Network Layer4-1 Data Communication and Networks Lecture 9 Networks: Part 1 November 4, 2004.
Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and...
-
Upload
laurence-rose -
Category
Documents
-
view
217 -
download
0
Transcript of Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and...
![Page 1: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/1.jpg)
Network Layer 4-1
Chapter 4Network Layer
These ppt slides are originally from theKurose and Ross’s book. But some slides aredeleted and added for my own purpose, and some of them are modified.
![Page 2: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/2.jpg)
Network Layer 4-2
Chapter 4: Network Layer
4. 1 Introduction 4.2 Virtual circuit
and datagram networks
4.3 What’s inside a router
4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6
4.5 Routing algorithms Link state Distance Vector Hierarchical routing
4.6 Routing in the Internet RIP OSPF BGP
4.7 Broadcast and multicast routing
![Page 3: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/3.jpg)
Network Layer 4-3
Key Network-Layer Functions
routing: determine route taken by packets from source to dest.
Routing algorithms
![Page 4: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/4.jpg)
Network Layer 4-4
Chapter 4: Network Layer
4. 1 Introduction 4.2 Virtual circuit
and datagram networks
4.3 What’s inside a router
4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6
4.5 Routing algorithms Link state Distance Vector Hierarchical routing
4.6 Routing in the Internet RIP OSPF BGP
4.7 Broadcast and multicast routing
![Page 5: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/5.jpg)
Network Layer 4-5
Two packet switching technologies Virtual circuit
Path is determined before data is transferred.• Connection-oriented
All packets pass through the same path(circuit). Need signaling. X.25, Frame Relay, ATM Analogy: telephone network(circuit switching)
Datagram There is no determined path, but path is determined
per packet.• Connectionless
IP Analogy: telegram
![Page 6: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/6.jpg)
Network Layer 4-6
Routing in IP datagram
How can routers determine the path of packets to destinations? Routers use the packet’s destination
address to forward the packet. Each router has a forwarding table that
maps destination addresses to link interfaces at which the packet will be delivered to the next-hop router on the path to the destination.
![Page 7: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/7.jpg)
Network Layer 4-7
Routing Table Mask Destination address next-hop address flags
U(UP)- Router is operating now G(gateway)- destination is in other network H(host-specific) D(added by redirection) M(modified by redirection)
reference count: # of users to use this path use: # of packets to pass through this router interface
![Page 8: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/8.jpg)
Network Layer 4-8
Router Operation
Receive an IP packet
1. For each entry in the routing tableApply the mask to packet destination addressIf (the result matches the value in the destination field)
If (the G flag is absent)Use packet destination address as next hop address
Send packet to fragmentation module with next hop addressReturn
2. If no match is found, send an ICMP error message
3. Return
![Page 9: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/9.jpg)
Network Layer 4-9
193.14.5.160 193.14.5.192
R1
111.0.0.0R2
R3 R4
192.16.7.0 194.17.21.0R5
m1m3
m0
default router
193.14.5.165 193.14.5.197
111.25.19.20
111.15.17.32 111.20.18.14
182.16.7.5 194.17.21.14
192.16.7.52 194.17.21.68
111.30.31.18
194.17.21.16
![Page 10: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/10.jpg)
Network Layer 4-10
Mask destination Next hop F ref. U I
255.0.0.0 111.0.0.0 - U 0 0 m0
255.255.255.224 193.14.5.160 - U 0 0 m2
255.255.255.224 193.14.5.192 - U 0 0 m1
……… ……….. ……… ….. … …. …
255.255.255.255 194.17.21.16 111.20.18.14 UGH 0 0 m0
255.255.255.0 192.16.7.0 111.15.17.12 UG 0 0 m0
255.255.255.0 194.17.21.0 111.20.18.14 UG 0 0 m0
0.0.0.0 0.0.0.0 111.30.31.18 UG 0 0 m0
Routing Table of R1
![Page 11: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/11.jpg)
Network Layer 4-11
Chapter 4: Network Layer
4. 1 Introduction 4.2 Virtual circuit
and datagram networks
4.3 What’s inside a router
4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6
4.5 Routing algorithms Link state Distance Vector Hierarchical routing
4.6 Routing in the Internet RIP OSPF BGP
4.7 Broadcast and multicast routing
![Page 12: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/12.jpg)
Network Layer 4-12
The Internet Network layer
forwardingtable
Host, router network layer functions:
Routing protocols•path selection•RIP, OSPF, BGP
IP protocol•addressing conventions•datagram format•packet handling conventions
ICMP protocol•error reporting•router “signaling”
Transport layer: TCP, UDP
Link layer
physical layer
Networklayer
![Page 13: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/13.jpg)
Network Layer 4-13
Chapter 4: Network Layer
4. 1 Introduction 4.2 Virtual circuit
and datagram networks
4.3 What’s inside a router
4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6
4.5 Routing algorithms Link state Distance Vector Hierarchical routing
4.6 Routing in the Internet RIP OSPF BGP
4.7 Broadcast and multicast routing
![Page 14: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/14.jpg)
Network Layer 4-14
IP datagram format
ver length
32 bits
data (variable length,typically a TCP
or UDP segment)
16-bit identifier
Internet checksum
time tolive
32 bit source IP address
IP protocol versionnumber
header length (bytes)
max numberremaining hops
(decremented at each router)
forfragmentation/reassembly
total datagramlength (bytes)
upper layer protocolto deliver payload to
head.len
type ofservice
“type” of data flgsfragment
offsetupper layer
32 bit destination IP address
Options (if any) E.g. timestamp,record routetaken, specifylist of routers to visit.
how much overhead with TCP?
20 bytes of TCP 20 bytes of IP = 40 bytes +
app layer overhead
![Page 15: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/15.jpg)
Network Layer 4-15
Header Fields(1)
version(4 bits) The current IP is version 4.
head length (4 bits) fixed part(20 bytes) + option (in 32-bit words) Ex, fixed part = 5 (160 bits)
Type of services(TOS) or Differentiated services(DS) Defines the class of datagram for quality of service.
total length (8 bits) Header + data (unit: bytes) Data 의 Size = TOTAL LENGTH - HLEN
• Maximum size of IP Datagram is 65,535 bytes long.
![Page 16: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/16.jpg)
Network Layer 4-16
Header Fields(2)
Identification (16 bits) It identifies the datagram from a source. Normally it is incremented by 1 every
datagram. Flags (3 bits)
Two flag bits are defined:• “more fragmentation” 비트• “don’t fragment” 비트
Fragmentation offset (13 bits)
![Page 17: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/17.jpg)
Network Layer 4-17
MTU and Fragmentation
Maximum Transmission Unit(MTU) Each physical network has its own maximum length of data
unit(PDU) it can process.• Ex, Ethernet: 1518 bytes, ATM: 53 bytes
Thus the size of the IP datagram should not be larger than MTU of the physical network it is passing through.
Fragmentation If the datagram size is larger than MTU of the physical network, the
datagram must be fragmented.
Net 1(MTU=1000)
Net 2(MTU=400)
1000 bytes 1000 bytes
![Page 18: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/18.jpg)
Network Layer 4-18
DATA 1 DATA 2 DATA 3
400 Octet400 Octet 400 Octet400 Octet 200 Octet200 Octet
DATA 1
DATA 2
DATA 3
Original datagram (1000 octets)
Fragment offset = 0, More Fragment Bit = 1
Fragment offset = 400/8=50, More Fragment Bit = 1
Fragment offset = 800/8=100, More Fragment Bit = 0
Fragmentation
0 399
400 799
800 999
![Page 19: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/19.jpg)
Network Layer 4-19
Header Fields(3)
Time-to-live (8 bits) It is used to control the max. # of hops(routers)
visited by the datagram. Normally it starts with 32 or 64. Each router that
processes the datagram decrements this number by 1.
If the value reaches 0, the router discards this datagram. And the router sends the ICMP message to the source host.
Protocol (8 bits) It defines the higher layer protocol that uses the
services of the IP layer.
![Page 20: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/20.jpg)
Network Layer 4-20
Protocol Values
1 2
6 17
89
![Page 21: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/21.jpg)
Network Layer 4-21
Checksum It is used for the error detection for the IP header.
So the checksum covers only the header. If the checksum is incorrect, the receiver discards
this datagram. Sender
packet is divided into k sections, each of n bits(16 bits) all sections are added together using 1’s complement the final result is complemented to make the checksum
Receiver packet is divided into k sections, each of n bits all sections are added together using 1’s complement the result is complemented If the final result is 0, then no error
![Page 22: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/22.jpg)
Network Layer 4-22
n bits
n bits
all 0s
n bits
n bits
n bits
Section 1
Section 2
checksum
Section n
Sum
checksum
….….
complement
sender
n bits
n bits
n bits
n bits
n bits
All 0s?
Section 1
Section 2
checksum
Section n
Sum
checksum
….….
complement
receiver
n bits
checksum
packet
![Page 23: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/23.jpg)
Network Layer 4-23
Example
![Page 24: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/24.jpg)
Network Layer 4-24
Option
Options(variable) It is used for testing and debugging. The following fields are defined.
• Record route• loose source routing• strict source routing• timestamp
![Page 25: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/25.jpg)
Network Layer 4-25
Chapter 4: Network Layer
4. 1 Introduction 4.2 Virtual circuit
and datagram networks
4.3 What’s inside a router
4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6
4.5 Routing algorithms Link state Distance Vector Hierarchical routing
4.6 Routing in the Internet RIP OSPF BGP
4.7 Broadcast and multicast routing
![Page 26: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/26.jpg)
Network Layer 4-26
Addressing
Internet architecture Classful addressing Subnetting Private addresses and NAT Classless addressing
![Page 27: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/27.jpg)
Network Layer 4-27
Internet Architecture
The internet consists of many heterogeneous networks. A network of networks
The Internet is a special internet which connects all networks based on the TCP/IP protocol.
In Internet, internetworking devices called routers(or gateways) provide interconnections among all networks.
![Page 28: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/28.jpg)
Network Layer 4-28
Net 1 Net 2 Net 3R1 R2
Internet
real structure
router physicalnet
host
Internet as a universal network
host
user’s view
Virtual, uniform one network
![Page 29: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/29.jpg)
Network Layer 4-29
IP address
IP addresses denote the connection(interface) to the Internet. cf> telephone address, ethernet address
IP addresses are unique. Each address defines only on connection to
the Internet. IP addresses are global(universal).
Any host connected to the Internet must use the same IP addressing scheme.
![Page 30: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/30.jpg)
Network Layer 4-30
IP address
An IP address is a 32 bits long. It consists of two parts: net-id and host-
id.
Net id Host id
32 bits
Denote a specificphysical networkIn the Internet
Denote a connection in a specificphysical network
![Page 31: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/31.jpg)
Network Layer 4-31
Dotted decimal notation
![Page 32: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/32.jpg)
Network Layer 4-32
Types of IP addresses
![Page 33: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/33.jpg)
Network Layer 4-33
Range of Each Class
![Page 34: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/34.jpg)
Network Layer 4-34
Net-id and host-id of each class
![Page 35: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/35.jpg)
Network Layer 4-35
Network Address
![Page 36: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/36.jpg)
Network Layer 4-36
Sample Network
![Page 37: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/37.jpg)
Network Layer 4-37
Special IP addresses
0’s mean “this”, 1’s mean “all”
Limited broadcast( local net)2
all 0s
all 0s
all 1s
all 1snet
host
127 anything (often 1)
This host1
Host on this net1
Directed broadcast for net2
Loopback3
Notes:1 Allowed only at system startup(bootstrap) and is never a valid destination address.2 Never a valid source address.3 Should never appear on a network. Used in testing.
![Page 38: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/38.jpg)
Network Layer 4-38
Subnetting
IP address is designed with two levels of hierarchy: netid and hostid.
Sometimes the block of a network address assigned to an organization need to be divided for efficient routing, so that an organization has several subnetworks(subnets).
Subnetting provides a mean to have three levels of hierarchy.
![Page 39: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/39.jpg)
Network Layer 4-39
H1
128.10.1.1
H2
128.10.1.2
Network 128.10.1.0
H3
128.10.2.1
H4
128.10.2.2
Network 128.10.2.0
REST OF THEINTERNET
all traffic to128.10.X.X
R
All packets with 128.10.x.x arecoming to this organization from outside.
![Page 40: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/40.jpg)
Network Layer 4-40
Address with subnet-id
![Page 41: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/41.jpg)
Network Layer 4-41
Subnet Mask
The subnet mask specifies how many bits in the host-id are assigned for subnet-id.
![Page 42: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/42.jpg)
Network Layer 4-42
Subnet Example
Network ID Subnet ID Host ID
16 8 8
11111111 11111111 11111111 00000000
Network ID Subnet ID Host ID
16 10 6
11111111 11111111 11111111 11 000000
0xffffff00 = 255.255.255.0
0xffffffc0 = 255.255.255.192
![Page 43: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/43.jpg)
Network Layer 4-43
Private Address
The private addresses are not recognized in the global Internet.
IP private addresses can only be used in local networks.
The blocks of IP private addresses 10.0.0.0 ~ 10.255.255.255 172.16.0.0 ~ 172.31.255.255 192.168.0.0 ~ 192.168.255.255
The local sites with private addresses can be connected to the global Internet through NAT.
![Page 44: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/44.jpg)
Network Layer 4-44
NAT: Network Address Translation
Motivation: local network uses just one IP address as far as outside word is concerned: no need to be allocated range of addresses from
ISP: - just one IP address is used for all devices can change addresses of devices in local network
without notifying outside world can change ISP without changing addresses of
devices in local network devices inside local net not explicitly
addressable, visible by outside world (a security plus).
![Page 45: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/45.jpg)
Network Layer 4-45
Network Address Translation(NAT)
![Page 46: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/46.jpg)
Network Layer 4-46
![Page 47: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/47.jpg)
Network Layer 4-47
Translation Table
How does a NAT router know the destination address for a packet coming from the outside? For many-to-many relation between the private address
network and global Internet servers, we need the following translation table.
Private Address
Private Port
ExternalAddress
External Port
TransportProtocol
172.18.3.1 1400 25.8.3.2 80 TCP
172.18.3.2 1401 25.8.3.2 80 TCP
... ... ... ... ...
![Page 48: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/48.jpg)
Network Layer 4-48
Classless Interdomain Routing(CIDR)
Classful address IP addresses have three classes depending on the
leftmost bit(s). So the length of the net-id has fixed depending on
the classes. Classless address
IP addresses has no classes. The length of net-id is variable.
The length of net-id is specified for each IP address. CIDR uses classless address.
![Page 49: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/49.jpg)
Network Layer 4-49
IP addressing: CIDR
CIDR: Classless InterDomain Routing subnet portion of address of arbitrary length address format: a.b.c.d/x, where x is # bits in
subnet portion of address
11001000 00010111 00010000 00000000
subnetpart
hostpart
200.23.16.0/23
![Page 50: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/50.jpg)
Network Layer 4-50
CIDR notation
In CIDR, an IP address is expressed as: Network address/length
Ex) 234.170.168.0/21–(234.170.168.0, 234.170.175.255) block Dotted decimal 32-bit binary equivalentlowest 234.170.168.0 11101010 10101010 10101000 00000000highest 234.170.175.255 11101010 10101010 10101111 11111111CIDR mask 11111111 11111111 11111000 00000000
![Page 51: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/51.jpg)
Network Layer 4-51
Ex) 198.32.0.0/16 (198.32.0.0, 198.32.255.255) block
lowest 198.32.0.0 11000110 00100000 00000000 00000000Highest 198.32.255.255 11000110 00100000 11111111 11111111
![Page 52: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/52.jpg)
Network Layer 4-52
An ISP has the address block of 206.0.64.0/18 (64/24s).If a customer requests 800 IP addresses, then the ISP can assign the address block of 206.0.68.0/22 (4 contiguous/24s) to the customer.
What is the advantage of using CIDR comparing with the case of assigningone class B address or 4 class C addresses?
ISP’s block 11001110.00000000.01000000.00000000 206.0.64.0/18
client’s block 11001110.00000000.01000100.00000000 206.0.68.0/22
Class C(0) 11001110.00000000.01000100.00000000 206.0.68.0/24Class C(1) 11001110.00000000.01000101.00000000 206.0.69.0/24Class C(2) 11001110.00000000.01000110.00000000 206.0.70.0/24Class C(3) 11001110.00000000.01000111.00000000 206.0.71.0/24
Example Example
![Page 53: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/53.jpg)
Network Layer 4-53
IP addresses: how to get one?
Q: How does host get IP address?
hard-coded by system admin in a file Wintel: control-panel->network->configuration->tcp/ip-
>properties UNIX: /etc/rc.config
DHCP: Dynamic Host Configuration Protocol: dynamically get address from as server “plug-and-play”
(more in next chapter)
![Page 54: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/54.jpg)
Network Layer 4-54
IP addresses: how to get one?
Q: How does network get subnet part of IP addr?
A: gets allocated portion of its provider ISP’s address space
ISP's block 11001000 00010111 00010000 00000000 200.23.16.0/20
Organization 0 11001000 00010111 00010000 00000000 200.23.16.0/23 Organization 1 11001000 00010111 00010010 00000000 200.23.18.0/23 Organization 2 11001000 00010111 00010100 00000000 200.23.20.0/23 ... ….. …. ….
Organization 7 11001000 00010111 00011110 00000000 200.23.30.0/23
![Page 55: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/55.jpg)
Network Layer 4-55
IP addressing: the last word...
Q: How does an ISP get block of addresses?
A: ICANN: Internet Corporation for Assigned
Names and Numbers allocates addresses manages DNS assigns domain names, resolves disputes
![Page 56: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/56.jpg)
Network Layer 4-56
Chapter 4: Network Layer
4. 1 Introduction 4.2 Virtual circuit
and datagram networks
4.3 What’s inside a router
4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6
4.5 Routing algorithms Link state Distance Vector Hierarchical routing
4.6 Routing in the Internet RIP OSPF BGP
4.7 Broadcast and multicast routing
![Page 57: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/57.jpg)
Network Layer 4-57
ICMP: Internet Control Message Protocol
used by hosts & routers to communicate network-level information error reporting:
unreachable host, network, port, protocol
echo request/reply (used by ping)
network-layer “above” IP: ICMP msgs carried in IP
datagrams ICMP message: type, code
plus first 8 bytes of IP datagram causing error
Type Code description0 0 echo reply (ping)3 0 dest. network unreachable3 1 dest host unreachable3 2 dest protocol unreachable3 3 dest port unreachable3 6 dest network unknown3 7 dest host unknown4 0 source quench (congestion control - not used)8 0 echo request (ping)9 0 route advertisement10 0 router discovery11 0 TTL expired12 0 bad IP header
![Page 58: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/58.jpg)
Network Layer 4-58
Error Reporting messages(1)
![Page 59: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/59.jpg)
Network Layer 4-59
Error Reporting messages(2)
Destination Unreachable When a router or host can’t route a
datagram, it discards the datagram and sends a destination unreachable message to the source.
Source quench When a router or host discards datagrams
due to congestion, It sends a source quench message to the source.
![Page 60: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/60.jpg)
Network Layer 4-60
Error Reporting messages(3)
Time exceeded When TTL value is 0, a router discards the datagram
and send a Time exceeded message the original source host.
When all fragmented datagrams of one datagram do not arrive at the destination within a certain time limit, this message is generated.
Parameter problem When any ambiguous or missing values in the
header of the datagram are detected,
![Page 61: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/61.jpg)
Network Layer 4-61
Error Reporting messages(4)
Redirection The host may send a datagram which is
destined for a wrong router because of its old routing table. In this case the router will forward this datagram to the correct router and at the same time it sends a redirection message back to the host.
![Page 62: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/62.jpg)
Network Layer 4-62
Query Messages(1)
![Page 63: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/63.jpg)
Network Layer 4-63
Query Messages(2)
Error Request and Reply Used for diagnostic purpose
Time stamp Request and Reply When routers or hosts determine the round-
trip time needed for a datagram to travel between them
Address Mask Request and Reply When a host want to know the subnet mask
of the network it belongs to
![Page 64: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/64.jpg)
Network Layer 4-64
Query Messages(3)
Router Solicitation and Advertisement When a host want to know a default router,
it broadcasts a router solicitation message. A router can send a router advertisement
message periodically even if no host has solicited.
![Page 65: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/65.jpg)
Network Layer 4-65
ICMP message encapsulation
![Page 66: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/66.jpg)
Network Layer 4-66
Example of ICMP Use
Ping Traceroute MTU discovery
![Page 67: Network Layer4-1 Chapter 4 Network Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added for my.](https://reader031.fdocuments.us/reader031/viewer/2022020319/56649f385503460f94c550e3/html5/thumbnails/67.jpg)
Network Layer 4-67
Traceroute and ICMP
Source sends series of UDP segments to dest First has TTL =1 Second has TTL=2, etc. Unlikely port number
When nth datagram arrives to nth router: Router discards
datagram And sends to source an
ICMP message (type 11, code 0)
Message includes name of router& IP address
When ICMP message arrives, source calculates RTT
Traceroute does this 3 times
Stopping criterion UDP segment eventually
arrives at destination host
Destination returns ICMP “host unreachable” packet (type 3, code 3)
When source gets this ICMP, stops.