Академический Документы
Профессиональный Документы
Культура Документы
Specific Purpose Application-application interworking Host-host communication Packet delivery across an internet Frame delivery across a network
Device-device connection TCP/IP standards dominate at the internet and transport layers transmission across an internet
Physical (1)
Client PC
Transport Layer end-to-end (host-to-host) TCP is connection-oriented, reliable UDP is connectionless and unreliable Internet Layer (usually IP) hop-by-hop (host-router or router-router) connectionless, unreliable
Server
Router 1
Router 2
Router 3
Frames and Packets In an internet with hosts separated by N networks, there will be:
2 hosts One packet (going all the way between hosts)
One route (between the two hosts), though this route may differ between connections.
N frames (one in each network) N-1 routers (change frames between each pair of networks)
IP
Int
Int
TCP/IP Standards
User Applications 5 Application HTTP 4 Transport 3 Internet 2 Data Link 1 Physical IP SMTP TCP Supervisory Applications DNS
Many Others
ICMP
MPLS
ARP
None: Use OSI Standards None: Use OSI Standards Internetworking is done at the internet and transport layers. There are only a few standards at these layers. We will look at the shaded protocols in this chapter.
Protocol Layer
Connection- Reliable / Oriented/ Unreliable CNLS Connection- Reliable oriented CNLS CNLS Unreliable Unreliable
TCP UDP IP
IP Addresses
128.171.17.13
The Internet UH Netw ork (128.171) Host 13 CBA Subnet (17)
Hierarchical Addressing
Hierarchical Addressing Brings Simplicity
Phone System Country code-area code-exchange-subscriber number 01-808-555-9889 Long-distance switches near the top of the hierarchy only have to deal with country codes and area codes to set up circuits
Similarly, core Internet routers only have to consider network or network and subnet parts of packets
Poor efficiency: metric is merely the number of router hops to the destination host No way to select cheapest route, etc.
Weak security Useful only in small firms
The only IETF dynamic routing protocol that makes sense for all but the smallest networks
Internal Router
RIP, OSPF, and EIGRP Interior Dynamic Routing Protocols Border Router Autonomous System Autonomous System Border Router
Packet
ARP Cache: Know n IP addressEthernet Address Pairs
Frame
Originating Router 1. Broadcast ARP Request Message: "IP Host 110.19.8.17, w hat is your 48-bit MAC address?" Router B 110.19.8. does not reply
Packet
ARP Cache: Know n IP addressEthernet Address Pairs
Frame
Originating Router
1. Broadcast ARP Request Message: Host "IPThe Situation: Host 110.19.8.17, 110.19.8.47 w hat is your to pass the packet The router wishes 48-bit MAC address?" to the respond to does not destination host or to a next-hop router. Request. Router B ARP The router knows the destination IP address of the target. 110.19.8. Thedoes notmust learn the targets MAC layer address router reply
in order to be able to send the packet to the target in a frame. Host The router uses the Address Resolution Protocol (ARP) 110.19.8.17
2. ARP Response Message: "My MAC address is A7-23-DA-95-7C-99". replies.
Can use multiple label numbers to give to traffic between sites for multiple levels of priority or quality of service guarantees MPLS supports traffic engineering: balancing traffic on an internet
Multiprotocol Label Switching (MPLS) Figure 8-13: Multiprotocol Label Switching (MPLS)
Label-Sw itching Router 1 Label-Sw itching Router 2
Legend Packet Label LabelSw itching Router 3 Label-Sw itching Router 4 Label-Sw itching Router 5
MPLS reduces forw arding costs and permits traffic engineering, including quality of service and traffic load balancing
Router
ICMP is the supervisory protocol at the internet layer. ICMP messages are encapsulated in the data fields of IP packets
Router
When an error occurs, the device noting the error may try to respond with an ICMP error message describing the problem. ICMP error messages often are not sent for security reasons because attackers can use them to learn about a network
To see if another host is active, a host can send the target host an ICMP echo request message (called a ping).
Host If the Unreachable it will send back an host is active, Router Error Message echo response message confirming that it is active. Echo Request (Ping) Echo Response ICMP IP Message Header
Bit 0
Bit 31
Version Header Diff-Serv (4 bits) Length (8 bits) Value (4 bits) is 4 (0100) Identification (16 bits) Unique value in each original IP packet Time to Live (8 bits)
Flags Fragment Offset (13 bits) (3 bits) Octets from start of original IP fragments data field Protocol (8 bits) Header Checksum 1=ICMP, 6=TCP, (16 bits) 17=UDP
Bit 0
IP Version 4 Packet
Bit 31
Version Header Diff-Serv Total Length (4 bits) Length (8 bits) (16 bits) Value (4 bits) Length in octets is 4 (0100) Identification (16 bits) Flags Fragment Offset (13 bits) IPv4each original is the dominant (3 bits) of IP today. version Unique value in Octets from start of The version number in its header is 4 (0100).fragments IP packet original IP data field The header length and total length field tell the size of the packet. Time to Live Protocol (8 bits) Header Checksum (8 bits) The Diff-Serv1=ICMP, 6=TCP, for quality of(16 bits) labeling. field can be used service 17=UDP (But MPLS is being used instead by most carriers)
Bit 0
Bit 31
Version Header Diff-Serv (4 bits) Length (8 bits) Value (4 bits) is 4 (0100) Identification (16 bits) Unique value in each original IP packet
Flags Fragment Offset (13 bits) (3 bits) Octets from start of original IP fragments data field Time to Live Protocol (8 bits) Header Checksum The (8 bits) second row is used for reassembling fragmented 1=ICMP, 6=TCP, (16 bits) IP packets, but fragmentation is quite rare, 17=UDP so we will not look at these fields.
Bit 0
IP Version 4 Packet
Bit 31
Data Field The source and destination IP addresses Are 32 bits long, as you would suspect. Options can be added, but these are rare.
an almost unlimited number of IP addresses. Growing fastest in Asia, which was Payload Length Next Header Hop Limit short-changed in IPv4 address allocations (16 bits) (8 bits) Name (8 bits) of next header Source IP Address (128 bits)
Sequence Number (32 bits) Acknowledgment Number (32 bits) Header Length (4 bits) Reserved Flag Fields The source and destination portWindow Size numbers (6 bits) specify a(6 bits) particular application on the (16 bits) source and destination multitasking computers (Discussed later) TCP Checksum (16 bits) Urgent Pointer (16 bits) Sequence numbers are 32 bits long. Flag fields are one-bit fields. They include SYN, ACK, FIN, So are acknowledgment numbers. and RST.
Flags are one-bit fields. Bit 0 TCP Segment Bit 31 If a flags value is 1, it is set. If a (16 bits) Source Port Numberflags value is 0, it is not Port Number (16 bits) Destination set. TCP has six flags Sequence Number (32 bits) If the TCP Checksum fields value is correct, The receiving process sends back an acknowledgment. Acknowledgment Number (32 bits) Header Length (4 bits) Reserved Flag Fields (6 bits) (6 bits) Window Size (16 bits)
Bit 0
For flow control (to tell Segment party to slow down), TCP the other Bit 31 The sender places a small value in the Window Size field. Source Port Number (16 bits) Destination Port Number (16 bits) If the Window Size is small, the receiver will have to stop transmitting Sequence Number (32 bits) after a few more segments (unless it gets a new acknowledgment extending the number of segments it may send.) Acknowledgment Number (32 bits) Header Length (4 bits) Reserved Flag Fields (6 bits) (6 bits) Window Size (16 bits)
Padding
Data Field
TCP segment headers can end with options. This is very common.
Data Field
UDP messages (datagrams) are very simple. Like TCP, UDP has 16-bit port numbers. The UDP length field allows variable-length application messages. If the UDP checksum is correct, there is no acknowledgment. If the UDP checksum is incorrect, the UDP datagram is dropped.
SYN SYN/ACK
ACK
A SYN segment is a segment in which the SYN bit is set. One side sends a SYN segment requesting an opening. The other side sends a SYN/acknowledgment segment. Originating side acknowledges the SYN/ACK.
FIN ACK
A FIN segment is a segment in which the FIN bit is set. Like both sides saying good bye to end a conversation.
An RST segment is a segment in which the RST bit is set. A single RST segment breaks a connection. Like hanging up during a phone call. There is no acknowledgment.
Layer 3 Switches
L3 L3
Layer 3 Sw itch
Layer 3 sw itches are routers. Layer 3 sw itches are faster and cheaper to buy than traditional routers. How ever, they are usually limited in functionality.
They also are expensive to manage. They are typically used betw een
Usually too expensive to replace workgroup switches. Usually too limited in functionality to replace border routers. Replaces core switches in the middle.
Web Services
Web Services Similar to the old client server architecture of early LAN systems, but services are now provided by internet or web based resources. SOA (Service Oriented Architecture) is used to enable platform and development language independence.
Web Services
Example: RSS
Figure 8-14: Domain Name System (DNS) Hierarchy 8-14: Domain Name Sy stem (DNS) Hierarchy Figure
(root)
A domain is a group of resources .au .nl .com .uk under the control of.ie organization. an
Second-Level The domain name system is a Domain general cnn.com haw aii.edu Names microsoft.com system for managing names.
Figure 8-14: Domain Name System (DNS) Hierarchy 8-14: Domain Name Sy stem (DNS) Hierarchy Figure
(root)
.com
.au
.ie
.nl
.uk
Second-Level The highest level is called the root. Domain haw aii.edu Names microsoft.com 13 DNS Root Servers. There are cnn.com
ntl.cba.haw aii.edu
Figure 8-14: Domain Name System (DNS) Hierarchy 8-14: Domain Name Sy stem (DNS) Hierarchy Figure
(root)
.com
.au
.ie
.nl
.uk
cba.haw aii.edu
Subnet Name
Top-level domains are generic TLDs (.com, .net., .org, etc.) or country TLDs (.ca, .uk, .ie, etc.)
cnn.com
ntl.cba.haw aii.edu
Figure 8-14: Domain Name System (DNS) Hierarchy 8-14: Domain Name Sy stem (DNS) Hierarchy Figure
(root)
.com
.au
Organizations seek good secondlevel domain names .nl .ie .uk cnn.com microsoft.com hawaii.edu etc. Get them from address registrars
cnn.com
cba.haw aii.edu
Subnet Name
ntl.cba.haw aii.edu
Figure 8-14: Domain Name System (DNS) Hierarchy 8-14: Domain Name Sy stem (DNS) Hierarchy Figure
(root)
.com
.au
.ie
.nl
.uk
Second-Level Host names are the bottom Domain the DNS haw aii.edu Names microsoft.com ofcnn.com hierarchy.
cba.haw aii.edu
Subnet Name
ntl.cba.haw aii.edu