* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download tut1 - Webcourse
Survey
Document related concepts
Deep packet inspection wikipedia , lookup
Net neutrality law wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Peer-to-peer wikipedia , lookup
Transcript
Internet Networking Spring 2004 Tutorial 1 Subnetting and CIDR Proxy ARP 1 Administrative Information Course site: webcourse.technion.ac.il/236341 Assistants: Rami Cohen, Taub 524, (829)4899 email: [email protected] Galperin Vadim, Taub 441, (829)3941 email: [email protected] 2 Reminding – IP Addressing (Original Classful Scheme) IP Address – 32-bit integer globally unique address Dotted Notation: 132.68.37.54 IP Classes – dividing an address to net id and host id The prefix (net id) identifies a network. The suffix (host id) identifies a host on this network. 3 Reminding – IP Addressing (Original Classful Scheme) Class A – 7 bits to net id, 24 bits to host id 1.0.0.0 – 126.0.0.0 Class B – 14 bits to net id, 16 bits to host id 128.1.0.0 – 191.255.0.0 Class C – 21 bits to net id, 8 bits to host id 192.0.1.0 – 223.255.255.0 Class D – for multicasting Class E – reserved for future use (used for private addresses) 4 Weaknesses of Classful Scheme Growth of routing tables in routers Tens of thousands small (class C) networks. Each network must be advertised. Inflexible Lack of a network classes for mid-sized organization (between class B and C). Address space will be eventually exhausted 5 Classless Inter-Domain Routing (CIDR) The concept of network "class" is deprecated. Routing destinations are represented by network and mask pairs. Routing is performed on a longest-match basis Advantages: Flexibility Enabling network aggregation; thereby reducing the size of routing table. Defined in RFC 1519. 6 Subnet Addressing A site has a single IP network address assigned to it, but has two or more physical networks. Different technologies. Limits of technologies. Network congestion. Security consideration. VLAN – separate one physical network into a few logical networks. Administration (e.g. deferent departments in academic institute). 7 Subnet Addressing From outside it looks like a single network Only local routers know about multiple physical networks inside and how to route traffic among them Host ID is divided into a subnet ID and host ID Accepted as a standard at 1985 (RFC 950). 8 Subnet Routing When a router gets a packet, it isolates by Net mask the packet net id address. Each routing entry contain a net mask. Routing is done on a longest-match basis. If the packet is destined to other network then the router sends it to another router. Otherwise the router sends the packet to the appropriate host on its attached networks. 9 Subnetting - Example Network 128.10.1.0/24 128.10.1.1 Rest of the Internet R H1 128.10.1.2 H2 . Network 128.10.2.0/24 All traffic to 128.10.0.0/16 H3 128.10.2.1 H4 128.10.2.2 A site with two physical networks. Using subnetting, R advertise these networks as a single network (thus, R accepts all traffic for net 128.10.0.0) Internal routing is done according to subnet id (i.e. the third octet of the address). 10 Variable-Length Subnetting Motivation: Consider the case when an organization has a few network of different sizes. When we choose the subnet partitioning, we actually define constant number of possible physical subnetworks with maximum number of hosts on them. Difficult to keep small (waist of subnet numbers) and big (the host id needs more bits) sub networks and there could be unnecessary spending of address space. Solution: Variable-Length Subnetting. A subnet partition is selected on a per-network basis. 11 Example – Configuring a Network with Variable-Length Subnetting We have a network with IP 202.128.236.0/24 We need to support next sub networks: 6 networks with 26 hosts 3 networks with 10 hosts 4 networks with 2 hosts 12 Example – Configuring a Network with Variable-Length Subnetting If we take subnet mask of /27 bits then we can get 8 sub networks of 30 hosts (all 0’s and all 1’s of host addresses are reserved). 11111111.11111111.11111111.11100000 We need only 6 such sub networks. 13 Example – Configuring a Network with Variable-Length Subnetting The rest 2 sub networks we will partition by subnet mask of /28 bits. We will get 4 sub networks of 14 hosts in each We need only 3 such sub networks. 14 Example – Configuring a Network with Variable-Length Subnetting The rest we will partition by subnet mask of /30 bits. We will get 4 sub networks of 2 hosts in each. 15 Example – Configuring a Network with Variable-Length Subnetting Subnet mask #1 = 202.128.236.0 /27 Subnet mask #2 = 202.128.236.0 /28 11001010.10000000.11101100.11100000 11001010.10000000.11101100.11110000 Subnet mask #3 = 202.128.236.0 /30 11001010.10000000.11101100.11111100 16 Reminding - ARP Two machines on a given network can communicate only if they know each other’s physical network address ARP (Address Resolution Protocol) serves for mapping from high-level IP address into low level MAC address. 17 Reminding – ARP ARP Response (00:11:22:33:44:55:12) ARP Request (10.4.10.90) 10.4.10.90 10.4.10.91 10.4.10.86 10.4.10.20 10.4.10.23 00:11:22:33:44:55:12 00:11:22:33:44:55:bc 00:11:22:33:44:55:2e 00:11:22:33:44:55:6b 00:11:22:33:44:55:40 18 Proxy ARP Proxy ARP (also called promiscuous ARP or ARP hack) is a technique used to map a single IP network prefix into two physical addresses. Using the same network address space for more than one physical address Assume that there are 2 networks A and B connected by router R that runs Proxy ARP Using Proxy ARP, R can use the same net id for both networks. 19 Proxy ARP Network A: 10.10.1.x/24 10.10.1.3 10.10.1.4 R PPP . Network B: 10.10.1.x/24 10.10.1.5 20 Proxy ARP Router R replies to ARP requests that are generated by hosts on the PPP connection (Network B), in which the target IP is on network A, namely it sends its MAC address. R know which hosts are connected through the PPP. These host assume that the destination host are on the same physical network. In their ARP table the router MAC address is associated with the destination IP address. 21