COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm.

Slides:



Advertisements
Similar presentations
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Advertisements

CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Chapter 18. IP: Internet Protocol Addresses
CSCI 4550/8556 Computer Networks Comer, Chapter 18: IP: Internet Protocol Addresses.
1 IP: Internet Protocol Addresses. 2 Internet Protocol (IP) Only protocol at Layer 3 Fundamental in suite Defines –Internet addressing –Internet packet.
School of Information Technologies CIDR and ICMP NETS3303/3603 Week 5.
COS 420 DAY 7. Agenda Assignment 2 posted Due Feb 13 (next class) Individual Projects Assigned Due March 20 & 23 Classless And Subnet Address Extensions.
Oct 28, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
1 Internet Networking Spring 2004 Tutorial 1 Subnetting and CIDR Proxy ARP.
1 Internet Networking Spring 2006 Tutorial 1 Subnetting and CIDR.
Oct 26, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
COS 420 Day 7. Agenda Assignment 2 Due Feb questions from text chaps 7-11 Midterm Exam on Feb 19 Chap 1-13 (maybe 12, were a little behind) All.
COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Midterm Exam on Feb 19 Chap 1-12 All short essays More than 10 and should.
CSCI 4550/8556 Computer Networks Comer, Chapter 20: IP Datagrams and Datagram Forwarding.
Slides of the course was made by TAs of this and previous semesters 1 Internet Networking Spring 2002 Tutorial 1 Subnets, Proxy ARP.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
TDC365 Spring 2001John Kristoff - DePaul University1 Interconnection Technologies Routing I.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Slides of the course was made by TAs of this and previous semesters 1 Internet Networking Spring 2003 Tutorial 1 Subnets, Proxy ARP.
Network Layer IS250 Spring 2010
Lecture Slide Rizwan Rehman, CCS. Classless and Subnet Address Extensions (CIDR) Topics: –There are problems with the IP addressing scheme we’ve studied.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Layering and the TCP/IP protocol Suite  The TCP/IP Protocol only contains 5 Layers in its networking Model  The Layers Are 1.Physical -> 1 in OSI 2.Network.
Subnet & Classless Address Extensions Linda Wu (CMPT )
Fall 2006Computer Networks19-1 Chapter 19. Host-to-Host Delivery: Internetworking, Addressing, and Routing 19.1 Internetworks 19.2 Addressing 19.3 Routing.
Classless and Subnet Address Extensions (CIDR)
1 Internet Protocol: Forwarding IP Datagrams Chapter 7.
IP Addressing Introductory material. An entire module devoted to IP addresses.
1 Chapter Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
FALL, 2005CSI Part 2.3 Internetworking & Addressing (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution Robert L. Probert, SITE,
Part 3: Internetworking Internet architecture, addressing, encapsulation, reliable transport and the TCP/IP protocol suite.
Chapter 18 IP: Internet Protocol Addresses
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
1 CSCI 233 Internet Protocols Class 2 Dave Roberts.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Chapter 4 Objectives Upon completion you will be able to: Classful Internet Addressing Understand IPv4 addresses and classes Identify the class of an.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Internet Protocol: Routing IP Datagrams Chapter 8.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Protocol Layering Chapter 11.
CS470 Computer Networking Protocols
IP ADDRESS An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number.
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
NT1210 Introduction to Networking
Wrapping up subnetting, mapping IPs to physical ports BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
IP Addressing. A 32-bit logical naming convention A dotted-decimal notation is used: – –Each number represents 8 bits. Number is Part.
IP: Addressing, ARP, Routing
Network Layer: IP Addressing
Internet Networking recitation #1
4 Network Layer Part I Computer Networks Tutun Juhana
CS4470 Computer Networking Protocols
Internetworking & Address Resolution
Supernetting Recall: subnetting allows an organization to share a single IP network address among multiple physical networks Supernetting (a.k.a. classless.
CS 31006: Computer Networks – Moving From End-to-End To Per Hop
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
Classless and Subnet Address Extensions (CIDR)
Layering and the TCP/IP protocol Suite
Presentation transcript:

COS 420 Day 8

Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm Exam on Feb 27 due Mar 2 Chap 1-12 All short essays More than 10 and should be less than 20 Entire class period Today we will look at Supernetting, CIDR and layering

Classless Inter-Domain Routing (CIDR) Problem Continued exponential Internet growth Subnetting insufficient Limited IP addresses (esp. Class B) Dire prediction made in 1993: We will exhaust the address space ‘‘in a few years’’. Note: address space is not near exhaustion

CIDR Addressing Solution to problem Temporary fix until next generation of IP Backward compatible with classfull addressing Extend variable-length subnet technology to prefixes CIDR was predicted to work ‘‘for a few years’’ Extremely successful! Will work for at least 25 years!

One Motivation For CIDR: Class C netwroks Fewer than seventeen thousand Class B numbers (total) More than two million Class C network numbers No one wants Class C (too small) CIDR allows Merging 256 (or more) Class C numbers into a single prefix that is equivalent to Class B Splitting a Class B along power of two boundaries

CIDR Notation Addresses written NUMBER/m NUMBER is IP prefix m is ‘‘address mask’’ length become / becomes / becomes /26 Example /20 Prefix occupies 20 bits Suffix occupies 12 bits Mask values must be converted to dotted decimal when configuring a router (and binary internally)

Route Proliferation If classfull routing used, CIDR addresses result in more routes Example: Single CIDR prefix spans 256 Class C network numbers (supernetting) Classful routing table requires 256 separate entries

Route Condensation Solution: change routing as well as addressing Store address mask with each route Send pair of (address, mask) whenever exchanging routing information Known as a CIDR block /25

Example Of A CIDR Block

Dotted Decimal Equivalents

Example Of /30 CIDR Block

Implementation Of CIDR Route Lookup Each entry in routing table has address plus mask Search is organized from most-specific to least-specific (i.e., entry with longest mask is tested first) Known as longest-prefix lookup or longest-prefix search

Implementing Longest-Prefix Matching Cannot easily use hashing Data structure of choice is binary trie Identifies unique prefix needed to match route

Example Of Unique Prefixes

Example Binary Trie For The Seven Prefixes

Modifications And Extensions Several variations of trie data structures exist PATRICIA trees Level-Compressed tries (LC-tries) Motivation Handle longest-prefix match Skip levels that do not distinguish among routes

Non=routable Addresses CIDR blocks reserved for use within a site Must never appear on the Internet ISPs do not maintain routes Also called private addresses or RFC 1918 addresses

Summary Original IP addressing scheme was classful Two extensions added Subnet addressing CIDR addressing Subnetting used only within a site CIDR used throughout the Internet Both use 32-bit address mask CIDR mask identifies division between network prefix and host suffix Subnet mask identifies boundary between subnet and individual host

Summary (continued) Single unified routing algorithm handles routes that are Network-specific Subnet-specific Host-specific Limited broadcast Directed broadcast to network Directed broadcast to subnet Default Longest-prefix match required Typical implementation: binary trie

PART XI PROTOCOL LAYERING

Motivation For Layering Communication is difficult to understand Many subproblems Hardware failure Network congestion Packet delay or loss Data corruption Data duplication or inverted arrivals

Solving The Problem Divide the problem into pieces Solve subproblems separately Combine into integrated whole Result is layered protocols

Protocol Layering Separates protocol functionality Each layer solves one part of the communication problem Intended primarily for protocol designers Set of layers is called a protocol stack

Concept Of Layering

A More Realistic Layer

Layering In An Internet

Examples Of Layering Two models exist ISO 7-layer reference model for Open System Interconnection (OSI) Predates TCP/IP Does not include an Internet layer Prescriptive (designed before protocols) Internet 5-layer reference model Designed for TCP/IP Descriptive (designed along with actual protocols)

ISO (or OSI) 7-Layer Reference Model

TCP/IP 5-Layer Reference Model

Comparison of Models

TCP/IP Layer 1: Physical Hardware Defines electrical signals used in communication (e.g., voltages on wires between two computers) Uninteresting except to electrical engineers

TCP/IP Layer 2: Network Interface Defines communication between computer and network hardware Isolates details of hardware (MAC) addressing Example protocol: ARP Code is usually in the operating system

TCP/IP Layer 3: Internet Protocol is IP Provides machine to machine communication Defines best-effort, connectionless datagram delivery service for the Internet Code is usually in the operating system

TCP/IP Layer 4: Transport Provides end-to-end connection from application program to application program Often handles reliability, flow control Protocols are TCP and UDP Code is usually in the operating system

TCP/IP Layer 5: Application Implemented by application programs Many application-specific protocols in the Internet Built on top of transport layer

Two Differences Between TCP/IP And Other Layered Protocols TCP/IP uses end-to-end reliability instead of link-level reliability TCP/IP places the locus of intelligence and decision making at the edge of the network instead of the core

The Layering Principle Software implementing layer n at the destination receives exactly the message sent by software implementing layer n at the source.

Illustration Of Layering Principle

When A Datagram Traverses The Internet All layers involved at Original source Ultimate destination Only up through IP layer involved at Intermediate routers

Illustration Of Layering In An Internet

A Key Definition A protocol is classified as end-to-end if the layering principle applies from one end of the Internet to the other Examples IP is machine-to-machine because layering principle only applies across one hop TCP is end-to-end because layering principle from original source to ultimate destination

Practical Aspect Of Layering Multiple protocols at each layer One protocol used at each layer for given datagram

Example Of Two Protocols At Network Interface Layer: SLIP And PPP Both used to send IP across Serial data circuit Dialup connection Each defines standards for Framing (encapsulation) Addressing Incompatible

Notion Of Multiple Interfaces And Layering

Boundaries In The TCP/IP Layering Model High-level protocol address boundary Division between software that uses hardware addresses and software that uses IP addresses Operating system boundary Division between application program running outside the operating system and protocol software running inside the operating system

The Consequence Of An Address Boundary Application programs as well as all protocol software from the Internet layer upward use only IP addresses; the network interface layer handles physical addresses.

Illustration Of The Two Boundaries

Handling Multiple Protocols Per Layer Sender places field in header to say which protocol used at each layer Receiver uses field to determine which protocol at next layer receives the packet Known as multiplexing and demultiplexing

Example Of Demultiplexing An Incoming Frame

Example Of Demultiplexing Performed By IP

Example Of Demultiplexing Performed By TCP TCP is part of operating system Transfer to application program must cross operating system boundary

Discussion What are the key advantages and disadvantages of multiplexing / demultiplexing? Can you think of an alternative?

Summary Layering Intended for designers Helps control complexity in protocol design TCP/IP uses 5-layer reference model Conceptually, a router only needs layers 2 and 3, and a host needs all layers IP is machine-to-machine protocol TCP is end-to-end protocol Demultiplexing used to handle multiple protocols at each layer