Professional Documents
Culture Documents
Internetworking
What is internetwork
An arbitrary collection of networks interconnected to provide
some sort of host-to-host packet delivery service
to exchange information.
Modem
Device that enables computers to communicate
through phone lines.
When we start internet the our modem
communicates to modem of ISP.
Continued
Computer
In addition to a modem, you need a client capable
of handling multiple data types.
Software
Two types of softwares required to enable your
PC as an Internet PC.
Communication software to establish
connection
Client software for browsing, e-mail, news.
these softwares are provided with windows itself.
Applications Of Internet
Download programs and files
E-Mail
Voice and Video Conferencing
E-Commerce
File Sharing
Information browsing
Search the web addresses for access through search
engine
Chatting and many more
Disadvantages of
Internet
Theft of personal information such as name, address, credit card
number etc.
Virus threats nothing but a program which disrupts the normal
functioning of your system.
Spamming refers to receiving unwanted e-mails in bulk, which
provide no purpose and needlessly obstruct the entire system .
Pornography This is perhaps the biggest threat related to
childrens healthy mental life. A very serious issue concerning the
Internet.
Internal
It can be imposed by Public Key Security &
Encryption Key.
External
Through Firewall.
What is Firewall ?
Security device located between firms internal
network (intranet) & external network (internet).
Corporate membe
Intrane
t
Extranet Clients, partners, cu
Interne Global society: comp
t
Internetworking with TCP/IP
What is IP
IP stands for Internet Protocol
Key tool used today to build scalable, heterogeneous
internetworks
It runs on all the nodes in a collection of networks and defines
the infrastructure that allows these nodes and networks to
function as a single logical internetwork
Two parts
Global Addressing Scheme
Provides a way to identify all hosts in the network
Datagram (Connectionless) model for data
delivery
Best-effort delivery (unreliable service)
packets are lost
packets are delivered out of order
duplicate copies of a packet are delivered
packets can be delayed for a long time
Packet Format
Version (4 bits):
currently 4 or 6.
Also called IPv4 and IPv6
Hlen (4 bits):
number of 32-bit words in
header
usually 5 32-bit words with no
options
TOS (8 bits):
type of service (not widely used)
Length (16 bits):
number of bytes in this datagram
including the header
Ident (16 bits) and
Flags/Offset (16 bits):
used by fragmentation
Packet Format
TTL (8 bits):
number of hops/routers this
packet can travel
discard the looping packets
Originally based on time, but
changed to a hop-count based
Each router decrements it by 1
Discard the packet when it
becomes 0
Default is 64
Problems
Setting it too high the packet will loop
a lot
Setting it too low the packet will not
reach the destination
Packet Format
Protocol (8 bits):
demux key (TCP=6, UDP=17)
Checksum (16 bits):
of the header only
DestAddr & SrcAddr (32 bits)
The key for datagram delivery
Every packet contains a full
destination address
Forwarding/routing decisions are
made at each router
The source address is for the
destination to know the sender
and if it wants to reply to it
IP Fragmentation and Reassembly
Properties
globally unique
hierarchical: network + host
4 Billion IP address, half are A type, is B type, and 1/8 is C type
Format
Dot notation
10.3.2.4
128.96.33.81
192.12.69.77
IP Datagram Forwarding
Strategy
every datagram contains destination's address
if directly connected to destination network, then forward to
host
if not directly connected to destination network, then forward
to some router
forwarding table maps network number into next hop
each host has a default router
each router maintains a forwarding table
Example (router R2)
IP Datagram Forwarding
Algorithm
if (NetworkNum of destination = NetworkNum of one of my interfaces)
then
deliver packet to destination over that interface
else
if (NetworkNum of destination is in my forwarding table) then
deliver packet to NextHop router
else
deliver packet to default router
For a host with only one interface and only a default router in its forwarding table, this
simplifies to
S
m
IP Address Classes
t
h
1
e
S
m
IP Address Classes (Cont.)
t
h
2
e
S
m
IP Address Classes (Cont.)
t
h
3
e
S
m Are You the Host or the
t
h
Network?
The 32 bits of the IP address are divided into
Network & Host portions, with the octets
assigned as a part of one or the other.
Network & Host Representation
By IP Address Class
Class Octet1 Octet2 Octet3 Octet4
4
e
S
m Are You the Host or the
t
h
Network? (Cont.)
Each Network is assigned a network
address & every device or interface
(such as a router port) on the network is
assigned a host address.
There are only 2 specific rules that
govern the value of the address.
P
3
e
5
e
S
m Are You the Host or the
t
h
Network? (Cont.)
A host address cannot be designated
by all zeros or all ones.
These are special addresses that are
reserved for special purposes.
P
3
e
6
e
S
m
Class A Addresses
t
h
7
e
S
m
Class A Addresses (Cont.)
t
h
8
e
S
m
Class A Addresses (Cont.)
t
h
9
e
S
m
Class A Addresses (Cont.)
t
h
0
e
S
m
Class B IP Addresses
t
h
1
e
S
m
Class B IP Addresses (Cont.)
t
h
2
e
S
m
Class C IP Addresses
t
h
3
e
S
m
Class C IP Addresses (Cont.)
t
h
P
4
e
4
e
S
m
Special Addresses
t
h
5
e
S
m
Special Addresses (Cont.)
t
h
P
4
e
6
e
S
m
Special Addresses (Cont.)
t
h
7
e
S
m
Special Addresses (Cont.)
t
h
9
e
S
m
Subnet Mask
t
h
0
e
S
m
Subnet Mask (Cont.)
t
h
1
e
S
m
Subnet Mask (Cont.)
t
h
2
e
S
m
Subnet Mask (Cont.)
t
h
3
e
S
m
Subnet Mask (Cont.)
t
h
4
e
S
m
Boolean Algebra
t
h
5
e
S
m
Boolean Algebra (Cont.)
t
h
6
e
Default Standard Subnet
S
m
t
h
Masks
There are default standard subnet
masks for Class A, B and C addresses:
P
5
e
7
e
S
m
A Trial Separation
t
h
8
e
S
m
A Trial Separation (Cont.)
t
h
9
e
S
m
A Trial Separation (Cont.)
t
h
0
e
S
m
A Trial Separation (Cont.)
t
h
1
e
S
m
A Trial Separation (Cont.)
t
h
2
e
S
m
Routing IP Addresses
t
h
3
e
S
m
Routing IP Addresses (Cont.)
t
h
4
e
S
m
Configuring an IP Address
t
h
5
e
S
Configuring an IP Address
m
t
(Cont.)
h
6
e
S
m
Verifying an IP Address
t
h
7
e
S
m
Verifying with Telnet
t
h
8
e
S
m
Verifying with Telnet (Cont.)
t
h
9
e
S
m
Verifying with PING
t
h
1
e
S
m
Introduction
t
h
2
e
S
m
Introduction (Cont.)
t
h
3
e
S
m
Introduction (Cont.)
t
h
4
e
S
m
Introduction (Cont.)
t
h
5
e
S
m
Subnetting Networks ID
t
h
6
e
S
m
Subnetting Networks ID (Cont.)
t
h
7
e
Subnetting, Subnet & Subnet
S
m
t
h
Mask
Subnetting, a subnet & a subnet mask
are all different.
In fact, the 1st creates the 2nd & is
identified by the 3rd.
Subnetting is the process of dividing a
network & its IP addresses into
segments, each of which is called a
subnetwork or subnet.
P
7
e
8
e
Subnetting, Subnet & Subnet
S
m
t
h
Mask (Cont.)
The subnet mask is the 32-bit number
that the router uses to cover up the
network address to show which bits are
being used to identify the subnet.
P
7
e
9
e
S
m
Subnetting
t
h
0
e
S
m
Subnetting (Cont.)
t
h
1
e
S
m
Subnetting (Cont.)
t
h
2
e
S
m
Subnetting (Cont.)
t
h
3
e
S
m
Subnetting (Cont.)
t
h
4
e
Borrowing Bits to Grow a
S
m
t
h
Subnet
The key concept in subnetting is borrowing
bits from the host portion of the network to
create a subnetwork.
Rules govern this borrowing, ensuring that
some bits are left for a Host ID.
The rules require that two bits remain
available to use for the Host ID& that all of the
subnet bits cannot be all 1s or 0s at the same
time.
P
8
e
5
e
Borrowing Bits to Grow a
S
m
t
h
Subnet (Cont.)
For each IP address class, only a
certain number of bits can be borrowed
from the host portion for use in the
subnet mask.
P
8
e
6
e
Borrowing Bits to Grow a
S
m
t
h
Subnet (Cont.)
Bits Available for Creating Subnets
A 24 22
B 16 14
C 8 6
P
8
e
7
e
S
m
Subnetting a Class A Network
t
h
8
e
S
Subnetting a Class A Network
m
t
(Cont.)
h
9
e
S
Subnetting a Class A Network
m
t
(Cont.)
h
0
e
S
m
Class A Subnet Masks (Cont.)
t
h
1
e
S
m
Class A Subnet Masks (Cont.)
t
h
2
e
S
m
Class A Subnet Masks (Cont.)
t
h
3
e
S
m
Class A Subnet Masks (Cont.)
t
h
4
e
S
m
Subnetting Class B & Class C
t
h
5
e
S
Subnetting Class B & Class C
m
t
(Cont.)
h
6
e
S
Subnetting Class B & Class C
m
t
(Cont.)
h
7
e
Knowing How to Calculate
S
m
t
h
Subnets
To determine the number of subnets &
hosts per subnet available for any of the
available subnet masks, 2 simple
formulas to calculate these numbers:
P
9
e
8
e
S
m
Class C Subnets
t
h
9
e
S
m
Class C Subnets (Cont.)
t
h
0
e
0
S
m
Class B Subnets
t
h
0
e
1
S
m
Class B Subnets (Cont.)
t
h
P
1
e
0
e
2
S
m
A Short Broadcast
t
h
0
e
3
S
m
A Short Broadcast (Cont.)
t
h
0
e
4
S
m
A Short Broadcast (Cont.)
t
h
3
Private Addresses
H1 H2 H3 H4
10.0.1.1 10.0.1.1
Private network 1 Private Private network 1
Internet
R1 128.195.4.119 128.143.71.21 R2
21 3.168.112.3
4
Network Address Translation
(NAT)
NAT is a router function where IP addresses
possibly port numbers) of IP datagrams are replaced at
(and
the boundary of a private network
5
Basic operation of NAT
Private Internet
network
H1 H5
Source = 213.168.112.3 Source = 213.168.112.3
Destination = 10.0.1.2 Destination = 128.143.71.21
Private Public
Address Address
10.0.1.2 128.143.71.21
7
Pooling of IP addresses
Private Internet
networ
k
Source = 10.0.1.2 Source = 128.143.71.21
Destination = 213.168.112.3 Destination = 213.168.112.3
H1 H5
Private Public
Address Address
10.0.1.2
7
Supporting migration between network service
providers
NAT solution:
Assign private addresses to the hosts of the corporate network
NAT device has static address translation entries which bind the
private address of a host to the public address.
Migration to a new network service provider merely requires
an update of the NAT device. The migration is not noticeable to
the hosts on the network.
Note:
The difference to the use of NAT with IP address pooling is that
the mapping of public and private IP addresses is static.
9
Supporting migration between network service
providers
Source = 128.143.71.21
ISP 1
Destination = 213.168.112.3
allocates address
Source = 10.0.1.2 block
Destination = 213.168.112.3 128.143.71.0/24 to
128.143.71.21
privat network:
private address: 10.0.1.2
NAT
public address: 128.143.71.21
devic
128.195.4.120
e
H1 128.195.4.120
ISP 2
Private allocates address
network block
Source = 128.195.4.120
Destination = 213.168.112.3 128.195.4.0/24 to
private network:
Private Public
Address Address
10.0.1.2
128.195.4.120
10
IP masquerading
Also called: Network address and port
translation
(NAPT), port address translation (PAT).
Scenario: Single public IP address is mapped to
multiple
hosts in a private network.
NAT solution:
Assign private addresses to the hosts of the corporate
network
NAT device modifies the port numbers for outgoing traffic
11
IP masquerading
Private Public
Address Address
10.0.1.2/2001 128.143.71.21/2100
10.0.1.3/3020 128.143.71.21/4444
12
Load balancing of servers
Scenario: Balance the load on a set of identical
servers, which are accessible from a single IP address
NAT solution:
Here, the servers are assigned private addresses
NAT device acts as a proxy for requests to the server from the
public network
The NAT device changes the destination IP address of
arriving packets to one of the private addresses for a server
A sensible strategy for balancing the load of the servers is to
assign the addresses of the servers in a round-robin fashion.
13
Load balancing of servers
Private network
Sou
rc
Des e
tina = 12
tion
10.0.1.2 = 10 8.195. Source = 128.195.4.120
.0 . 1 4 .12
.2 0 Destination = 128.143.71.21
S1
NAT Source = 213.168.12.3
device Destination = 128.143.71.21
Internet
128.143.71.21
10.0.1.3
S2 20
4.1
5.
28.19
= 1 .0.1.4
10.0.1.4 = 10
rce
Sou inatio n
t
Des Inside network Outside network
Private Public Public
Address Address Address
S3
10.0.1.2 128.143.71.21 128.195.4.120
10.0.1.4 128.143.71.21 213.168.12.3
14
Concerns about NAT
Performance:
Modifying the IP header by changing the IP address requires
that NAT boxes recalculate the IP header checksum
Modifying port number and IP address requires that NAT
boxes recalculate TCP and UDP checksum (pseudo header)
Fragmentation
Care must be taken that a datagram that is fragmented
before it reaches the NAT device, is not assigned a different IP
address or different port numbers for each of the fragments.
15
Concerns about NAT
End-to-end connectivity:
NAT destroys universal end-to-end reachability of hosts on
the Internet.
A host in the public Internet often cannot initiate
communication to a host in a private network.
The problem is worse, when two hosts that are in a private
network need to communicate with each other.
16
Overview of DHCP
DHCP Dynamic Host Control
Protocol
Dynamic Assignment of IP
addresses
Dynamic assignment of IP addresses is desirable
for
several reasons:
IP addresses are assigned on-demand
Avoid manual IP configuration
Support mobility of laptops
19
20
1 DHCPDISCOVER
2 DHCPOFFER
3 DHCPREQUEST
4 DHCPDECLINE
5 DHCPACK
6 DHCPNAK
7 DHCPRELEASE
8 DHCPINFORM
Message Types
DHCPDISCOVER: Broadcast by a client to find available DHCP
servers."
21
Contd.
DHCPACK: Acknowledgement from server to client with parameters, including
IP address."
22
Client Server Interactions
The client broadcasts a DHCPDISCOVER message on its local
physical subnet. "
The DHCPDISCOVER message may include some options
such as network address suggestion or lease duration."
23
DHCP Interaction (simplified)
Argon
00:a0:24:71:e4:44 DHCP Server
DHCP Request
00:a0:24:71:e4:44
Sent to 255.255.255.255
Argon
128.143.13
7.144 DHCP
00:a0:24:71 DHCP Response: Server
:e4:44 IP address: 128.143.137.144
Default gateway: 128.143.137.1 IE ru
..
Netmask: 255.255.0.0
24
Contd.
T\If the client receives one or more DHCPOFFER messages
from one or more servers. "
The client chooses one based on the configuration
parameters offered and broadcasts a DHCPREQUEST
message that includes the server identifier option to indicate
which message it has selected and the requested IP
address option, taken from your IP address in the selected
offer."
In the event that no offers are received, if the client has
knowledge of a previous network address, the client may
reuse that address if its lease is still valid, until the lease
expires.
25
DHCP Operation
DHCP Client
00:a0:24:71:e4: DHCP Server
44
DHCPDISCOVER
DCHP DISCOVER Sent to 255.255.255.255
DHCP Server
DHCP Client
00:a0:24:71:e4: DHCPOFFER DHCP Server
44
DHCPOFFER
DCHP OFFER
.
.
DHCP Server
26
Contd.
The servers receive the DHCPREQUEST broadcast from the client.
" Those servers not selected by the DHCPREQUEST message use
the message as notification that the client has declined that
server's offer. "
The server selected in the DHCPREQUEST message commits
the binding for the client to persistent storage and responds with a
DHCPACK message containing the configuration parameters for
the requesting client.
27
DHCP Operation
DHCP Client
00:a0:24:71:e4: DHCP Server
44
DHCPREQUEST
expires
28
Contd.
The combination of client hardware and assigned
network address constitute a unique identifier for the
client's lease and are used by both the client and server
to identify a lease referred to in any DHCP messages. "
The your IP address field in the DHCPACK messages is
filled in with the selected network address.
29
Contd.
The client receives the DHCPACK message with configuration
parameters. "
The client performs a final check on the parameters, for
example with ARP for allocated network address, and notes
the duration of the lease and the lease identification cookie
specified in the DHCPACK message. At this point, the client
is configured."
If the client detects a problem with the parameters in the
DHCPACK message (the address is already in use on the
network, for example), the client sends a DHCPDECLINE
message to the server and restarts the configuration
process.
30
Contd.
The client should wait a minimum of ten seconds before
restarting the configuration process to avoid excessive network
traffic in case of looping."
31
Contd.
The client may choose to relinquish its lease on a
network address by sending a DHCPRELEASE message
to the server."
32
DHCP Operation
DHCP Client
00:a0:24:71:e4: DHCP Server
44
DHCPRELEASE
DCHP RELEASE
33
Lease Renewal
When a server sends the DHCPACK to a client with IP
address and configuration parameters, it also registers the
start of the
lease time for that address.
This lease time is passed to the client as one of the options
in
the DHCPACK message, together with two timer values, T1 and
T2.
The client is rightfully entitled to use the given address for
the
duration of the lease time.
34
Contd.
On applying the receive configuration, the client also starts
the
timers T1 and T2. At this time, the client is in the BOUND state.
Times T1 and T2 are options configurable by the server but
T1
must be less than T2, and T2 must be less than the lease time.
According to RFC 2132, T1 defaults to (0.5 * lease time)
andT2 defaults to (0.875 * lease time).
35
Contd.
When timer T1 expires, the client will send a DHCPREQUEST
(unicast) to the server that offered the address, asking to extend the
lease for the given configuration. The client is now in the RENEWING
state"
The server also resets its record of the lease time. "
Under normal circumstances, an active client would continually renew
its lease in this way indefinitely, without the lease ever expiring.
36
Contd.
If no DHCPACK is received until timer T2 expires, the
client enters the REBINDING state."
Client now broadcasts a DHCPREQUEST message to
extend its lease. "
37
Contd.
If the client does not receive a DHCPACK message after
its lease has expired, it has to stop using its current TCP/
IP configuration. "
The client may then return to the INIT state, issuing a
DHCPDISCOVER broadcast to try and obtain any valid
address."
38
DHCP Pros
It relieves the network administrator of a great deal of manual
configuration work. "
39
DHCP Cons
Uses UDP, an unreliable and insecure
protocol.
DNS cannot be used for DHCP configured
hosts.
40
Overview of DNS
DNS Domain Name Service
41
Outline
What is DNS?
42
What DNS?
is
DNS is a host name to IP address translation
service
DNS is
a distributed database implemented in a
hierarchy of name servers
an application level for messag exchang
protocol
betwee clients and servers e e
n
43
Wh DNS?
y
It is easier to remember a host name than
it is to remember an IP address.
A name has more meaning to a user than a
4 byte number.
destination.
The user generally enters a host name.
45
Distributed, Hierarchical
Database
Root DNS Servers
Autonomica, Stockholm
13 root name
server operators
USC-ISI Marina del Rey, CA
ICANN Los Angeles, CA worldwide
49
TLD and Authoritativ Servers
e
Top-level domain (TLD) servers:
responsible for com, org, net, edu, etc, and all
top-level country domains uk, fr, ca, jp.
Network Solutions maintains servers for com
TLD
Educause for edu TLD
51
Thank you!