Download Chapter 4.1 Network Layer

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Point-to-Point Protocol over Ethernet wikipedia , lookup

Distributed firewall wikipedia , lookup

TCP congestion control wikipedia , lookup

Peering wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Net bias wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Network tap wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

RapidIO wikipedia , lookup

Airborne Networking wikipedia , lookup

Computer network wikipedia , lookup

IEEE 1355 wikipedia , lookup

Zero-configuration networking wikipedia , lookup

AppleTalk wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Internet protocol suite wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Packet switching wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Deep packet inspection wikipedia , lookup

Transcript
LOGO
OSI network
layer
25-May-17
Jaringan Komputer_D3 TT
1
OSI network layer
OSI model layer 3
TCP/IP model Internet layer
Application
Presentation
Session
Transport
Network
Data link
Physical
25-May-17
Data
stream
HTTP, FTP,
TFTP, SMTP
etc
Segment
TCP, UDP
Packet
IP
Frame
Ethernet,
WAN
technologies
Bits
Jaringan Komputer_D3 TT
Application
Transport
Internet
Network Access
2
Network layer topics
IP version 4 – the most common layer
3 routed protocol
Dividing hosts into groups – why and
how
Routing – sending packets the right
way
Routing – how routers learn routes
IP addressing – in chapter 6
25-May-17
Jaringan Komputer_D3 TT
3
Purpose of layer 3
 Decide how to get the data from source
to destination, then route it.
25-May-17
Jaringan Komputer_D3 TT
Layer 3 protocol
A layer 3 protocol such as IP version 4
must:
Provide an addressing scheme to
identify networks and individual hosts
Encapsulate a segment from layer 4
into a packet and include addresses
Direct the packet across one or many
networks to the destination host
Decapsulate (remove the packet
header) and give the segment to layer
4.
25-May-17
Jaringan Komputer_D3 TT
5
Network layer protocols
Internet Protocol version 4 (IPv4) –
the most common
Internet Protocol version 6 (IPv6) –
designed to replace version 4
eventually
Novell Internetwork Packet Exchange
(IPX)
AppleTalk
Connectionless Network Service
(CLNS/DECNet)
25-May-17
Jaringan Komputer_D3 TT
6
Novell Internetwork Packet Exchange (IPX)
 IPX (bahasa Inggris: Internetwork Packet Exchange) adalah protokol
jaringan komputer yang digunakan oleh sistem operasi Novell NetWare
pada akhir dekade 1980an hingga pertengahan dekade 1990an. IPX
adalah protokol komunikasi tanpa koneksi (connectionless), seperti halnya
Internet Protocol dan User Datagram Protocol pada kumpulan protokol
TCP/IP. Selain membutuhkan protokol IPX, Novell Netware juga
membutuhkan protokol tingkat tinggi bernama Sequenced Packet
Exchange (SPX) dan Network Control Protocol (NCP). Protokol ini
diturunkan oleh Novell dari protokol IDP yang terdapat di dalam Xerox
Network Services.
 IPX digunakan untuk melakukan pemetaan paket-paket data dari satu titik
di dalam jaringan ke titik lainnya melalui sebuah internetwork. IPX
beroperasi di lapisan jaringan (lapisan ketiga pada model OSI), dan dapat
digunakan di dalam teknologi Ethernet, Token Ring, dan protokol lapisan
data-link lainnya. IPX memang dahulu pernah digunakan pada Local Area
Network (LAN) berbasis Novell NetWare sebelum akhirnya Novell
menggantinya dengan TCP/IP saat merilis NetWare 5.x. Sebelum diganti
dengan TCP/IP, protokol ini merupakan protokol yang sangat populer.
25-May-17
Jaringan Komputer_D3 TT
7
AppleTalk
 AppleTalk adalah sebuah protokol jaringan yang
dikembangkan khusus untuk jaringan yang terdiri
atas komputer-komputer Apple Macintosh, yang
mengizinkan para penggunanya untuk saling
berbagi berkas dan printer agar dapat diakses
oleh pengguna lainnya.
 AppleTalk merupakan teknologi yang sudah
dianggap usang yang kini telah digantikan oleh
Apple Open Transport, yang juga mendukung
AppleTalk itu sendiri, protokol TCP/IP dan
beberapa protokol jaringan lainnya.
25-May-17
Jaringan Komputer_D3 TT
8
Arsitektur AppleTalk dan perbandingannya dengan model
referensi OSI
25-May-17
Jaringan Komputer_D3 TT
9
IP characteristics
Designed with low overhead for speed
– it does only what it needs to do.
Connectionless – does not set up
connection with destination before
sending packet.
Best effort (unreliable) no guarantee
of safe delivery, no checking or
resending.
Independent of media, but does need
to know maximum packet size.
25-May-17
Jaringan Komputer_D3 TT
10
Network layer encapsulation
Segment from transport layer
Packet header added to make
IP packet
Sent to data link layer for
further encapsulation into
frame
25-May-17
Jaringan Komputer_D3 TT
11
IPv4 packet header fields
IP address of source
host, needed so reply
can be sent.
25-May-17
IP address of destination
host, needed so routers
can find route.
Jaringan Komputer_D3 TT
12
IPv4 packet header fields
Reduced by 1 at each
router. Packet dropped if
it goes to 0.
25-May-17
TCP or UDP used in
Transport layer.
Jaringan Komputer_D3 TT
13
IPv4 packet header fields
Priority for QoS. E.g.
voice data has higher
priority than e-mail.
25-May-17
For checking if header has
been corrupted.
Jaringan Komputer_D3 TT
14
IPv4 packet header fields
Shows if packet has
been fragmented or
must not be fragmented.
25-May-17
If router has to split a
packet, this gives order for
putting pieces together.
Jaringan Komputer_D3 TT
15
IPv4 packet header fields
Version 4.
25-May-17
Header
length.
Length of whole packet.
Jaringan Komputer_D3 TT
16
Splitting up networks
Fully switched network, each device has its own
bandwidth. You could have hundreds of computers.
Why split it up?
Too large to manage efficiently
Too much broadcast traffic - congestion
Too many addresses for switches to remember
Lack of security
25-May-17
Jaringan Komputer_D3 TT
17
How to split the network
Geographically – different sites
Purpose – what software and
shared resources do people use?
How much bandwidth do they
use?
Ownership – different companies
or departments in a company,
security requirements
25-May-17
Jaringan Komputer_D3 TT
18
Use a router
 Limits broadcasts
 Can provide
security
 Addressing
scheme based on
networks hierarchical
25-May-17
Jaringan Komputer_D3 TT
IPv4 hierarchical address
 32 bits in four 8-bit octets, written in
decimal
 Network part then host part
 Here network part (prefix) is 24 bits /24
 Length of network part can vary.
25-May-17
Jaringan Komputer_D3 TT
Message to same network
25-May-17
Jaringan Komputer_D3 TT
21
Message to different network
25-May-17
Jaringan Komputer_D3 TT
22
Default gateway
Each PC is configured with an IP
address and a default gateway.
The default gateway is the IP address
of a router port on the same network
as the PC.
It is the router’s job to handle
messages to other networks.
Each router port is on a different
network and has a different IP
address.
25-May-17
Jaringan Komputer_D3 TT
23
Hops
A packet may pass through many
routers on its journey.
The trip from one router to the next is
called a hop and the next router is
called the next hop router.
Each router looks at the IP address in
the packet header and decides what
to do with the packet next.
25-May-17
Jaringan Komputer_D3 TT
24
Routing table and forwarding
Each router has a routing table. This
contains a list of known networks and
the best way to get there – outgoing
port and address of next-hop router.
The router looks at the IP address of a
packet. It decides which network this
address is on.
If it knows the network it forwards the
packet.
If it does not know the network it
drops the packet.
25-May-17
Jaringan Komputer_D3 TT
25
Directly connected
The networks of the router’s own interfaces go into the
routing table.
25-May-17
Jaringan Komputer_D3 TT
26
Other networks
Routes to other networks can be
configured by an administrator (static
routes)
Or they can be learned from another
router using a routing protocol
(dynamic routes)
A router can have a default route.
Packets for unknown networks go on
this route instead of being dropped.
25-May-17
Jaringan Komputer_D3 TT
27
Routing protocols
Routers learn routes from each other
and put them in their routing tables.
A routing protocol is the set of rules
they use to swap information.
These routes are dynamic routes
25-May-17
Jaringan Komputer_D3 TT
28
Static
routes
Dynamic
routes
 Learned from
 Entered by
other routers
administrator
 Start the protocol
 Time consuming,
then it runs by
different for each
itself
router
 Automatically
 Must be updated if
updates when
routes change
routes change
 Little processing
 More processing
 No bandwidth
 Uses bandwidth
used
 Gives away
 Gives nothing
information
25-May-17
Jaringan Komputer_D3 TT
29
away
LOGO
Thank You
Ref: S Ward Abingdon and Witney College
25-May-17
Jaringan Komputer_D3 TT
30