13-Sep-154/598N: Computer Networks Address Translation Map IP addresses into physical addresses –destination host –next hop router Techniques –encode physical.

Slides:



Advertisements
Similar presentations
CSCI-1680 Network Layer: Intra-domain Routing Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Advertisements

CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 12 – February 18, 2010.
Computer Networks with Internet Technology William Stallings
CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 11 – February 16, 2010.
Spring 2003CS 4611 Routing Outline Algorithms Scalability.
1 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
ECE544: Communication Networks-II, Spring 2010 D. Raychaudhuri Lecture 4 Includes teaching materials from L. Peterson.
Spring 2003CS 4611 Internetworking COS 461 Spring 2003.
Chapter 4 IP Routing Professor Rick Han University of Colorado at Boulder
CS Internetworking Slide Set 8. In this set... Addressing Datagram forwarding.
ECE544: Communication Networks-II, Spring 2007 D. Raychaudhuri Lecture 4,5 Includes teaching materials from L. Peterson.
1 ELEN 602 Lecture 19 Routing. 2 Overview Forwarding vs Routing –forwarding: to select an output port based on destination address and routing table –routing:
Spring 2002CS 4611 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
Spring 2002CS 4611 Routing Outline Algorithms Scalability.
CSS432 Routing Textbook Ch 3.3
CS 6401 Routing, Routers, Switching Fabrics Outline Link state routing Link weights Router Design / Switching Fabrics.
26-Aug-154/598N: Computer Networks Recap SBC UUNET Comcast Sprint End Users Internet First mile problem Last mile problem.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Network Layer Lecture # 2 MAHS. 4: Network Layer 4b-2 Hierarchical Routing scale: with 200 million destinations: r can’t store all dest’s in routing tables!
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Routing Protocols. 2 Distributed Routing Protocols Rtrs exchange control info Use it to calculate forwarding table Two basic types –distance vector.
1 Routing Outline Algorithms Scalability. 2 Overview Forwarding vs Routing –forwarding: to select an output port based on destination address and routing.
Spring 2008CS 3321 Intradomain Routing Outline Algorithms Scalability.
1 Chapter 22 Network layer Delivery, Forwarding and Routing (part2)
1 Introduction to Computer Networks Ilam University By: Dr. Mozafar Bag-Mohammadi Routing.
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
1 Routing Distance Vector Routing Link State Routing Hierarchical Routing Routing for Mobile Hosts.
10/13/2015© 2008 Raymond P. Jefferis IIILect 07 1 Internet Protocol.
1 Introduction to Computer Networks University of Ilam By: Dr. Mozafar Bag-Mohammadi Routing.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
CSS 432: Routing 1 CSS432 Routing Textbook Ch3.3 Professor: Munehiro Fukuda.
Lecture 17 November 8Intra-domain routing November 13Internet routing 1 November 15Internet routing 2 November 20End-to-end protocols 1 November 22End-to-end.
1 Introduction to Computer Networks University of Ilam By: Dr. Mozafar Bag-Mohammadi Routing.
Spring 2006CS 3321 Intradomain Routing Outline Algorithms Scalability.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
CSCI-1680 Network Layer: Intra-domain Routing Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca John Jannotti.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
23-Dec-154/598N: Computer Networks Overview 4.2: Routing Forwarding vs Routing –forwarding: to select an output port based on destination address and routing.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Computer Networks22-1 Network Layer Delivery, Forwarding, and Routing.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
1 Internetworking Outline Best Effort Service Model Global Addressing Scheme.
CSS432 Routing Textbook Ch3.3
NAT – Network Address Translation
Routing and Switching Fabrics
ICMP ICMP – Internet Control Message Protocol
CSCI-1680 Network Layer: Intra-domain Routing
Intra-Domain Routing Jacob Strauss September 14, 2006.
ECE544: Communication Networks-II, Spring 2006
Advanced Computer Networks
Mid term grade distribution
Internetworking Outline Best Effort Service Model
ECE544: Communication Networks-II, Spring 2016
Intradomain Routing Outline Introduction to Routing
Overview The Internet (IP) Protocol Datagram format IP fragmentation
2. Fragmentation and Reassembly
Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.) Goal is to use this opportunity.
Communication Networks
Advanced Computer Networks
Communication Networks
Routing Outline Algorithms Scalability Spring 2003 CS 332.
Routing and Switching Fabrics
Presentation transcript:

13-Sep-154/598N: Computer Networks Address Translation Map IP addresses into physical addresses –destination host –next hop router Techniques –encode physical address in host part of IP address –table-based ARP –table of IP to physical address bindings –broadcast request if IP address not in table –target machine responds with its physical address –table entries are discarded if not refreshed

13-Sep-154/598N: Computer Networks ARP Details Request Format –HardwareType: type of physical network (e.g., Ethernet) –ProtocolType: type of higher layer protocol (e.g., IP) –HLEN & PLEN: length of physical and protocol addresses –Operation: request or response –Source/Target-Physical/Protocol addresses Notes –table entries timeout in about 10 minutes –update table with source when you are the target –update table if already have an entry –do not refresh table entries upon reference

13-Sep-154/598N: Computer Networks ARP Packet Format TargetHardwareAddr (bytes 2 5) TargetProtocolAddr (bytes 0 3) SourceProtocolAddr (bytes 2 3) Hardware type = 1ProtocolType = 0x0800 SourceHardwareAddr (bytes 4 5) TargetHardwareAddr (bytes 0 1) SourceProtocolAddr (bytes 0 1) HLen = 48PLen = 32Operation SourceHardwareAddr (bytes 0―3) ― ― ―― ― ―

13-Sep-154/598N: Computer Networks Sample arp table in darwin.cc.nd.edu arp -a Net to Media Table: IPv4 Device IP Address Mask Flags Phys Addr hme0 eafs-e06.gw.nd.edu :d0:c0:d3:aa:40 hme0 bind.nd.edu :00:20:8a:5f:cf hme0 honcho-jr.cc.nd.edu :b0:d0:82:83:7f hme0 mail-vip.cc.nd.edu :e0:52:0c:56:c4 hme0 john.helios.nd.edu :00:20:85:db:c4 hme0 casper.helios.nd.edu :00:20:b1:f8:e1 hme0 pinky.helios.nd.edu :00:20:a9:88:30

13-Sep-154/598N: Computer Networks ARP problems ARP trusts any response - no authentication method –Works great at home, how about Notre Dame Replies which do not correspond to requests are allowed to update cache in many instances New information must supercede old info

13-Sep-154/598N: Computer Networks Internet Control Message Protocol (ICMP) Echo (ping) –/usr/src/sbin/ping/ping.c Redirect (from router to source host) Destination unreachable (protocol, port, or host) TTL exceeded (so datagrams don’t cycle forever) –/usr/src/contrib/traceroute/traceroute.c Checksum failed Reassembly failed Cannot fragment

13-Sep-154/598N: Computer Networks Virtual Private Networks (VPN) and tunnel Create a virtual network connecting different networks across the general Internet –Connect ND campus in South Bend and London to make them look like a single LAN even though packets traverse general IP network Use IP tunneling or IP over IP –Encapsulate IP packets inside other IP packets –Extra overhead Router Host IP tunnel

13-Sep-154/598N: Computer Networks Overview 4.2: Routing Forwarding vs Routing –forwarding: to select an output port based on destination address and routing table –routing: process by which routing table is built Network as a Graph Problem: Find lowest cost path between two nodes Factors –static: topology –dynamic: load –Distributed algorithm

13-Sep-154/598N: Computer Networks Distance Vector (e.g. RIP v1) Each node maintains a set of triples –(Destination, Cost, NextHop) Directly connected neighbors exchange updates –periodically (on the order of several seconds) –whenever table changes (called triggered update) Each update is a list of pairs: –(Destination, Cost) Update local table if receive a “better” route –smaller cost –came from next-hop Refresh existing routes; delete if they time out

13-Sep-154/598N: Computer Networks D G A F E B C Example Destination Cost NextHop A 1 A C 1 C D 2 C E 2 A F 2 A G 3 A

13-Sep-154/598N: Computer Networks Routing Loops Example 1 –F detects that link to G has failed –F sets distance to G to infinity and sends update to A –A sets distance to G to infinity since it uses F to reach G –A receives periodic update from C with 2-hop path to G –A sets distance to G to 3 and sends update to F –F decides it can reach G in 4 hops via A Example 2 –link from A to E fails –A advertises distance of infinity to E –B and C advertise a distance of 2 to E –B decides it can reach E in 3 hops; advertises this to A –A decides it can read E in 4 hops; advertises this to C –C decides that it can reach E in 5 hops…

13-Sep-154/598N: Computer Networks Loop-Breaking Heuristics Set infinity to 16 Split horizon Split horizon with poison reverse

13-Sep-154/598N: Computer Networks Link State (e.g. OSPF) Strategy –send to all nodes (not just neighbors) information about directly connected links (not entire routing table) Link State Packet (LSP) –id of the node that created the LSP –cost of link to each directly connected neighbor –sequence number (SEQNO) –time-to-live (TTL) for this packet

13-Sep-154/598N: Computer Networks Link State (cont) Reliable flooding –store most recent LSP from each node –forward LSP to all nodes but one that sent it –generate new LSP periodically increment SEQNO –start SEQNO at 0 when reboot –decrement TTL of each stored LSP discard when TTL=0

13-Sep-154/598N: Computer Networks Route Calculation Dijkstra’s shortest path algorithm Let –N denotes set of nodes in the graph –l (i, j) denotes non-negative cost (weight) for edge (i, j) –s denotes this node –M denotes the set of nodes incorporated so far –C(n) denotes cost of the path from s to node n M = {s} for each n in N - {s} C(n) = l(s, n) while (N != M) M = M union {w} such that C(w) is the minimum for all w in (N - M) for each n in (N - M) C(n) = MIN(C(n), C (w) + l(w, n ))

13-Sep-154/598N: Computer Networks Metrics Original ARPANET metric –measures number of packets queued on each link –took neither latency or bandwidth into consideration New ARPANET metric –stamp each incoming packet with its arrival time (AT) –record departure time (DT) –when link-level ACK arrives, compute Delay = (DT - AT) + Transmit + Latency –if timeout, reset DT to departure time for retransmission –link cost = average delay over some time period Fine Tuning –compressed dynamic range –replaced Delay with link utilization