TCOM 515 IP Routing. Syllabus Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static.

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Advertisements

TCP/IP TCP/IP architecture
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Internet Control Message Protocol (ICMP)
1 Internet Networking Spring 2002 Tutorial 4 ICMP (Internet Control Message Protocol)
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
Oct 19, 2004CS573: Network Protocols and Standards1 IP: Datagram and Addressing Network Protocols and Standards Autumn
1 Internet Control Message Protocol (ICMP) RIZWAN REHMAN CCS, DU.
Chapter Overview TCP/IP Protocols IP Addressing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5 Sandra Coleman, CCNA, CCAI.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5.
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
TCOM 515 IP Routing Lab Lecture 1. Class information Instructor: Wei Wu –Lecture and Lab session 2 – Instructor:
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
CCNA 2 Week 8 TCP/IP Suite Error Control Messages.
10/13/2015© 2008 Raymond P. Jefferis IIILect 07 1 Internet Protocol.
10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol.
The Saigon CTT Semester 1 CHAPTER 10 Le Chi Trung.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals.
Hour 4 The Internet Layer 1. What You'll Learn in This Hour: IP addresses The IP header ARP ICMP 2.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
Basic IP Protocol Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Chapter 23 Internet Control Message Protocol used to report information and errors IP uses ICMP when it sends an error message ICMP uses IP to transport.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
CCNA Exploration Network Fundamentals Chapter 05 Network Layer 1 KC KHOR, Multimedia Univ. Cyberjaya.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Cisco 2 - Routers Perrine. J Page 112/19/2015 Chapter 8 TCP/IP Error Message Some of the conditions that must be met in order for host to host communication.
ICMPv6 Error Message Types Informational Message Types.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
Internet Protocol Version 4 VersionHeader Length Type of Service Total Length IdentificationFragment Offset Time to LiveProtocolHeader Checksum Source.
THE CLASSIC INTERNET PROTOCOL (RFC 791) Dr. Rocky K. C. Chang 20 September
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Sem1 - Module 10 Routing Fundamentals and Subnets
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
Packet Switch Network Server client IP Ether IPTCPData.
Network Layer IP Address.
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Dr. Richard Spillman Fall 2006
Internet Control Message Protocol (ICMP)
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internetworking Outline Best Effort Service Model
Chapter 15. Internet Protocol
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
ITIS 6167/8167: Network and Information Security
Presentation transcript:

TCOM 515 IP Routing

Syllabus

Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static routes

What is Routing? Routing operates at the 3rd layer of the OSI model, the network layer. A router uses routing algorithms to select the best to any given destination. A packet is routed from a source across one or more networks to the identified destination. To select the best path, router builds a routing table from information its own configuration and from updates sent from other routers.

First a router receives a packet inbound on one of its local interfaces. Then the router looks into the IP header of the given packet at the destination IP specified. Next the router looks into its routing table and selects the best path to that destination. Finally the router updates the IPpacket with the next hop and sends the packet along its way through the network. How does routing work?

OSI Model

Routing in the OSI Model Routing takes place at the Network Layer of the OSI Model. It uses the information in the IP packet header, specifically the IP address of the destination network, to make decision and send it along the network. IP packets encapsulate TCP and UDP datagrams, but they are not touched during the routing processes. Once a packet reaches The local network of its destination IP, layer 2, Link Layer, uses its protocol to deliver the packet.

Routers Routers - device that sends a packet (set of data) along a route from one network to another. It first checks for the destination of the packet on its local or directly connected interfaces. If the destination is not local it looks in its routing table for a route to the destination. Any non-local route is learned from a routing protocol running on the router.

Routing Protocols Routing Protocol - set of procedures used by routers to determine and use the optimal router and to share its network information with other routers. This routing protocol guides how to send its information to other routers, how to receive and process information from other routers, and how to select the best path to each desination network. That destination and optimal path are used to build a routing table.

IP Packet Header

Version - 4 bit - IP version IPv4 (0100) or IPv6 (0110) IP Header Length (IHL) - 4 bit - indicates the datagram header length in 32-bit words, including options. Type-of-Service - 8 bit -information for higher layer protocols on handling and priority levels, broken into precedence and TOS Total Length - 16 bit - length of IP packet, in terms of bytes, including both data and header. Identification - 16 bit - Contains an integer that identifies the current datagram. This field is used to help piece together datagram fragments. Flags - 3 bit - First bit is unused. The second bit is the DF, Do Not Fragment bit, which generates an error and drops the packet if fragmentation is needed. The last bit is the MF, More Fragments bit, which tells the router whether or not more fragments are coming. MF = 0 means that it is the last fragment. Fragment Offset - 13 bit - Specifies fragmentation offset in terms of eight octet units from the beginning of the IP header. Used to order fragments once all are received. IP Packet Header Fields

Time-to-Live - 8 bit - Hop count that is decremented by each router that touches the packet. TTL is used to prevent endless loops and routing problems. Once TTL = 1 or 0, the packet is dropped and ICMP error message is sent to source. Protocol - 8 bit - Specifies the next higher level protocol of host-to-host or transport protocol. TCP ( ) UDP ( ) Header Checksum - 16 bit - One’s complement checksum of original packet, compared to calculation of receiver’s packet. Recalculated at each router because of TTL change. Source Address - 32 bit - IP address of sender. Destination Address - 32 bit - IP address of intended receiver Options - Variable Length - allows for further information including, routing info types: loose or strict, record route and timestamps. Uses padding to finish 32 bit words. Data - higher layer ( TCP or UDP ) datagram IP Packet Header Fields

IP Addressing Review IP Addresses have 32 bits broken into 4 octets. They are expressed in dotted decimal notation. Addresses may range from to Address ranges are assigned by Internet Assigned Numbers Authority IANA, who in turns assigns IP ranges to Regional Internet registry.

IP Subnet Classes ClassRangePurposeNumber of Hosts A > Large Organizations16,777,214 B > Medium Organizations65,543 C > Small Organizations254 D > MulticastN/A E > ExperimentalN/A

Some IP address block ranges have be reserved for special uses by the Internet governing bodies. For example, RFC 1918 specifies 3 blocks for use in private networks. Any organization can use these subnets, but can’t advertise them outside of their network to another organization or to the Internet. These private ranges have helped with the dwindling public IP ranges available. These ranges are: / / /16 Other subnets have assigned uses, please refer to for more information.

IP addresses need a subnet mask in order to put it into the reference of a network. The subnet mask is like a zip code for a street address. The subnet mask determines the network address that a specific host IP belongs. For example: which translates to: The network address is the host bits that align with the 1 bits of the subnet mask: The broadcast address is the host bits that align with the 1 bits of the subnet mask but with the host bits that align with the 0 bits of the subnet mask all set to 1:

Let’s try an example of subnet masking: A host has an IP address of: What is the IP address put into binary form? = =

Below is a table to help you understand translation of bits into subnet masks. Each octet of a subnet mask can only have values of the numbers in the blocks on the right-hand side in addition to the possible value of 1.

Now let’s continue the example of: = = What is the network and broadcast address for this host? Network address is = Broadcast address is =

Now let’s continue the example of: = = = = How many useable IP host addresses are in this network? Host range is 2^14 -2 (network and broadcast addresses) = 16,382 host IP addresses

One more example: What are the network address, broadcast address, and host range? Host range is 2^5 -2 (network and broadcast addresses) 32-2 = 30 host IP addresses Broadcast address is = Network address is =

ARP- Address Resolution Protocol ARP is used to find the MAC address of destination IP address on the local subnet. ARP has three variants: Reverse, Proxy, Gratuitous. RARP- Reverse Address Resolution Protocol - is used find the IP address of the given MAC address. Proxy allows another device to answer ARP requests for IP addresses it doesn’t actually own. Gratuitous involves and host ARPing for its own IP address to check for duplicate IP addresses and advertise its won IP. IP addressed hosts use their subnet mask to determine whether to ARP for the destination or send the packet to their gateway. If the destination IP is in its network, it ARPs. If it is not in its network, it sends the packet to its default gateway.

ICMP Internet Control Message Protocol typecodechecksum unused IP header + 1st 64 bits of datagram ICMP messages are used by network devices to manage communication such as errors, queries and responses. A combination of types and codes identify the packet type which is defined in RFC 792 and RFC The IP header and part of the datagram help the source determine which packet generated the ICMP message.

ICMP Types and Codes 0,0 - Echo reply & 8,0 - Echo request - Ping functionality 3,0-3 - Unreachable messages 3,4 - Fragmentation needed but not allowed 3,6-7 - Destination unknown 3, Destination prohibited 11,0-1 Time exceeded - TTL field 1 or 0***Used for ping and traceroute 30, * - Traceroute functionality

TCP - Transmission Control Protocol TCP datagrams are encapsulated in IP packets for transport across the network. Routes usually do not look beyond the IP header of the data for routing decisions. TCP is a reliable protocol.

UDP - User Datagram Protocol UDP datagrams are also encapsulated in IP packets. UDP is a unreliable, best effort protocol. There is no error checking or acknowledgement.

Route Tables Routers used data from its own interfaces and other routers to build a routing table. The router then refers to this routing table to make decisions on where to send the packets it receives. Routing table entries include information: Destination address - network address of a subnet Next hop - interface or IP address of next hop in path Type of route: C- Connected, S - Static, R- RIP, O - OSPF

Routing Decisions Routers match the destination IP address to the network addresses in its routing table based on the most specific entry. The ordering is: Host address ( a /32 or individual host route) Subnet Group of Subnets Major Network Default address If a router has 2 equal paths to the destination, it will balance traffic by sending packets through both routes. This mechanism is referred to as load balancing because it will share the load on the two paths.

Connected Routes The first type of routes that a router inserts into its routing table are connected to its interfaces. Based on the IP addresses and subnet masks of its own interfaces, the router inserts route statements of the network addresses and the next hop as the configured interface. No additional configuration of routing or routing protocols is necessary. The administrative distance of a connected route is zero. Connected Route Table Entry C /8 is directly connected, FastEthernet 1/0

Static Routes Static routes are manually configured on a router by the network administrator. The static route has 3 parts the network IP address, the subnet mask for the network IP, and the next hop. The next hop must be either: A specified interface on the router An IP address already in the routing table The interface must be up for the router to put the static route pointing to it into its routing table. If the interface goes down, the route is removed. The next hop IP address must be in the routing table to put the static route pointing to it into its routing table. If the route table statement for the next hop address is removed, the static route is also removed from the route table.

Static Routes Cont. A static pointing to an interface routing table entry looks like: S /12 is directly connected via FastEthernet 1/0 A static point to an IP address routing table entry looks like: S /12 via A static route is the only route other than directly connected that doesn’t require a routing protocol. It is used to reach a network not directly connected to the router, but reachable through one of its directly connected links.

Summary IP addressing and subnet masking Routing decisions Connected Routes Static Routes Our lab will cover router configuration, directly connected routes and static routes. Please make sure you read Chapter 1 for background information.