IP Fragmentation • In IP reassembly is at destination only • Uses fields in header • Data Unit Identifier (ID) • Identifies datagram • Source and destination addresses • Protocol layer that generating data (e.g. TCP) • Identification supplied by that layer • Data length • Length of user data in octets • Offset • Position of fragment of user data in original datagram • In multiples of 64 bits (8 octets) • More flag • Indicates that this is not the last fragment

  17. Fragmentation Example

  18. Dealing with Failure • Reassembly may fail if some fragments get lost • Need to detect failure • Reassembly time out • Assign a reassembly lifetime to the first fragment • If time expires before all fragments arrive, discard partial data • Use packet lifetime (time to live in IP) • continues to be decremented at destination • If time to live runs out before complete reassembly, discard all fragments

  19. Error Control • Not guaranteed delivery • Router should attempt to inform source if packet discarded • e.g. for time to live expiring, congestion, bad FCS • Source may modify transmission strategy • May inform high layer protocol • Datagram identification needed

  20. Flow Control • Allows routers and/or stations to limit rate of incoming data • Limited in connectionless systems • Send flow control packets • Requesting reduced flow • e.g. ICMP

  21. Internet Protocol (IP) • Part of TCP/IP • Used by the Internet • Specifies interface with higher layer • e.g. TCP • Specifies protocol format and mechanisms

  22. IP Services • Primitives • Functions to be performed • Send • Request transmission of data unit • Deliver • Notify user of arrival of data unit • Parameters • Used to pass data and control info

  23. Parameters (1) • Source address • Destination address • Protocol • Recipient e.g. TCP • Type of Service Indicators • Specify treatment of data unit during transmission through networks • Identification • Uniquely identifies PDU together with source, destination addresses and user protocol • Needed for re-assembly and error reporting

  24. Parameters (2) • Don’t fragment indicator • Can IP fragment data • If not, may not be possible to deliver • Time to live • Data length • Options • User data

  25. Type of Service Indicators • Requests for service quality • Precedence • 8 levels • Reliability • Normal or high • Delay • Normal or low • Throughput • Normal or high

  26. Options • Security • security label - mostly for military application • Source routing • Route recording • Stream identification • for reserved resources for stream traffic (like video) • Timestamping • added by source and routers

  27. IP Protocol

  28. Header Fields (1) • Version • Currently 4 • IP v6 - see later • Internet header length • In 32 bit words • Including options • minimum 5 • Type of service • Total length • Of datagram, in octets

  29. Header Fields (2) • Identification • Sequence number • Used with addresses and user protocol to identify datagram uniquely • Flags • More bit • Don’t fragment • Fragmentation offset • Time to live • Protocol • Next higher layer to receive data field at destination

  30. Header Fields (3) • Header checksum • Verified and recomputed at each router • 16 bit ones complement sum of all 16 bit words in header • Set to zero during calculation • Source address • Destination address • Options • Padding • To fill to multiple of 32 bits long

  31. Data Field • Carries user data from next layer up • Integer multiple of 8 bits long (octet) • Max length of datagram (header plus data) 65,535 octets

  32. IP Addresses • 32 bit global internet address • Network part and host part • All-zero host part is for the network • All-one means broadcast (limited to current network)

  33. IP Addresses - Class A • Start with binary 0 • 7-bit network - 24-bit host • 00000000 reserved (means “this”) • 01111111 (127) reserved for loopback • Range 1.x.x.x to 126.x.x.x • 10.x.x.x is for private networks • Few networks - many hosts

  34. IP Addresses - Class B • Starts with binary 10 • Range 128.x.x.x to 191.x.x.x • Second octet is also part of the network id. • 14-bit network, 16-bit host number • 214 = 16,384 class B addresses • 216 = 65536 hosts per network

  35. IP Addresses - Class C • Start 110 • Range 192.x.x.x to 223.x.x.x • Second and third octets are also part of network address • 221 = 2,097,152 addresses • 256 hosts per network

  36. Subnets and Subnet Masks • Allow arbitrary complexity of internetworked LANs within organization • Avoid routing complexity • Site looks to rest of internet like single network • Each LAN is assigned a subnet number • Host portion of address partitioned into subnet number and host number • Local routers route within subnetted network • Subnet mask indicates which bits are subnet number and which are host number

  37. Routing Using Subnets

  38. Classless Addresses • Extension of subnet idea to the whole Internet • Assigning IP numbers at any size together with a subnet number • A precaution against exhaustion of IP addresses • Special notation (CIDR notation) • network address/number of 1-bits in the mask • e.g. 128.140.168.0/21 • subnet mask is 255.255.248.0 • Question: What could be the subnet number for the network 145.250.198.0 ?

  39. Special IP address forms

  40. Example Network Configuration • IP address is the address of a connection (not of a computer or router)

  41. ICMP • Internet Control Message Protocol • Transfer of (control) messages from routers-to-hosts and hosts-to-hosts • Feedback about problems • e.g. datagram discarded, router’s buffer full • Encapsulated in IP datagram • Not reliable

  42. ICMP Message Formats

  43. IP v6 - Version Number • IP v 1-3 defined and replaced • IP v4 - current version • IP v5 - stream protocol (ST) • IP v6 - replacement for IP v4 • During the initial development it was called IPng (Next Generation)

  44. Driving Motivation to change IP • Address space exhaustion • Two level addressing (network and host) wastes space • Growth of networks and the Internet • Extended use of TCP/IP • e.g. for POS terminals • wireless nodes • vehicles

  45. IPv6 Enhancements • Expanded address space • 128 bit • 6*1023 addresses per square meter on earth • Improved option mechanism • Separate optional headers between IPv6 header and transport layer PDU • Most are not examined by intermediate routes • Improved speed and simplified router processing • Easier to extend options • Flexible protocol

  46. IPv6 Enhancements (2) • Support for resource allocation • Replaces type of service • Labeling of packets to particular traffic flow • Allows special handling • e.g. real time video

  47. Structure IPv6 headers + optional extension headers

  48. Extension Headers • Hop-by-Hop Options • special options that require hop-by-hop processing • Routing • Similar to source routing • Fragment • fragmentation and reassembly information • Authentication • Integrity and Authentication • Encapsulating security payload • Privacy • Destination options • Optional info to be processed at destination node

  49. IP v6 Header

  50. IP v6 Header Fields (1) • Version • 6 • Traffic Class • Classes or priorities of packet • Flow Label • Identifies a sequence of packets (a flow) that has special handling requirements • provided by the network who guarantees QoS • Payload length • Includes all extension headers plus user data

More Related