Fragmentation Fragmentation and reassembly are done by the IP layer Fragmentation and reassembly are done by the IP layer Identification (16 bits) Identification.

Slides:



Advertisements
Similar presentations
Discussion Monday ( ). ver length 32 bits data (variable length, typically a TCP or UDP segment) 16-bit identifier header checksum time to live.
Advertisements

Introduction to IPv6 Presented by: Minal Mishra. Agenda IP Network Addressing IP Network Addressing Classful IP addressing Classful IP addressing Techniques.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
4 IP Address (IPv4)  A unique 32-bit number  Identifies an interface (on a host, on a router, …)  Represented in dotted-quad notation
IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
1 IP: Internet Protocol Addresses. 2 Internet Protocol (IP) Only protocol at Layer 3 Fundamental in suite Defines –Internet addressing –Internet packet.
Network Layer Packet Forwarding IS250 Spring 2010
IP Suite© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science Department.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #1 Subnet + CIDR.
1 Internet Networking Spring 2006 Tutorial 1 Subnetting and CIDR.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Extending Networks. Three Levels of Extension Physical Layer –Repeaters Link Layer –Bridges –Switches Network –Routers: “Connecting networks”
EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
1 Subnetting and Supernetting Oleh: Abdul Kholiq,S.Kom
1 CIDR Classless Inter-Domain Routing Rizwan Rehman, CCS, DU.
CS 6401 Efficient Addressing Outline Addressing Subnetting Supernetting.
3 Het IP-Protocol. 3 IP-protocol Services Routing Multiple client protocols Datagram delivery Independant from the Network Interface Layer Fragmentation.
IP Addressing. Dotted Decimal Notation IP addresses are written in a so-called dotted decimal notation Each byte is identified by a decimal number in.
Subnet & Classless Address Extensions Linda Wu (CMPT )
Fall 2006Computer Networks19-1 Chapter 19. Host-to-Host Delivery: Internetworking, Addressing, and Routing 19.1 Internetworks 19.2 Addressing 19.3 Routing.
ECE 4110 – Internetwork Programming Subnetting, Supernetting, and Classless Addressing.
1 Kyung Hee University Part 4 : Network Layer. 2 Kyung Hee University Role and Position of Network Layer o Network layer in the Internet model is responsible.
CIDR Classless Inter-Domain Routing
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
IP Addressing Introductory material. An entire module devoted to IP addresses.
CSISCSIS Dr. ClincyLecture1 SUPERNETTING Although class A and B addresses are dwindling – there are plenty of class C addresses The problem with C addresses.
Routing tables and Route Summarisation What is a routing table? How do I create a “good” one?
CDPA 網管訓練 駭客任務 2 Ethernet Switching ARP, IP, LAN, Subnet IP Header, Routing ICMP
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640.
Dr. John P. Abraham Professor UTPA
IP Addressing. ● IPv4 addresses… ■ Uniquely identify an interface ■ 32 bits long ■ Consist of a network identifier and a host identifier ● Routing outside.
1 Kyung Hee University Prof. Choong Seon HONG Subnetting/ Supernetting and Classless Addressing.
TCP/IP Networking (2:1) Joy Kuri, Haresh Dagale, T.V.Prabhakar.
CS470 Computer Networking Protocols
Ethernet switch Hosts Can talk using Ethernet addresses only.
1 Lecture, November 20, 2002 Message Delivery to Processes Internet Addressing Address resolution protocol (ARP) Dynamic host reconfiguration protocol.
1 Lecture 11 Routing in Virtual Circuit Networks Internet Addressing.
1 Variable Length Subnet Masks ( VLSM ) “ Classful Route” Means if a route to a network starting with is received, it is a class A => mask length.
Subnetting and Supernetting.
IP Addressing. A 32-bit logical naming convention A dotted-decimal notation is used: – –Each number represents 8 bits. Number is Part.
Network Layer/IP Protocols 1. Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2.
Subnetting Subnetting is not in the CIS221-3 Syllabus
30/11/1008-Supernetting1 Revision of Classful IP Addressing © Tanenbaum, Prentice Hall International.
IP – Subnetting and CIDR
Chapters 4 & 5 Addressing Part 2 of 2
Subnetting and Supernetting
IP Addressing Introductory material.
NET 221D:Computer Networks Fundamentals
IP Addresses: Classful Addressing IP Addresses. CONTENTS INTRODUCTION CLASSFUL ADDRESSING Different Network Classes Subnetting Classless Addressing Supernetting.
IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
Subnetting and Supernetting.
Internet Networking recitation #1
Chapter-5 TCP/IP Suite.
4 Network Layer Part I Computer Networks Tutun Juhana
IP (slides derived from past EE122 sections)
The IP addresses are unique. The address space of IPv4 is 2 32 or 4,294,967,296.
Chapter 5 Addressing Dr. Clincy Lecture.
Unit 2: IP addressing (Contd.). Delivery and routing of packets
Dr. John P. Abraham Professor UTPA
EEC-484/584 Computer Networks
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Data Communications and Networking
Dr. John P. Abraham Professor UTPA
IP Addressing Introductory material
Introduction to Network
Presentation transcript:

Fragmentation Fragmentation and reassembly are done by the IP layer Fragmentation and reassembly are done by the IP layer Identification (16 bits) Identification (16 bits) –To identify fragments as pieces of the original (along with source and destination addresses, and “protocol” field)

Fragmentation Flags (3 bits) Flags (3 bits) –“More” bit –“Don’t fragment” bit –Unused Offset (13 bits) Offset (13 bits) –Offset in 8-byte units from the beginning of the payload of the original

Fragmentation Id = abcd Frag 1 Frag 2 Id = abcd, More = 1, Offset = 0 Id = abcd, More = 0, Offset = x

Fragmentation Each fragment becomes a packet on its own Each fragment becomes a packet on its own –Routed independently of others Reassembly timer at receiver Reassembly timer at receiver –If all fragments do not arrive by the reassembly time-out, original packet cannot be obtained –ICMP error generated IP: RFC 791 IP: RFC 791

Class B address: x.y To the Internet eth0 eth eth eth eth eth1 Routing table

Problem Too many entries Too many entries No way to aggregate No way to aggregate Can we “extend” the network-id somehow? Can we “extend” the network-id somehow?

Subnetting The bits in the hostid part are further divided: The bits in the hostid part are further divided: netidhostid subnetid hostid

Subnet masks To extract the netid and subnetid parts from the IP address To extract the netid and subnetid parts from the IP address String of 1-s with trailing 0-s in the hostid part String of 1-s with trailing 0-s in the hostid part Bit-wise AND

Class B address: x.y To the Internet eth0 eth *eth * eth1 Routing table

Router operation Subnet mask: Subnet mask: Router should store this Router should store this Apply it to the D.A. field of incoming packet Apply it to the D.A. field of incoming packet Compare with and Compare with and

Forwarding Compact routing table Compact routing table Example was with a router Example was with a router –Same considerations for a host with multiple interfaces

N/w C1 N/w C2N/w C50

N/w C1 N/w C2N/w C50 Without subnetting C1 C2 … C50 Core router C1 C2 … C50 Core router

Subnetting Imagine now that instead of 50 Class C addresses, the organizations shared a single Class B address with subnetting Imagine now that instead of 50 Class C addresses, the organizations shared a single Class B address with subnetting

With subnetting B Core router B B1 B2 … B50 Edge router

Subnetting: drawbacks The size of the routing tables in the core routers decreases The size of the routing tables in the core routers decreases But problem: a class B address is used up! But problem: a class B address is used up! With 50 Class C addresses: 50x254=12700 hosts With 50 Class C addresses: 50x254=12700 hosts With a Class B address: hosts! With a Class B address: hosts! –Many addresses likely to be unused Class B address space starting to get exhausted Class B address space starting to get exhausted

Earlier example again N/w C1 N/w C2N/w C50 C1 C2 … C50 Core router C1 C2 … C50 Core router

Aggregation again? What if the 50 Class C addresses are allocated “nicely”, so that they can be aggregated? What if the 50 Class C addresses are allocated “nicely”, so that they can be aggregated? Leads to the idea of supernetting Leads to the idea of supernetting

Supernetting Example Example –C1: –C2: rd octet: 3 rd octet: – – Aggregation: Aggregation: Single r.t. entry: Single r.t. entry: – * Mask to be used: 23 bits Mask to be used: 23 bits

Supernetting N/w C1 N/w C2N/w C50 Aggr C Core router Aggr C Core router

Supernetting Avoids routing table size explosion Avoids routing table size explosion Also avoids wasted (unused) IP addresses Also avoids wasted (unused) IP addresses A “best of both worlds” solution A “best of both worlds” solution Key: allocate Class C addresses appropriately, so that aggregation is possible Key: allocate Class C addresses appropriately, so that aggregation is possible

CIDR With classes A, B and C, the number of netid bits (i.e., “netmask length”) is implicitly fixed: 8, 16 and 24 With classes A, B and C, the number of netid bits (i.e., “netmask length”) is implicitly fixed: 8, 16 and 24 But with aggregation, variable-length netmasks are necessary But with aggregation, variable-length netmasks are necessary Classless Inter-Domain Routing Classless Inter-Domain Routing