© Janice Regan, CMPT 128, 2007-2012 0 CMPT 371 Data Communications and Networking Network Layer NAT, IPv6.

Slides:



Advertisements
Similar presentations
Introduction to IPv6 Presented by: Minal Mishra. Agenda IP Network Addressing IP Network Addressing Classful IP addressing Classful IP addressing Techniques.
Advertisements

Future Directions For IP Architectures Ipv6 Cs686 Sadik Gokhan Caglar.
IPv6 The New Internet Protocol Integrated Network Services Almerindo Graziano.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
IPv6 AL-MAJRASHI, FAHAD AL-MUQAIREN, FAHAD
The Future of TCP/IP Always evolving: –New computer and communication technologies More powerful PCs, portables, PDAs ATM, packet-radio, fiber optic, satellite,
PRIVATE NETWORK INTERCONNECTION (NAT AND VPN) & IPv6
CSCI 4550/8556 Computer Networks Comer, Chapter 22: The Future IP (IPv6)
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
1 IPv6. 2 Problem: 32-bit address space will be completely allocated by Solution: Design a new IP with a larger address space, called the IP version.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
IPv6 Victor T. Norman.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPV6. Features of IPv6 New header format Large address space More efficient routing IPsec header support required Simple automatic configuration New protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv6
Chapter 22 IPv6 (Based on material from Markus Hidell, KTH)
CS 457 – Lecture 16 Global Internet - BGP Spring 2012.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
IPv6 Network Security.
2: Comparing IPv4 and IPv6 Rick Graziani Cabrillo College
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Subnetting.
CS 6401 IPv6 Outline Background Structure Deployment.
CMPT 471 Networking II IP © Janice Regan, 2012.
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public BSCI Module 8 Lessons 1 and 2 1 BSCI Module 8 Lessons 1 and 2 Introducing IPv6 and Defining.
Introducing IPv6 ipv6 d ucing IPv6. Introducing IPv6 The ability to scale networks for future demands requires a limitless supply of IP addresses and.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Chapter 22 Next Generation IP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. IP version 6 Asst. Prof. Chaiporn Jaikaeo,
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 20 Network Layer: Internet Protocol
 The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet protocol suite. It is chiefly used by networked computers'
© Cengage Learning 2014 How IP Addresses Get Assigned A MAC address is embedded on a network adapter at a factory IP addresses are assigned manually or.
ICMPv6 Error Message Types Informational Message Types.
CSE5803 Advanced Internet Protocols and Applications (13) Introduction Existing IP (v4) was developed in late 1970’s, when computer memory was about.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
CSCI 465 D ata Communications and Networks Lecture 25 Martin van Bommel CSCI 465 Data Communications & Networks 1.
K. Salah1 Security Protocols in the Internet IPSec.
+ Lecture#4 IPV6 Addressing Asma AlOsaimi. + Topics IPv4 Issues IPv6 Address Representation IPv6 Types.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
1 Kyung Hee University Chapter 19 Network Layer: Logical Addressing.
IPv4 IPv4 The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. Datagram Fragmentation Checksum Options Topics.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv6 Internet Protocol, Version 6 Yen-Cheng Chen NCNU
Internet Protocol Version 6 Specifications
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
The New Internet Protocol
The New Internet Protocol
Lecture#5 IPV6 Addressing
Guide to TCP/IP Fourth Edition
Chapter 15. Internet Protocol
Presentation transcript:

© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer NAT, IPv6

© Janice Regan, Private networks  Recall that several blocks of addresses are reserved for local addresses  /8 ( )  /12 ( )  /16 ( )  These addresses can be utilized by using network address translation (NAT)

© Janice Regan, IPv4 local addresses  A local network may use local addresses taken from the blocks on the previous slide  These addresses are non-routable addresses and may be used on within the local network  These addresses are not considered valid addresses on the Internet  These addresses are valid only within the local network  To communicate with the internet one or more routable addresses are needed  Network address translation must occur on the router connecting the local network to the internet

© Janice Regan, Types of NAT implementation  Static NAT  Dynamic NAT  Overloaded NAT (NAPT network address port translation)

© Janice Regan, Static NAT NAT router internet Private network

© Janice Regan, Static NAT  Some machines on the internal network need internet access ( , )  There are several globally valid internet addresses available to the router connected to the local network ( , )  Each of the hosts that need internet access are permanently allocated one of the available globally valid internet addresses  ↔  ↔  All other hosts have no connectivity to the internet

© Janice Regan, Packet transmission through a static NAT (1)  When sends a packet to it is received by the NAT router  The sending host is unaware of the NAT.  The NAT replaces the local source address with the corresponding globally valid address , recalculates the TCP or UDP checksum if necessary (if packet is TCP or UDP) then forwards the packet toward the destination.

© Janice Regan, Packet transmission through a static NAT (2)  The destination host sees the NAT’s replacement address, , as the IP of the source and sends its reply to that IP address  The NAT receives the reply  Removes the destination address (its own address) from the packet  Replaces the destination address with the corresponding internal address,  For UDP or TCP packets recalculates the checksum  Forwards the packet to the internal source

© Janice Regan, Dynamic NAT  Establishes a 1-1 relationship between non- routable internal addresses and the globally valid IP addresses assigned to the NAT.  The non routable address bound to each globally valid address may change over time as communications are initiated and completed

© Janice Regan, Dynamic NAT operation  Similar to Static NAT except  Pool of available globally valid IP addresses  Each time an internal host begins communication with the internet the first packet destined for the internet will reach the NAT enabled router The NAT enabled router will take the next available globally valid IP address from the pool and assign it to the internal host When communications is complete address will be replaced into the pool

© Janice Regan, NAPT (network address port translation)  NAT overloading or NAPT  Again, the local network uses locally valid non-routable IP addresses (not globally valid)  In this configuration the NAT allows more than one local host to use the same globally valid internet address  The NAT has one or more globally valid IP addresses  Communications with different hosts are differentiated by using different port numbers (transport layer)  This is not a use of port numbers that is consistent with the layered design of the protocol stack, port numbers are not part of the network layer addresses, ports are designed for end to end communications not to be changed at each intermediate station  Using ports in this way also causes other problems

© Janice Regan, Overloaded NAT NAT router internet : Private network

© Janice Regan, Overloaded NAT Example Source Computer Source PortNAT IP NAT port

© Janice Regan, NATP example (1)  A host on the local network, say , sends a packet to an external host, through port 555  The NAT enabled router receives the packet from the local host  The NAT enabled router stores the source IP and port number in its address translation table  The NAT enabled router replaces the IP and port number in the packet with those it stores in the address translation table for this connection (for this example and 1201)  The NAT enabled router recalculates the UDP or TCP checksum (for UDP and TCP packets) before forwarding the packet to the destination

© Janice Regan, NATP example (2)  When the destination receives the packet it will appear to have come from the NAT ( ).  Any responses will be sent to , and thus be received by the NAT router  The NAT router will check the destination port in the response packet  By referring to the address translation table the NAT router will find the local non-routable address and port that corresponds.  The NAT router will replace the destination port and IP address with the local non-routable address and the corresponding port, recalculate the checksums as needed, and forward the packet to the original source host

© Janice Regan, Problems with NAPT  Although NAPT is the most commonly used form of NAT it causes some serious difficulties  The most common encryption and authentication mechanisms used in the IP layer do not function when NAPT is used. It requires yet more serious violations of design principles to patch these problems (only some can be patched)  Servers that require connection to a particular port can only be run on one machine (the one that is using that port in the NAPT mapping).  P2P applications require servers run on each peer, therefore P2P applications will break unless extraordinary measures are taken. (connection reversal: connect to a machine outside local net directly, P2P connection goes through that machine, breaks security)

© Janice Regan, Change IP, other solutions?  Address space exhaustion (temporary solution CIDR)  Two level addressing (network and host) results in many unused addresses. Addresses committed even if not used or potentially used for growth of network.  Growth of networks and the Internet  Extended use of TCP/IP  Lack of security and authentication  Temporary solution: IPsec retrofit to IPv4  Requirements for new types of service  temporary solution: differential services replaces TOS  Not able to guarantee real-time transmission of services like video or audio

© Janice Regan, Improvements in IPv6 (1)  Expanded address space: 128 bit addresses  Improved option mechanism: Additional separate optional headers between IPv6 header and transport layer header. Fixed length (40 byte) primary header  Most additional headers are not examined by intermediate routers, improving processing speed at intermediate routers and simplifying router processing.  It is easier to add options by adding more intermediate headers  Address autoconfiguration: Allows dynamic assignment of addresses

© Janice Regan, IPv6 Improvements (2)  Increased addressing flexibility:  Anycast - delivered to one of a set of nodes  Improved scalability of multicast addresses  Support for resource allocation:  Labeling of packets to particular traffic flow  Allows special handling (e.g. Support real time streams for applications such as video )  Replaces type of service  New version of ICMP ICMPv6 (RFC 2463)  Functionality of ICMPv4 and ARP (RFC 2461) in neighbor discovery, and IGMP (RFC ) in the multicast listener discoverer, all combined in one protocol

© Janice Regan, IPv6 packet Structure IPv6header Fragmentheader Hop by Hop header Destination options header Routingheader Authenticationheader DATA EncapsulatingSecurityheader DestinationOptionsheader Transportheader

© Janice Regan, IP v6 Header Figure 33.2 Comer (2000)

© Janice Regan, IP v6 Header Fields (1)  Version (4 bits): 6  Traffic Class (8 bits): Experimental: indicates class or priority of packet. Still undefined, provides way for application to experiment with class  Flow Label (20 bits): Experimental: Indicates that packet belongs to a specific sequence of packets that can be reference by flow number. Used by hosts requesting special handling of such a sequence of packets. Multiple sequences can flow between the same hosts, each packet in a sequence must have identical Hop by Hop and routing headers and IPv6 addresses.

© Janice Regan, IP v6 Header Fields (2)  Payload length (16 bits): Includes all extension headers plus user data.  Next Header (8 bits): Indicates the type of the first extension header or in the absence of extension headers the protocol for the next layer up (same as for IPv4).  Hop Limit (16 bits): maximum number of allowed hops (0-255). When number is exceeded ICMPv6 Time Exceeded message is sent  Source Address (128 bits)  Destination address (128 bits)

© Janice Regan, IPv6 Addresses (1)  128 bits long represented as a hexadecimal number separated by colons.  Divided into 8 16 bit blocks each represented by 4 hexadecimal digits. 1080:0000:0000:0000:0008:08A0:200C:417A  Leading zeros can be omitted, but one zero remains if all 4 hexadecimal digits are zero. 1080:0:0:0:8:8A0:200C:417A  One string of single colon separated zeros can be abbreviated to a :: (Not more than one) 1080::0008:08A0:200C:417A  Uses prefixes: same as CIDR like notation e.g. 21DA:D3:0:2F3B::/64 to denote the network prefix (network address of length 64 is 21DA:D3:0:2F3B)

© Janice Regan, IPv6 Addressing  Three types of address  Unicast to a single interface  Multicast to a set of interfaces Delivered to all interfaces identified Interfaces may be on different network segments Broadcast is treated as a special case of multicast  Anycast Set of interfaces (typically different nodes) Delivered to any one of set (nearest) interface Allocated from aggregable global unicast addresses

© Janice Regan, IPv6 Fragmentation  Fragmentation only allowed at source  No fragmentation at intermediate routers  Node must perform path discovery to find smallest maximum transmission unit (MTU) of intermediate networks or use minimum MTU size of 1280 octets  Source fragments to match MTU  Fragmentation algorithm is the same as IPv6  Reduces load at intermediate hosts/routers

© Janice Regan, Transition IPv4 to IPv6 (1)  During transitions IPv6 hosts will retain a IPv4 protocol stack to use for communication with iPv4 networks. (dual stack approach) YA B C D E  Host A and Host D are both IPv6 enabled but are communicating using IPv4. Want them to use more efficient IPv6 IPv6IPv4 IPv6 IPv4

© Janice Regan, Transition IPv4 to IPv6  When IPv6 hosts communicate through an IPv4 network the IPv6 packets should be encapsulated in IPv4 packets an sent through a tunnel IPv6IPv4 IPv6 IPv4 Tunnel IPv6 packet inside IPv4 packet IPv4 headerIPv6 headerIPv6 data IPv4 data