Presentation is loading. Please wait.

Presentation is loading. Please wait.

TCP/IP & INTERNET Unit 2 Department Of Computer Science & Engineeing.

Similar presentations


Presentation on theme: "TCP/IP & INTERNET Unit 2 Department Of Computer Science & Engineeing."— Presentation transcript:

1 TCP/IP & INTERNET Unit 2 Department Of Computer Science & Engineeing

2 Syllabus Internet Addresses: IP address classes subnet mask CIDR,ARP,RARP Internet Protocol Routing IP Datagram’s ICMP and IGMP.

3 Learning Objective Understand IPv4 addresses and classes Identify the class of an IP address Find the network address given an IP address Understand masks and how to use them Understand the different types of delivery and the connection Understand forwarding techniques in classful addressing Understand forwarding techniques in classless addressing

4 Learning Objective Continue… Understand the need for ARP Understand the cases in which ARP is used Understand the components and interactions in an ARP package Understand the need for RARP Understand the format and fields of a datagram Understand the need for fragmentation and the fields involved Understand the options available in an IP datagram Know the types of error reporting messages Know the types of query messages Be able to calculate the ICMP checksum Know how to use the ping and traceroute commands Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group and leaves a group Understand membership monitoring

5 Introduction The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or IP address. An IP address is a 32-bit address that uniquely and universally defines the connection of a host or a router to the Internet. IP addresses are unique. They are unique in the sense that each address defines one, and only one, connection to the Internet. Two devices on the Internet can never have the same address.The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or IP address. An IP address is a 32-bit address that uniquely and universally defines the connection of a host or a router to the Internet. IP addresses are unique. They are unique in the sense that each address defines one, and only one, connection to the Internet. Two devices on the Internet can never have the same address.

6 An IP address is a 32-bit address. The IP addresses are unique. The address space of IPv4 is 2 32 or 4,294,967,296.

7 Dotted Decimal Figure : Dotted-decimal notation

8 CLASSFUL ADDRESSING IP addresses, when started a few decades ago, used the concept of classes. This architecture is called classful addressing. In the mid-1990s, a new architecture, called classless addressing, was introduced and will eventually supersede the original architecture. However, part of the Internet is still using classful addressing, but the migration is very fast.IP addresses, when started a few decades ago, used the concept of classes. This architecture is called classful addressing. In the mid-1990s, a new architecture, called classless addressing, was introduced and will eventually supersede the original architecture. However, part of the Internet is still using classful addressing, but the migration is very fast.

9 Topics in Classful Addressing Recognizing ClassesRecognizing Classes Netid and HostidNetid and Hostid Classes and BlocksClasses and Blocks Network AddressesNetwork Addresses Sufficient InformationSufficient Information MaskMask CIDR NotationCIDR Notation Address DepletionAddress Depletion

10 Occupation of the address space

11 Addresses per class

12 Finding the class in binary notation

13 Finding the address class

14 Finding the class in decimal notation

15 Netid and hostid

16 Note Millions of class A addresses are wasted. Many class B addresses are wasted. The number of addresses in class C is smaller than the needs of most organizations. Class D addresses are used for multicasting; there is only one block in this class. Class E addresses are reserved for future purposes; most of the block is wasted.

17 Blocks in Class A

18 Blocks in class B

19 Blocks in class C

20 Note: In classful addressing, the network address (the first address in the block) is the one that is assigned to the organization. The range of addresses can automatically be inferred from the network address.

21 Masking Concept

22 Figure : AND operation

23 Default Mask

24 The network address is the beginning address of each block. It can be found by applying the default mask to any of the addresses in the block (including itself). It retains the netid of the block and sets the hostid to zero. Note that we must not apply the default mask of one class to an address belonging to another class.

25 Special IP Address

26 Figure : Default mask and subnet mask

27 CIDR In CIDR notation, the block granted is defined by the first address and the prefix length.

28 Table :Prefix lengths

29 Delivery The network layer supervises delivery, the handling of the packets by the underlying physical networks. Two important concepts are the type of connection and direct versus indirect delivery.The network layer supervises delivery, the handling of the packets by the underlying physical networks. Two important concepts are the type of connection and direct versus indirect delivery.

30 Figure : Direct delivery

31 Figure : Indirect delivery

32 Forwarding Forwarding means to place the packet in its route to its destination. Forwarding requires a host or a router to have a routing table..Forwarding means to place the packet in its route to its destination. Forwarding requires a host or a router to have a routing table..

33 Next-hop method

34 Figure :Network-specific method

35 Figure : Host-specific routing

36 Figure : Default routing

37 Figure : Simplified forwarding module in classful address without subnetting

38 Figure : Simplified forwarding module in classful address with subnetting

39 Note In classful addressing we can have a routing table with three columns; in classless addressing, we need at least four columns.

40 Figure :Simplified forwarding module in classless address

41 Routing Routing deals with the issues of creating and maintaining routing tables.Routing deals with the issues of creating and maintaining routing tables. Figure : Common fields in a routing table

42 ARP & RARP ARP associates an IP address with its physical address. On a typical physical network, such as a LAN, each device on a link is identified by a physical or station address that is usually imprinted on the NIC. ARP & RARP ARP associates an IP address with its physical address. On a typical physical network, such as a LAN, each device on a link is identified by a physical or station address that is usually imprinted on the NIC. Figure : ARP and RARP

43 Figure : ARP operation

44 Figure : ARP packet

45 Figure : Encapsulation of ARP packet

46 Figure : Four cases using ARP

47 RARP RARP finds the logical address for a machine that only knows its physical address.RARP finds the logical address for a machine that only knows its physical address. The RARP request packets are broadcast; the RARP reply packets are unicast.

48 Figure : RARP operation

49 Figure : RARP packet

50 Figure: Encapsulation of RARP packet

51 IP A packet in the IP layer is called a datagram, a variable-length packet consisting of two parts: header and data. The header is 20 to 60 bytes in length and contains information essential to routing and delivery.A packet in the IP layer is called a datagram, a variable-length packet consisting of two parts: header and data. The header is 20 to 60 bytes in length and contains information essential to routing and delivery.

52 Figure : IP datagram

53 The precedence subfield was designed, but never used in version 4. Figure: Service type or differentiated services

54 Table : Types of service

55 Table : Default types of service

56 Table : Values for codepoints The total length field defines the total length of the datagram including the header.

57 Figure : Multiplexing

58 Fragmentation The format and size of a frame depend on the protocol used by the physical network. A datagram may have to be fragmented to fit the protocol regulations.The format and size of a frame depend on the protocol used by the physical network. A datagram may have to be fragmented to fit the protocol regulations.

59 Figure : MTU Figure : Flags field

60 Option The header of the IP datagram is made of two parts: a fixed part and a variable part. The variable part comprises the options that can be a maximum of 40 bytes.The header of the IP datagram is made of two parts: a fixed part and a variable part. The variable part comprises the options that can be a maximum of 40 bytes.

61 Figure : Option format

62 Figure : Categories of options

63 Checksum The error detection method used by most TCP/IP protocols is called the checksum. The checksum protects against the corruption that may occur during the transmission of a packet. It is redundant information added to the packet.The error detection method used by most TCP/IP protocols is called the checksum. The checksum protects against the corruption that may occur during the transmission of a packet. It is redundant information added to the packet.

64 Checksum At Sender Side To create the checksum the sender does the following: ❏ The packet is divided into k sections, each of n bits. ❏ All sections are added together using 1’s complement arithmetic. ❏ The final result is complemented to make the checksum.

65 Figure : Checksum concept

66 ICMP ICMP messages are divided into error- reporting messages and query messages. The error-reporting messages report problems that a router or a host (destination) may encounter. The query messages get specific information from a router or another host.ICMP messages are divided into error- reporting messages and query messages. The error-reporting messages report problems that a router or a host (destination) may encounter. The query messages get specific information from a router or another host.

67 Figure : ICMP messages

68 Table : ICMP messages

69 An ICMP message has an 8-byte header and a variable-size data section. Although the general format of the header is different for each message type, the first 4 bytes are common to all. Figure : General format of ICMP messages

70 IP, as an unreliable protocol, is not concerned with error checking and error control. ICMP was designed, in part, to compensate for this shortcoming. ICMP does not correct errors, it simply reports them ICMP always reports error messages to the original source.

71 ICMP can also diagnose some network problems through the query messages, a group of four different pairs of messages. In this type of ICMP message, a node sends a message that is answered in a specific format by the destination node.

72 Debugging Tools We introduce two tools that use ICMP for debugging: ping and traceroute.We introduce two tools that use ICMP for debugging: ping and traceroute.

73 Figure : The traceroute program operation

74 IGMP IGMP is a protocol that manages group membership. The IGMP protocol gives the multicast routers information about the membership status of hosts (routers) connected to the network..IGMP is a protocol that manages group membership. The IGMP protocol gives the multicast routers information about the membership status of hosts (routers) connected to the network.. IGMP is a group management protocol. It helps a multicast router create and update a list of loyal members related to each router interface.

75 Types of Messages: IGMP has three types of messages: the query, the membership report, and the leave report. There are two types of query messages, general and special.IGMP has three types of messages: the query, the membership report, and the leave report. There are two types of query messages, general and special.

76 Figure : IGMP message types

77 Figure : IGMP message format

78 Table : IGMP type field

79 IGMP Operation A multicast router connected to a network has a list of multicast addresses of the groups with at least one loyal member in that network. For each group, there is one router that has the duty of distributing the multicast packets destined for that group.A multicast router connected to a network has a list of multicast addresses of the groups with at least one loyal member in that network. For each group, there is one router that has the duty of distributing the multicast packets destined for that group.

80 Figure : IGMP operation

81 Figure : Membership report In IGMP, a membership report is sent twice, one after the other.

82 Figure : Leave report

83 Figure : General query message

84 Summary The IP address is of 32 bits and universally unique. The IP address consist of net id and host id Five classes of IP address: A, B. C D & E Delivery, forwarding & routing is studied Structure of router is studied, Physical address identifies a host or router at the physical level ARP request is broadcast &reply is unicast IP is unreliable connectionless protocol responsible for source to destination delivery Fragmentation is the division of datagram into smaller units to accommodate the MTU of data link protocol. Error detection method is called checksum ICMP & IGMP is studied.

85 References TCP/IP Protocol suite, Behrouz A. Forouzan, Third Edition, TMH. Internetworking and TCP/IP: Principles, Protocols and Architectures, Douglas Comer, Pearson Education Computer Network by William Stallings


Download ppt "TCP/IP & INTERNET Unit 2 Department Of Computer Science & Engineeing."

Similar presentations


Ads by Google