EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.

Slides:



Advertisements
Similar presentations
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Advertisements

CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
CS 457 – Lecture 16 Global Internet - BGP Spring 2012.
Chapter 21 Exercises 1. A router forwards packets between networks. (Given a destination host address, it must be able to figure out which network that.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chapter 18. IP: Internet Protocol Addresses
1 IP: Internet Protocol Addresses. 2 Internet Protocol (IP) Only protocol at Layer 3 Fundamental in suite Defines –Internet addressing –Internet packet.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
Winter CMPE 155 Week 8. Winter Router demos: background.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
IP Address 1. 2 Network layer r Network layer protocols in every host, router r Router examines IP address field in all IP datagrams passing through it.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Chapter 5 The Network Layer.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
IP Address 1. 2 Network layer r Network layer protocols in every host, router r Router examines IP address field in all IP datagrams passing through it.
EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Network Layer IS250 Spring 2010
Q and A, Ch. 21 IS333, Spring 2015 Victor Norman.
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP Addressing. Dotted Decimal Notation IP addresses are written in a so-called dotted decimal notation Each byte is identified by a decimal number in.
Types of Addresses in IPv4 Network Range
1 26-Aug-15 Addressing the network using IPv4 Lecture # 2 Engr. Orland G. Basas Prepared by: Engr. Orland G. Basas IT Lecturer.
4: Addressing Working At A Small-to-Medium Business or ISP.
1 Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair ( NETID, HOSTID ) Addresses.
DHCP: Dynamic Host Configuration Protocol
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
CSISCSIS Dr. ClincyLecture1 SUPERNETTING Although class A and B addresses are dwindling – there are plenty of class C addresses The problem with C addresses.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
Chapter 4, slide: 1 CS 372 – introduction to computer networks* Friday July 23, 2010 Announcements: r Midterms are graded. r Lab 4 is posted. Acknowledgement:
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Network Layer Lecture 15 Imran Ahmed University of Management & Technology.
Private Network Addresses IP addresses in a private network can be assigned arbitrarily. – Not registered and not guaranteed to be globally unique Generally,
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
CIDR Classless Inter Domain Routing Give the IP address space some breathing room! Basic idea: allocate the remaining IP addresses in variable-size blocks.
1 Addressing, Internetworking. 2 Collection of Subnetworks The Internet is an interconnected collection of many networks.
CS470 Computer Networking Protocols
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
IP. Classless Inter-Domain Routing Classful addressing scheme wasteful – IP address space exhaustion – A class B net allocated enough for 65K hosts Even.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
Routing. Classless Inter-Domain Routing Classful addressing scheme wasteful – IP address space exhaustion – A class B net allocated enough for 65K hosts.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Q and A, Ch. 21 IS333, Spring 2016 Victor Norman.
Introduction to Internetworking. 2 The IP Addressing Scheme (IPv4) (psu.edu) Dotted Decimal Notation: A notation more convenient for humans.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
IP Addressing. A 32-bit logical naming convention A dotted-decimal notation is used: – –Each number represents 8 bits. Number is Part.
Network Layer/IP Protocols 1. Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2.
IP Addressing Introductory material.
IP: Addressing, ARP, Routing
IP.
PART IV Network Layer.
IP Addressing Introductory material.
Q and A, Ch. 21 CS332, Fall 2017 Victor Norman.
IP Addressing Introductory material.
EEC-484/584 Computer Networks
EEC-484/584 Computer Networks
Wide Area Networks and Internet CT1403
IP Addressing Introductory material
Network Address Translation (NAT)
Presentation transcript:

EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer Networking book)

2 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Outline Reminder: –Lab#4 (IP) next Monday (Nov. 2) –IS&T tour next Wed 4pm (attendance mandatory!) Internet protocol –Classful IP address allocation –CIDR Network address translation

3 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao IP Addresses

4 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao IP Addresses IP address are usually written in dotted decimal notation –Each of the 4 bytes is written in decimal, from 0 to 255 –Lowest IP , highest Special IP addresses

5 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Subnets Allow a network to be split into several parts for internal use, but to act as a single network to outside world Take some bits away from host numbers Subnet mask – needed by the main router. Indicates split between network + subnet number and host –Write the address and the mask as a binary number –If mask bit is 1, then corresponding bit of address matters

6 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Subnets E.g., A class B network can be subnetted into 64 subnets –Originally 16 bits for host info. Now, 6 bits used for subnet and 10 bits for host numbers –Subnet mask can be written as or /22 Subnet 1: Subnet 2: Subnet 3: A subnet is often represented in the form of base addr/mask: /22

7 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Problems with Classful Addressing A class is obviously too large for any organization C class is too small (only 256 addresses available) B class is requested and allocated, but it is still too large for most organizations  Many IP addresses are wasted  Shortage of IP addresses

8 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao CIDR – Classless InterDomain Routing For the remaining IP addresses, classless allocation is used –Allocate remaining IP addresses in variable-sized blocks (must be power of 2), without regard to the classes –The starting address must fall on the boundary of the block size –E.g., if a site needs, say, 2000 addresses, it is given a block of 2048 addresses on a 2048-byte boundary

9 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Classless Allocation – Example Routing tables are updated with the three assigned entries. Each entry contains a base address and a subnet mask (in short: base address/subnet mask) Base addressSubnet mask C: E: O:

10 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Classless Allocation – Example For Cambridge: –Ask 2000, allocate 2 11 = 2048 IP addresses block –Start IP: because it is multiple of 2 11 ( ) –Last IP: (i.e., : ) –Mask: /21 (8+8+5=21, or 32-11=21) For Edinburgh: –Ask 1000, allocate 2 10 = 1024 IP addresses –Start IP: because it is multiple of 2 10 ( ) –Last IP: (i.e., : ) –Mask: /22

11 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Classless Allocation – Example For Oxford: –Ask 4000, allocate 2 12 = 4096 IP addresses –Start IP: is multiple of 4096? : : No. => We can’t use as the start IP for Oxford –What is the next higher IP address that is multiple of 4096? : => this is our start IP for O –Last IP: : –Mask: /20

12 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Classless InterDomain Routing Each routing table is extended by giving it a 32-bit mask The routing table contains entries of (IP address, subnet mask, outgoing line) triples When a packet comes in, its destination IP address is first extracted Then, the routing table is scanned entry by entry, masking the destination address and comparing it to the table entry looking for a match If multiple entries (with different subnet mask lengths) match, the longest mask is used –E.g., if there is a match for a /20 mask and a /24 mask, the /24 mask is used

13 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao CIDR Routing: Example If a packet is addressed to , in binary First it is Boolean ANDed with the Cambridge mask to get This value does not match the Cambridge base address, so next try Edinburgh mask, to get This value still does not match, so Oxford is tried, yielding This value matches the Oxford base. If no longer matches are found, the Oxford entry is used and the packet is sent along the line named in it Base addressSubnet mask C: E: O:

14 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao NAT – Network Address Translation Another workaround for the IP addresses shortage problem: network address translation –One public IP address, many private IP addresses –When a packet exits the private network and goes to the ISP, an address translation takes place Three ranges of IP addresses have been declared as private: – – (16,777,216 hosts) – – /12 (1,048,576 hosts) – – /16 (65,536 hosts)

15 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao NAT – Network Address Translation Placement and operation of a NAT box

16 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao NAT – What about the Incoming Traffic? Solution is based on the assumption all traffic is TCP/UDP TCP/UDP has two port fields, one for source port, the other for destination port, each 16 bits wide The source port is used as an index to an internal table maintained by the NAT box The internal sender ’ s private IP and original port info are stored in the table When the reply comes back, it will carry the index as the destination port, the NAT box then translates the address back For both outgoing and incoming address translations, the TCP/UDP and IP header checksums are recomputed

17 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao NAT in Action Src: :1333 Dst: : : Dst: :80 Src: : Src: :80 Dst: :1 Src: :80 Dst: : : Private Network Public Network

18 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Drawback of NAT NAT violates the architectural model of IP, which states that every IP address uniquely identifies a single machine worldwide NAT box must maintain mapping info for each connection passing through it. This changes the Internet from a connectionless network to a kind of connection-oriented network NAT violates the most fundamental rule of protocol layering: layer k may not make any assumptions about what layer k+1 has put into the payload field NAT only support UDP/TCP traffic NAT has problem supporting apps that include local IPs in payload, such as FTP and H.323 Each NAT box can support at most 65,536 (2 16 ) hosts

19 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Internet Control Message Protocol When something unexpected occurs in Internet, the event is reported by routers using ICMP Principal ICMP message types

20 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Internet Control Message Protocol ICMP messages are sent using the basic IP header The first byte of the data portion of the datagram is a ICMP type field –The type field determines the format of the remaining data Typical format: type, code plus first 8 bytes of IP datagram that has caused the error Destination Unreliable Message Format

21 7/12/2015EEC-484/584: Computer NetworksWenbing Zhao Exercise - CIDR According to Classless InterDomain Routing, the remaining IP addresses are allocated in variable-sized blocks, without regard to the classes. However, the starting address must fall on the boundary of the block size allocated. Assuming that a large number of consecutive IP address are available starting at Suppose that three organizations, A, B, and C, request 4000, 1000, and 2000 addresses, respectively, and in that order. For each of these, give the first IP address assigned, the last IP address assigned, both must be in dotted decimal form, and the mask in the w.x.y.z/s notation.