52
Data and Computer Communications Ninth Edition by William Stallings Chapter 18 – Internet Protocols Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education - Prentice Hall, 2011

Data and Computer Communications

  • Upload
    charis

  • View
    26

  • Download
    0

Embed Size (px)

DESCRIPTION

Data and Computer Communications. Chapter 18 – Internet Protocols. Ninth Edition by William Stallings. Internet Protocols. - PowerPoint PPT Presentation

Citation preview

Page 1: Data and Computer Communications

Data and Computer Communications

Ninth Editionby William Stallings

Chapter 18 – Internet Protocols

Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson

Education - Prentice Hall, 2011

Page 2: Data and Computer Communications

Internet Protocols

She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham Court Road must be that point, an interchange from the black line to the red. This train would take her there, was bearing her there rapidly now, and at the station she would follow the signs, for signs there must be, to the Central Line going westward.

—King Solomon's Carpet. Barbara Vine (Ruth Rendell)

 

Page 3: Data and Computer Communications

Internet Internet

an interconnected set of networks where each of the constituent networks retains its identity

end systems devices attached to a networkintermediate systems provide a communications path and perform

the necessary relaying and routing functions• bridges

acts as a relay of frames between similar networks • routers

routes packets between potentially different networks

Page 4: Data and Computer Communications

Internetworking Terms

Page 5: Data and Computer Communications

TCP/IP Concepts

Page 6: Data and Computer Communications

Differences in Networks addressing schemes maximum packet size network access mechanisms timeouts error recovery status reporting routing techniques user access control connection, connectionless

Page 7: Data and Computer Communications

Connectionless Operation Internetworking involves connectionless

operation at the level of the Internet Protocol (IP)

Page 8: Data and Computer Communications

Connectionless Internetworking Connectionless internet facility is flexible IP provides a connectionless service

between end systems. Advantages:

• is flexible• can be made robust• does not impose unnecessary overhead

Page 9: Data and Computer Communications

IP Operation

Page 10: Data and Computer Communications

IP Design Issues routing datagram lifetime fragmentation and reassembly error control flow control

Page 11: Data and Computer Communications

The Internet as a Network

Page 12: Data and Computer Communications

Routing

Page 13: Data and Computer Communications

Datagram Lifetime

datagrams could loop indefinitely consumes resources transport protocol may need upper bound on

lifetime of a datagram• can mark datagram with lifetime • when lifetime expires, datagram discarded

Page 14: Data and Computer Communications

Fragmentation and Re-assembly

protocol exchanges data between two entities lower-level protocols may need to break data up into

smaller blocks, called fragmentation reasons for fragmentation:

network only accepts blocks of a certain size more efficient error control & smaller retransmission units fairer access to shared facilities smaller buffers

disadvantages: smaller buffers more interrupts & processing time

Page 15: Data and Computer Communications

Fragmentation and Re-assembly

Page 16: Data and Computer Communications

IP Fragmentation IP re-assembles at destination only uses fields in header

Data Unit Identifier (ID)• identifies end system originated datagram

Data length• length of user data in octets

Offset• position of fragment of user data in original datagram• in multiples of 64 bits (8 octets)

• indicates that this is not the last fragment

More flag

Page 17: Data and Computer Communications

Fragmentation Example

Page 18: Data and Computer Communications

Error and Flow Control Error control

discarded datagram identification is needed

reasons for discarded datagrams include:• lifetime expiration• congestion• FCS error

Flow control allows routers to limit

the rate they receive data

send flow control packets requesting reduced data flow

Page 19: Data and Computer Communications

Internet Protocol (IP) v4

defined in RFC 791 part of TCP/IP suite two parts

Page 20: Data and Computer Communications

IP Services Primitives

specifies functions to be performed

form of primitive implementation dependent

Send - request transmission of data unit

Deliver - notify user of arrival of data unit

Parameters used to pass data and

control information

Page 21: Data and Computer Communications

IP Parameters source & destination addresses protocol type of Service identification don’t fragment indicator time to live data length option data user data

Page 22: Data and Computer Communications

IP Options

Page 23: Data and Computer Communications

IPv4 Header

Page 24: Data and Computer Communications

IPv4 Address Formats

Page 25: Data and Computer Communications

IP Addresses - Class A

start with binary 0 all 0 reserved 01111111 (127) reserved for loopback range 1.x.x.x to 126.x.x.x

Page 26: Data and Computer Communications

IP Addresses - Class B

start with binary 10 range 128.x.x.x to 191.x.x.x second octet also included in network

address 214 = 16,384 class B addresses

Page 27: Data and Computer Communications

IP Addresses - Class C

start with binary 110 range 192.x.x.x to 223.x.x.x second and third octet also part of network

address 221 = 2,097,152 addresses nearly all allocated

see IPv6

Page 28: Data and Computer Communications

Subnets and Subnet Masks allows arbitrary complexity of internetworked

LANs within organization insulate overall internet from growth of network

numbers and routing complexity site looks to rest of internet like single network each LAN assigned subnet number host portion of address partitioned into subnet

number and host number local routers route within subnetted network subnet mask indicates which bits are subnet

number and which are host number

Page 29: Data and Computer Communications

IP Addresses and Subnet Masks

Page 30: Data and Computer Communications

Internet Control Message Protocol (ICMP)

RFC 792 transfer messages from routers and hosts

to hosts provides feedback about problems

• datagram cannot reach its destination• router does not have buffer capacity to forward• router can send traffic on a shorter route

encapsulated in IP datagram hence not reliable

Page 31: Data and Computer Communications

ICMP Message Format

Page 32: Data and Computer Communications

Common ICMP Messages destination unreachable time exceeded parameter problem source quench redirect echo & echo reply timestamp & timestamp reply address mask request & reply

Page 33: Data and Computer Communications

Address Resolution Protocol (ARP)

Page 34: Data and Computer Communications

IP Versions IP v 1-3 defined and replaced IP v4 - current version IP v5 - streams protocol IP v6 - replacement for IP v4

during development it was called IPng (IP Next Generation)

Page 35: Data and Computer Communications

Why Change IP?

Page 36: Data and Computer Communications

IPv6 RFCs

RFC 1752 - Recommendations for the IP Next Generation Protocol

requirements PDU formats addressing, routing security issues

RFC 2460 - overall specification RFC 4291 - addressing structure

Page 37: Data and Computer Communications

IPv6 Enhancements expanded 128 bit address space improved option mechanism

most not examined by intermediate routes dynamic address assignment increased addressing flexibility

anycast & multicast support for resource allocation

labeled packet flows

Page 38: Data and Computer Communications

IPv6PDU

(Packet) Structure

Page 39: Data and Computer Communications

IP v6 Header

Page 40: Data and Computer Communications

IP v6 Flow Label

related sequence of packets special handling identified by source and destination address +

flow label router treats flow as sharing attributes may treat flows differently alternative to including all information in every

header have requirements on flow label processing

Page 41: Data and Computer Communications

IPv6 Addresses 128 bits long assigned to interface single interface may have multiple unicast

addresses

Page 42: Data and Computer Communications

Hop-by-Hop Options must be examined by every router

if unknown discard/forward handling is specified next header header extension length options

Pad1 PadN Jumbo payload Router alert

Page 43: Data and Computer Communications

Fragmentation Header

fragmentation only allowed at source no fragmentation at intermediate routers node must perform path discovery to find

smallest MTU of intermediate networks set source fragments to match MTU otherwise limit to 1280 octets

Page 44: Data and Computer Communications

Routing Header contains a list of one or more intermediate nodes

to be visited on the way to a packet’s destination

Page 45: Data and Computer Communications

Destination Options Header

Page 46: Data and Computer Communications

IPv6 Extension Headers

Page 47: Data and Computer Communications

Virtual Private Network (VPN) set of computers interconnected using an

unsecure network• e.g. linking corporate LANs over Internet

using encryption & special protocols to provide security

• eavesdropping• entry point for unauthorized users

proprietary solutions are problematical• development of IPSec standard

Page 48: Data and Computer Communications

IPSec RFC 1636 (1994) identified security need encryption and authentication necessary

security features in IPv6 designed also for use with current IPv4 applications needing security include:

branch office connectivity remote access over Internet extranet and intranet connectivity for partners electronic commerce security

Page 49: Data and Computer Communications

IPSec Functions

Page 50: Data and Computer Communications

IP Security Scenario

Page 51: Data and Computer Communications

Benefits of IPsec provides strong security for external traffic resistant to bypass below transport layer hence transparent to

applications can be transparent to end users can provide security for individual users if

needed

Page 52: Data and Computer Communications

Summary

internetworking principles Internet protocol operation

design issues, connectionless operation IP

services, addresses, subnets, ICMP, ARP IPv6

structure, header, addresses VPNs and IP Security

IPsec applications, benefits, functions