Download Document

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Dynamic Host Configuration Protocol wikipedia , lookup

Computer network wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Peering wikipedia , lookup

IEEE 1355 wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
Network Technologies essentials
Week 4: Internetworking
Compilation made by Tim Moors, UNSW Australia
Original slides by David Wetherall, University of Washington
ISBN-10: 0133766624 © 2014
For the book A. Tanenbaum and D. Wetherall: Computer Networks, 5th ed, Prentice-Hall, 2011
Tim added green graffiti
Shortcomings of Switches
1. Don’t scale to large networks
– Blow up of routing table, broadcast
Table for all destinations in the world!
Broadcast new destinations to the whole world!
Computer Networks
4-1.4
2
Datagram Model
• Packets contain a destination address; each router uses
it to forward each packet, possibly on different paths
ISP’s equipment
Routers store and forward packets after looking up address in forwarding table.
Buffer in case output is busy (e.g. another input) or Σinput rates temporarily > output rate.4-2.7
Computer Networks
3
How Networks May Differ
• Basically, in a lot of ways:
–
–
–
–
–
Service model (datagrams, VCs)
Addressing (what kind)
QOS (priorities, no priorities)
Packet sizes
Security (whether encrypted)
• Internetworking hides the differences
with a common protocol. (Uh oh.)
Computer Networks
4-3.3
4
IPv4 (Internet Protocol)
• Various fields to meet straightforward needs
– Version, Header (IHL) and Total length, Protocol, and Header Checksum
Payload (e.g., TCP segment)
Computer Networks
4-3.8
5
IP Prefixes (2)
• Written in “IP address/length” notation
– Address is lowest address in the prefix, length is prefix bits
– E.g., 128.13.0.0/16 is 128.13.0.0 to 128.13.255.255
– So a /24 (“slash 24”) is 256 addresses, and a /32 is one address
000100100001111100000000xxxxxxxx ↔
↔ 128.13.0.0/16
Computer Networks
4-4.5
6
Longest Matching Prefix (2)
192.24.63.255
Prefix
192.24.0.0/18
Next Hop
D
192.24.12.0/22
B
D
/18
More
specific
192.24.15.255
B
/22
192.24.12.0
192.24.6.0 
192.24.14.32 
192.24.54.0 
Computer Networks
D
192.24.0.0
IP address
4-5.6
7
DHCP Addressing
• Bootstrap issue:
– How does node send a message to
DHCP server before it is configured?
• Answer:
– Node sends broadcast messages that
delivered to all nodes on the network
– Broadcast address is all 1s
– IP (32 bit): 255.255.255.255
– Ethernet (48 bit): ff:ff:ff:ff:ff:ff
Computer Networks
4-6.7
8
DHCP Messages (2)
Client
Server
DISCOVER
Broadcast
OFFER
REQUEST
ACK
Computer Networks
4-6.9
9
ARP (Address Resolution Protocol)
• Node uses to map a local IP address
to its Link layer addresses
Link layer
Source
Dest.
Ethernet Ethernet
From
NIC
Source
IP
Dest.
IP
Payload …
From
DHCP
From ARP
Computer Networks
4-6.12
10
ARP Messages (2)
Node
Target
REQUEST
Broadcast
Who has IP 1.2.3.4?
REPLY
I do at 1:2:3:4:5:6
Computer Networks
4-6.15
11
IPv4 Fragmentation (3)
Before
MTU = 2300
ID = 0x12ef
Data Len = 2300
Offset = 0
MF = 0
After
MTU = 1500
ID = 0x12ef
Data Len = 1500
Offset = 0
MF = 1
Computer Networks
ID = 0x12ef
Data Len = 800
Offset = 1500
MF = 0
4-7.9
12
Path MTU Discovery (3)
Test #1
Computer Networks
Test #2
MTU=1400
MTU=1200 bytes
Try 1200
Try 900
Test #3
MTU=900
4-7.13
13
IPv6
• Features large addresses
32 bits
– 128 bits, most of header
• New notation
– 8 groups of 4 hex digits (16 bits)
– Omit leading zeros, groups of zeros
Ex: 2001:0db8:0000:0000:0000:ff00:0042:8329

Computer Networks
4-9.7
14
Tunneling (3)
• Tunnel acts as a single link across IPv4 network
– Difficulty is to set up tunnel endpoints and routing
User
Tunnel
User
IPv6
Link
Native IPv6
IPv6
IPv6
IPv6
IPv6
IPv6
Link
IPv4
Link
IPv4
Link
Link
Link
Native IPv4
IPv4
Computer Networks
Native IPv6
IPv6
4-9.12
15
How NAT Works (2)
• Internal  External:
– Look up and rewrite Source IP/port
Internal
source
Src =
Dst =
Computer Networks
Internal IP:port
192.168.1.12 : 5523
External IP : port
44.25.80.3 : 1500
External
destination
IP=X, port=Y
Src =
NAT box Dst =
4-10.9
16
END
© 2013 D. Wetherall
Slide material from: TANENBAUM, ANDREW S.; WETHERALL, DAVID J., COMPUTER NETWORKS, 5th Edition, © 2011.
Electronically reproduced by permission of Pearson Education, Inc., Upper Saddle River, New Jersey
Computer Networks
17