1
Internet-working
Internet-working
Chapter-7
Introduction
 As organization grow in size, network also grow and
performance decreases.
 Sometime necessary to break or segment a local area
network into smaller, multiple segments, and some
type of interconnection among segment is required to
access wide range of resources.
 Interconnecting multiple networks or multiple
segments of networks is called internetworking.
 Breaking a large network into smaller networks is
called segmentation.
Why segment or Internetwork?
 To separate / connect one corporate division
with another.
 Improve performance
 To provide a security wall between two
different types of users.
 Communication between different types of
networks.
Connecting Devices/ Network Devices
 Most common features of network devices are
to interconnect networks, boost signals etc.
 Commonly used devices are:
 Repeater
 Hub
 Bridge
 Switch
 Router
5
Hubs
A hub interconnects two or more workstations into a local
area network.
Hub is a place of convergence where data arrives from
one or more directions and is forwarded out in one or more
other directions.
When a workstation transmits to a hub, the hub
immediately resends the data frame to all connecting links.
Physical layer. Hubs are classified as Layer 1 devices per
the OSI model.
Hubs expand one Ethernet connection into many. For
example, a four-port hub connects up to four machines.
Hubs
Hubs
 Hubs can be arranged in a hierarchy (or
multi-tier design), with backbone hub at its
top
8
Types of Hub
There are many types of hubs with various
features/specifications, which provide the type of
functionality you need in building a network.
On the basis of its working methods, the Hubs can
be divided into three types, given as:
Active Hub
Passive Hub
Intelligent Hub
9
Passive Hub
As the name suggests, passive hubs are the ones,
which do not provide any additional feature except for
working just as an interface between the topology.(Just
a connector.)
These types do not help in rectifying/enhancing the
signals they pass on in the network, in other terms, they
do not help in enhancing the performance of the
network/LAN.
It simply receives signal(s) on input port(s) and
broadcasts it (them) on the output port(s) without even
rectifying it (them).
10
Active Hub
As its name suggests, Active Hub is a hub which can
amplify or regenerate the information signal. This type
of bus has an advantage as it also amplifies the
incoming signal as well as forward it to multiple
devices.
active hub takes active participation in data
communication within the network/LAN.
receives the frame from an incoming link, regenerates
it, and sends it to all outgoing links.
Active hubs also help in troubleshooting at a certain
level
11
Intelligent Hubs
They add some more features to that provided by the
active hubs.
 It provides all the features of a passive and an active hub;
it also provides some features, which help in managing the
network resources effectively and efficiently.
They help in improving the performance of the
network/LAN that you are using.
As an active hub helps in finding out where the problem
persists, an intelligent hub itself finds out the problem in
the network, diagnoses it and tries to rectify it without
letting the problem hamper the performance of the
network.
12
Contd. Intelligent Hubs
They provide a feature that helps in determining the
exact cause and exact place of the fault.
 Another feature of the intelligent hub is that they can
decide which packet goes in which output line, this
helps in controlling and minimizing data traffic in the
network, which results in improved performance of the
network/LAN.
They also help in managing the data communication
within the network, it recognizes the slower devices
automatically and helps them to transmit the data with
their own speed, and during this time, the hub manages
the traffic within the network effectively.
Hub Pros & Cons
Disadvantages
 Bandwidth is shared by all hosts i.e. 10Mbs shared by 25 ports/users.
 Hubs repeat everything they receive and can be used to extend the network
 Can create bottlenecks when used with switches.
 Most Hubs are unable to utilise VLANS.
 Hubs have limited port to connect client, so it is not suitable for large
network.
Advantages
 As an active hubs regenerate signals, it increases the distance that
can be spanned by the LAN (up to 100 meters per segment).
 Hubs can also be connected locally to a maximum of two other
hubs, thereby increasing the number of devices that can be
attached to the LAN.
 Active hubs are usually used against attenuation, which is a
decrease in the strength of the signal over distance.
14
Repeaters
Signal gets weakened due to attenuation.
In order to boost the data signal repeaters are needed
to amplify weakened signal.
Repeaters are known as signal boosters are
amplifiers.
Physical layer device
Connects two segment of networks, refines and
regenerate the digital signals on the cable.
 Repeaters require a small amount of time to
regenerate the signal.
 Repeaters do not understand frames, packets, or
headers.
-Understand volts only
Figure A repeater connecting two segments of a LAN
Figure Function of a repeater
Advantages & Disadvantages of
using Repeaters
Advantages
 Repeaters can extend a network’s total distance.
 Repeaters do not seriously impact network performance
 Certain repeaters can connect network using different
physical media.([ex. fiber optic, UTF, coaxial cable] is
possible.
Disadvantages

Can not connect different network architecture
 Do not reduce network traffic.
18
19
Contd.
 A bridge connects networks and forwards frames from one network to another.
 A Bridge is a device that filters data traffic at a network boundary. Bridges
reduce the amount of traffic on a LAN .
 Filter traffic between network segments by examining the destination MAC
address

Based on the destination MAC address, the bridge either forwards or
discards the frame
 It connects on the data-link layer, (layer 2) of the OSI model.
A B
C D
E F
G H
BRIDGE
PORTS
20
Contd. Bridges
To determine the network segment a MAC address
belongs to, bridges use one of:
Transparent Bridging - They build a table of
addresses (bridging table) as they receive packets. If
the address is not in the bridging table, the packet is
forwarded to all segments other than the one it came
from. This type of bridge is used on ethernet
networks.
Source route bridging - The source computer
provides path information inside the packet. This is
used on Token Ring networks.
Figure A bridge connecting two LANs
23
Bridge interconnecting two identical
LANs
24
A bridge interconnecting two dissimilar
LANs
25
Advantages and Disadvantages of
Bridges
 Advantages
 Can extend a network by acting as a repeater
 Can reduce network traffic on a segment by
subdividing network communications
 Increase the available bandwidth to
individual nodes because fewer nodes share
a collision domain
 Reduce collisions
 Some bridges connect networks using
different media types and architectures
26
Advantages and Disadvantages of
Bridges (continued)
 Disadvantages
 Slower than repeaters and hubs

Extra processing by viewing MAC addresses
 Forward broadcast frames indiscriminately,
so they do not filter broadcast traffic
 More expensive than repeaters and hubs
 Broadcast storm
 When two or more stations engage in the
transmission of excessive broadcast traffic
27
Cisco Catalyst 2900 switch
• Switches operate at the Data Link layer (layer 2)
of the OSI model
Usually used to connect individual computers not
LANs like bridge.
Allows more than one device connected to the
switch directly to transmit simultaneously
• Switches resemble bridges and can be considered
as multiport bridges
• By having multiport, can
better use limited
bandwidth and prove more
cost-effective than bridge
Switches
28
Contd. Switches
 Like bridges, support concurrent communication.
 Switch opens a virtual circuit between the source and the
destination.
 Prevents communications between just two computers from
being broadcast to every computer on the network or segment
 It stores MAC addresses in an internal lookup table

Host A can talk to C, while B talks to D
switch
A
B
C
D
Full-Duplex
operation
Isolated
collision
domains
30
Contd.
The difference between hubs and switches is in
how the devices deal with the data that they
receive.
Whereas a hub forwards the data it receives to all
of the ports on the device, a switch forwards it
only to the port that connects to the destination
device.
It does this by learning the MAC address of the
devices attached to it, and then by matching the
destination MAC address in the data it receives. .
31
Advantages and Disadvantages of
Switches
 Advantages
 Switches increase available network bandwidth
 Switches reduce the workload on individual
computers
 Switches increase network performance
 Networks that include switches experience
fewer frame collisions because switches create
collision domains for each connection (a
process called microsegmentation)
 Switches connect directly to workstations
32
Advantages and
Disadvantages of Switches
(continued)
 Disadvantages
 Switches are significantly more expensive
than bridges
 Network connectivity problems can be
difficult to trace through a switch
 Broadcast traffic may be troublesome
33
Routers
Routers are another type of internetworking
device.
 These devices pass data packets between
networks based on network protocol or layer 3
information.
 We represent a router as a black box that accepts
incoming packets from one of the input ports
(interfaces), uses a routing table to find the
departing output port, and sends the packet from
this output port.
34
Routers
Routers have the ability to make intelligent decisions
as to the best path for delivery of data on the network.
The device that connects a LAN to a WAN or a
WAN to a WAN (the INTERNET! – uses IP
addresses).
 Routers generally have 2 connections:
-WAN connection (Connection to ISP)
-LAN connection
Contd. Router
 Data is sent in form of packets between 2 end
devices
 Routers are used to direct packet to its destination
Router as a Computer
 Router components and their functions”
 CPU - Executes operating system instructions

Random access memory (RAM) - Contains the
running copy of configuration file. Stores
routing table. RAM contents lost when power
is off

Read-only memory (ROM) - Holds diagnostic
software used when router is powered up.
Stores the router’s bootstrap program.
Router as a Computer

Non-volatile RAM (NVRAM) - Stores startup
configuration. This may include IP addresses
(Routing protocol, Hostname of router)

Flash memory - Contains the operating system
(Cisco IOS)

Interfaces - There exist multiple physical
interfaces that are used to connect network.
Examples of interface types:

-Ethernet / fast Ethernet interfaces

-Serial interfaces

-Management interfaces
Contd.
 Router Interface is a physical connector that
enables a router to send or receive packets
 Each interface connects to a separate
network
 Consist of socket or jack found on the
outside of a router
 Types of router interfaces:

-Ethernet

-Fastethernet

-Serial

--Cable
How do routers differ from
bridges?
 Routers differ from bridges in several respects.
First, bridging occurs at the data link layer or
layer 2,while routing occurs at the network
layer or layer 3 of the OSI model.
 Second, bridges use physical or MAC addresses
to make data forwarding decisions. Routers
use a different addressing scheme that occurs
at layer three
Bridges vs Routers
Bridge: A bridge is a
device that connects
two segments of the
same network. The two
networks being
connected can be alike
or dissimilar.
Bridges are protocol-
independent. They
simply forward packets
without analyzing and
re-routing messages.
Router: A router is a device
that connects two distinct
networks. Routers are
similar to bridges, but
provide additional
functionality, such as the
ability to filter messages
and forward them to
different places based on
various criteria.
The Internet uses routers
extensively to forward
packets from one host to
another.
41
42
Advantages and
Disadvantages of Routers
 Advantages
 Can connect different network architectures,
such as Ethernet and Token Ring
 Can choose the best path across an
internetwork using dynamic routing
techniques
 Reduce network traffic by creating collision
domains
 Reduce network traffic by creating broadcast
domains
43
Advantages and Disadvantages of
Routers (continued)
 Disadvantages

Routers work only with routable network
protocols; most but not all protocols are routable

Routers are more expensive than other devices

Dynamic router communications (inter-router
communication) cause additional network
overhead, which results in less bandwidth for user
data
 Routers are slower than other devices because
they must analyze a data transmission from the
Physical through the Network layer
44
Gateway
A gateway can translate information between
different network data formats or network
architectures.
 It can translate TCP/IP to AppleTalk so computers
supporting TCP/IP can communicate with Apple
brand computers.
Most gateways operate at the application layer, but
can operate at the network or session layer of the OSI
model.
 Gateways will start at the lower level and strip
information until it gets to the required level and
repackage the information and work its way back
toward the hardware layer of the OSI model.
The OSI Reference Model
45
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
The Physical Layer Connection
46
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Specifies
Specifies
electrical
electrical
connection
connection
The Physical Layer Connection
47
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Hub
Amplification
Amplification
Regeneration
Regeneration
The Data Link Connection
48
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Delineation
Delineation
of
of
Data
Data
Error
Error
Detection
Detection
Address
Address
Formatting
Formatting
49
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Bridge
& Switch
The Data Link Connection
The Network Layer Connection
50
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
End to end
End to end
routing
routing
The Network Layer Connection
51
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Route
r
52
IP address (INTRODUCTION)
The identifier used in the IP layer of the TCP/IP
The identifier used in the IP layer of the TCP/IP
protocol suite to identify each device connected to the
protocol suite to identify each device connected to the
Internet is called the Internet address or IP address.
Internet is called the Internet address or IP address.
An IP address is a
An IP address is a 32-bit address
32-bit address that uniquely and
that uniquely and
universally defines the connection of a host or a router
universally defines the connection of a host or a router
to the Internet.
to the Internet.
IP addresses are unique. They are unique in the sense
IP addresses are unique. They are unique in the sense
that each address defines one, and only one,
that each address defines one, and only one,
connection to the Internet.
connection to the Internet.
Two devices on the Internet can never have the same
Two devices on the Internet can never have the same
address.
address.
The address space of IPv4 is
The address space of IPv4 is
2
232
32
or
or
4,294,967,296.
4,294,967,296.
IPv4 address space
IPv4 address space
54
Figure Dotted-decimal notation
55
Change the following IP addresses from binary notation to
dotted-decimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 11100111 11011011 10001011 01101111
d. 11111001 10011011 11111011 00001111
Example 1
Solution
We replace each group of 8 bits with its equivalent decimal
number (see Appendix B) and add dots for separation:
a. 129.11.11.239 b. 193.131.27.255
c. 231.219.139.111 d. 249.155.251.15
56
Change the following IP addresses from dotted-decimal
notation to binary notation.
a. 111.56.45.78 b. 221.34.7.82
c. 241.8.56.12 d. 75.45.34.78
Example 2
Solution
We replace each decimal number with its binary equivalent:
a. 01101111 00111000 00101101 01001110
b. 11011101 00100010 00000111 01010010
c. 11110001 00001000 00111000 00001100
d. 01001011 00101101 00100010 01001110
57
Find the error, if any, in the following IP addresses:
a. 111.56.045.78 b. 221.34.7.8.20
c. 75.45.301.14 d. 11100010.23.14.67
Example 3
Solution
a. There are no leading zeroes in dotted-decimal notation (045).
b. We may not have more than four numbers in an IP address.
c. In dotted-decimal notation, each number is less than or equal
to 255; 301 is outside this range.
d. A mixture of binary notation and dotted-decimal notation is
not
allowed.
58
Change the following IP addresses from binary notation to
hexadecimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
Example 4
Solution
We replace each group of 4 bits with its hexadecimal
equivalent (see Appendix B). Note that hexadecimal notation
normally has no added spaces or dots; however, 0X (or 0x) is
added at the beginning or the subscript 16 at the end to show
that the number is in hexadecimal.
a. 0X810B0BEF or 810B0BEF16
b. 0XC1831BFF or C1831BFF16
59
CLASSFUL ADDRESSING
IP addresses, when started a few decades
IP addresses, when started a few decades
ago, used the concept of classes. This
ago, used the concept of classes. This
architecture is called
architecture is called classful addressing
classful addressing.
.
In the mid-1990s, a new architecture,
In the mid-1990s, a new architecture,
called classless addressing, was introduced
called classless addressing, was introduced
and will eventually supersede the original
and will eventually supersede the original
architecture.
architecture.
However, part of the Internet is still using
However, part of the Internet is still using
classful addressing, but the migration is very
classful addressing, but the migration is very
fast.
fast.
60
Figure Occupation of the address space
In classful addressing the address
space is divided into 5 classes:
A
A,
, B
B,
, C
C,
, D
D, and
, and E
E.
.
Table Addresses per class
Table Addresses per class
61
Figure Finding the class in binary notation
62
Figure Finding the address class
63
Find the class of each address:
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 10100111 11011011 10001011 01101111
d. 11110011 10011011 11111011 00001111
Example 6
Solution
See the procedure in Figure above.
a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C address.
c. The first bit is 1; the second bit is 0. This is a class B address.
d. The first 4 bits are 1s. This is a class E address..
64
Figure Finding the class in decimal notation
65
Find the class of each address:
a. 227.12.14.87 b.193.14.56.22 c.14.23.120.8
d. 252.5.15.111 e.134.11.78.56
Example 7
Solution
a. The first byte is 227 (between 224 and 239); the class is D.
b. The first byte is 193 (between 192 and 223); the class is C.
c. The first byte is 14 (between 0 and 127); the class is A.
d. The first byte is 252 (between 240 and 255); the class is E.
e. The first byte is 134 (between 128 and 191); the class is B.
Network vs. Host
 Every IP address has 2 parts:
 1 identifying the network it resides on

1 identifying the host address on the network
 The class of the address and the subnet mask
determine which part belongs to the network
address and which part belongs to the host address
SUBNETTING
Subnet Mask
 Subnet masks are applied to an IP
address to identify the Network portion
and the Host portion of the address.
 Your computer performs a bitwise
logical AND operation between the
address and the subnet mask in order
to find the Network Address or number.
Subnet Mask contd…
 To get the host portion, invert the
subnet mask and again perform a
binary AND with the ip address.
 To obtain the broadcast address, Take
the inverted subnet mask and perform
a binary XOR with the network address:
Default Subnet Masks
Class A - 255.0.0.0
11111111.00000000.00000000.00000000
Class B - 255.255.0.0
11111111.11111111.00000000.00000000
Class C - 255.255.255.0
11111111.11111111.11111111.00000000
Example
 IP Address 140.179.240.200
 It’s a Class B, so the subnet mask is:
 255.255.0.0
ip address : 10001100.10110011.11110000.11001000
subnet mask : 11111111.11111111.00000000.00000000
-----------------------------------------------------------AND
Network address :10001100.10110011.00000000.00000000
which translated back to dotted decimal notation is 140.179.0.0
 IP Address 140.179.240.200
 To get the host portion, invert the subnet mask
and perform a binary AND with the ip address
ip address: 10001100.10110011.11110000.11001000
inv. subnet mask 00000000.00000000.11111111.11111111
--------------------------------------------------------AND
host portion: 00000000.00000000.11110000.11001000
which translated back to dotted decimal notation
is 0.0.240.200
Example contd…
 IP Address 140.179.240.200
 To obtain the broadcast address, Take the
inverted subnet mask and perform a binary XOR
with the network address:
network address: 10001100.10110011.00000000.00000000
inv subnet mask: 00000000.00000000.11111111.11111111
------------------------------------------------------XOR
broadcast addr : 10001100.10110011.11111111.11111111
which translated back to dotted decimal notation is
140.179.255.255
Example contd…
74
Given the address 23.56.7.91, find the beginning address
(network address).
Examples
Solution
The default mask is 255.0.0.0, which means that only the first
byte is preserved and the other 3 bytes are set to 0s. The
network address is 23.0.0.0.
Exercise: Given the address 132.6.17.85, find the beginning
address (network address).
Exercise: Given the address 201.180.56.5, find the beginning
address (network address).
Subnetting
 Subnetting is a way of taking an existing
class and breaking it down to create more
Network Addresses.
 This will always reduce the number of host
addresses for a given network.
 Subnetting makes more efficient use of the
address or addresses assigned to you.
Subnetting
router
Subnet 1
128.213.1.x
Subnet 2
128.213.2.x
Subnet 3
128.213.3.x
The number of subnets must be
The number of subnets must be
a power of 2.
a power of 2.
78
Figure Default mask and subnet mask
79
What is the subnetwork address if the destination address is
200.45.34.56 and the subnet mask is 255.255.240.0?
Example
Solution
We apply the AND operation on the address and the subnet
mask.
Address ➡ 11001000 00101101 00100010 00111000
Subnet Mask ➡ 11111111 11111111 11110000 00000000
Subnetwork Address ➡ 11001000 00101101 00100000 00000000.
Subnet Addressing cont…
 Regular (Class B) IP address:
0 8 16 24 31
1 0 netid hostid
0 8 16 24 31
1 0 netid subnet hostid
How many bits to borrow?
 First, you need to know how many bits
you have to work with.
 Second, you must know either how
many subnets you need or how many
hosts per subnet you need.
 Finally, you need to figure out the
number of bits to borrow.
How many bits to borrow?
 How many bits do I have to work with?

Depends on the class of your network
address.

Class C: 8 host bits

Class B: 16 host bits

Class A: 24 host bits
 Remember: you must borrow at least 2 bits
for subnets and leave at least 2 bits for host
addresses.

2 bits borrowed allows 22
- 2 = 2 subnets
How many bits to borrow?
 A simple formula:
 Host Bits = Bits Borrowed + Bits Left
 HB = BB + BL
 Need x subnets:
x
2
2BB


• Need x hosts: x
2
2BL


• Remember: we need to subtract
two to provide for the subnetwork
and broadcast addresses.
Example:
Suppose we have the address of: 206.15.143.89?
Class C
255.255.255.0
206.15.143.0
0.0.0.89
What class is it?
What is the subnet mask?
What is the Network Address?
What is the host portion of the address?
Subnetting Example
 So we have 1 Class C Network (206.15.143.0)
 And we have 254 host addresses (1 to 254)
206.15.143.1 to 206.15.143.254
 But what if our LAN has 5 networks in it and each
network has no more than 25 hosts on it?
 Do we apply for 4 more Class C addresses, so we have
one for each network?
 We would be wasting 224 addresses on each network,
a total of 1120 addresses!
 To calculate the number of subnets
(networks) and/or hosts, we need to do
some math:
 Use the formula 2n
-2 where the n can
represent either how many subnets
(networks) needed OR how many hosts
per subnet needed.
Subnetting Example
 We know we need at least 5 subnets. So 23
-2
will give us 6 subnet addresses (Network
Addresses).
 We know we need at least 25 hosts per
network. 25
-2 will give us 30 hosts per subnet
(network).
 This will work, because we can steal the first 3
bits from the host’s portion of the address to
give to the network portion and still have 5 (8-
3) left for the host portion:
Subnetting Example
 Let’s go back to what portion is what:
We have a Class C address:
NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
With a Subnet mask of:
11111111.11111111.11111111.00000000
We need to steal 3 bits from the host portion to
give it to the Network portion:
NNNNNNNN.NNNNNNNN.NNNNNNNN.NNNHHHHH
Subnetting Example
NNNNNNNN.NNNNNNNN.NNNNNNNN.NNNHHHH
H
This will change our subnet mask to the following:
11111111.11111111.11111111.11100000
 Above is how the computer will see our new subnet
mask, but we need to express it in decimal form as well:
255.255.255.224 128+64+32=224
Subnetting Example
 Which of our 254 addresses will be a Subnet
(or Network) address and which will be our
host addresses?
 Because we are using the first 3 bits for our
subnet mask, we can configure them into
eight different ways (binary form):
000 001
010 011
100 101
110 111
•We are left with 6 useable network numbers.
Subnetting Example
Network (Subnet) Addresses
128 64 32 16 8 4 2 1 Equals
Now our 3 bit configurations:
0 0 1 H H H H H 32
0 1 0 H H H H H 64
0 1 1 H H H H H 96
1 0 0 H H H H H 128
1 0 1 H H H H H 160
1 1 0 H H H H H 192
Each of these numbers becomes the
Network Address of their subnet...
Network (Subnet) Addresses
206.15.143.32
206.15.143.64
206.15.143.96
206.15.143.128
206.15.143.160
206.15.143.192
host Addresses
 The device assigned the first address will receive the
first number AFTER the network address shown before.
206.15.143.33 or 32+1
0 0 1 0 0 0 0 1
And the last address in the Network will look like this:
206.15.143.62
0 0 1 1 1 1 1 0
*Remember, we cannot use all “1”s, that is the broadcast
address (206.15.143.63)
Network: Host Range
206.15.143.32 206.15.143.33 to 206.15.143.62
206.15.143.64 206.15.143.65 to 206.15.143.94
206.15.143.96 206.15.143.97 to 206.15.143.126
206.15.143.128 206.15.143.129 to 206.15.143.158
206.15.143.160 206.15.143.161 to 206.15.143.190
206.15.143.192 206.15.143.193 to 206.15.143.222
Subnetting Example
What are the broadcast addresses ?
How the computer finds the
Network Address:
206.15.143.89 An address on the subnet
225.225.225.224 The new subnet mask
 When the computer does the Logical Bitwise AND
Operation it will come up with the following Network
Address (or Subnet Address):
11001110.00001111.10001111.01011001= 206.15.143.89
11111111.11111111.11111111.11100000 = 255.255.255.224
11001110.00001111.10001111.01000000 = 206.15.143.64
This address falls on our 2nd Subnet (Network)
SUPERNETTING
What is Supernetting?
 Supernetting, also called Classless Inter-
Domain Routing (CIDR), is a way to
aggregate multiple Internet addresses of
the same class.
 Supernetting is the opposite of Subnetting
 In subnetting you borrow bits from the host
part
 Supernetting is done by borrowing bits
from the network side.
 And combine a group of networks into one
large supernetwork.
In class C
Rules:
 The number of blocks must be a power of 2
(1, 2, 4, 8, 16, . . .).
 The blocks must be contiguous in the address
space (no gaps between the blocks).
 The third byte of the first address in the
superblock must be evenly divisible by the
number of blocks. In other words, if the number
of blocks is N, the third byte must be divisible by
N.
CIDR
 CIDR aggregation requires the network
segments involved to be contiguous
(numerically adjacent) in the address
space
 Backbone routers (those that manage
traffic between Internet Service Providers)
all generally support CIDR to achieve the
goal of conserving IP address space
 CIDR is supported by BGP4 and based on ro
ute aggregation
Supernetting Sample
 An organization with 4 class C addresses
193.0.32.0 , 193.0.33.0 , 193.0.34.0 , 193.0.35.0
11111111 11111111 11111100 00000000 mask 255.255.252.0
11000001 00000000 00100000 00000000 net 193.0.32.0
11000001 00000000 00100001 00000000 net 193.0.33.0
11000001 00000000 00100010 00000000 net 193.0.34.0
11000001 00000000 00100011 00000000 net 193.0.35.0
Bit wise AND results 193.0.32.0: 11000001 00000000 00100
000 00000000 written as 193.0.32.0/22
 This organization’s network has changed from 4 nets to a
single net with 1022 hosts
Comparison of subnet, default,
and supernet masks
Mapping IP Addresses to
Hardware Addresses
 IP Addresses are not recognized by
hardware.
 If we know the IP address of a host,
how do we find out the hardware
address ?
 The process of finding the hardware
address of a host given the IP address
is called
Address Resolution
Address Resolution
Reverse Address Resolution
 The process of finding out the IP
address of a host given a
hardware address is called
Reverse Address Resolution
Reverse Address Resolution
ARP
 On a typical physical network, such as a LAN,
On a typical physical network, such as a LAN,
each device on a link is identified by a
each device on a link is identified by a
physical or station address that is usually
physical or station address that is usually
imprinted on the NIC.
imprinted on the NIC.
 The Address Resolution Protocol is used by a
The Address Resolution Protocol is used by a
sending host when it knows the IP address of
sending host when it knows the IP address of
the destination but needs the Ethernet address.
the destination but needs the Ethernet address.
 ARP is a broadcast protocol - every host on
ARP is a broadcast protocol - every host on
the network receives the request.
the network receives the request.
 Each host checks the request against it’s IP
Each host checks the request against it’s IP
address - the right one responds.
address - the right one responds.
Contd.
113
An ARP request is broadcast;
an ARP reply is unicast.
Note:
Note:
114
RARP
RARP finds the logical address for a
RARP finds the logical address for a
machine that only knows its physical address.
machine that only knows its physical address.
The RARP request packets are
broadcast;
the RARP reply packets are unicast.
Contd.
TCP/IP Protocol Suite 116
DHCP
The Dynamic Host Configuration Protocol
The Dynamic Host Configuration Protocol
(DHCP) provides static and dynamic address
(DHCP) provides static and dynamic address
allocation that can be manual or automatic.
allocation that can be manual or automatic.
Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol
automates network-parameter assignment to
automates network-parameter assignment to
network devices from one or more
network devices from one or more
fault-tolerant DHCP servers.
DHCP servers.
Even in small networks, DHCP is useful
Even in small networks, DHCP is useful
because it can make it easy to add new
because it can make it easy to add new
machines to the network.
machines to the network.
TCP/IP Protocol Suite 117
Contd. DHCP
When a DHCP-configured client (a computer
When a DHCP-configured client (a computer
or any other network-aware device) connects to
or any other network-aware device) connects to
a network, the DHCP client sends a
a network, the DHCP client sends a broadcast
query requesting necessary information from a
query requesting necessary information from a
DHCP server.
DHCP server.
The DHCP server manages a pool of IP
The DHCP server manages a pool of IP
addresses and information about client
addresses and information about client
configuration parameters such as
configuration parameters such as
default gateway,
, domain name, the
, the
DNS servers, other servers such as
, other servers such as
time servers, and so forth
, and so forth
TCP/IP Protocol Suite 118
Contd. DHCP
On receiving a valid request, the server
On receiving a valid request, the server
assigns the computer an IP address, a lease
assigns the computer an IP address, a lease
(length of time the allocation is valid), and
(length of time the allocation is valid), and
other IP configuration parameters, such as the
other IP configuration parameters, such as the
subnet mask and the default gateway.
and the default gateway.
The query is typically initiated immediately
The query is typically initiated immediately
after booting, and must complete before the
after booting, and must complete before the
client can initiate IP-based communication with
client can initiate IP-based communication with
other hosts.
other hosts.
TCP/IP Protocol Suite 119
Contd. DHCP
Depending on implementation, the DHCP
Depending on implementation, the DHCP
server may have three methods of allocating IP-
server may have three methods of allocating IP-
addresses:
addresses:
Dynamic allocation
Automatic allocation
Static allocation
TCP/IP Protocol Suite 120
Dynamic allocation
A network administrator assigns a range of IP
A network administrator assigns a range of IP
addresses to DHCP, and each client computer
addresses to DHCP, and each client computer
on the LAN has its IP software configured to
on the LAN has its IP software configured to
request an IP address from the DHCP server
request an IP address from the DHCP server
during network initialization.
during network initialization.
The request-and-grant process uses a lease
The request-and-grant process uses a lease
concept with a controllable time period,
concept with a controllable time period,
allowing the DHCP server to reclaim (and then
allowing the DHCP server to reclaim (and then
reallocate) IP addresses that are not renewed
reallocate) IP addresses that are not renewed
(dynamic re-use of IP addresses).
(dynamic re-use of IP addresses).
TCP/IP Protocol Suite 121
Automatic allocation
The DHCP server permanently assigns a free
The DHCP server permanently assigns a free
IP address to a requesting client from the range
IP address to a requesting client from the range
defined by the administrator.
defined by the administrator.
This is like dynamic allocation, but the DHCP
This is like dynamic allocation, but the DHCP
server keeps a table of past IP address
server keeps a table of past IP address
assignments, so that it can preferentially assign
assignments, so that it can preferentially assign
to a client the same IP address that the client
to a client the same IP address that the client
previously had.
previously had.
TCP/IP Protocol Suite 122
Static allocation
The DHCP server allocates an IP address
The DHCP server allocates an IP address
based on a table with MAC address/IP address
based on a table with MAC address/IP address
pairs, which are manually filled in (perhaps by
pairs, which are manually filled in (perhaps by
a network administrator).
a network administrator).
Only requesting clients with a MAC address
Only requesting clients with a MAC address
listed in this table will be allocated an IP
listed in this table will be allocated an IP
address.
address.
ICMP Internet Control Message Protocol
 Is one of the protocols of the internet
protocol suite.
 It is used by network devices, like routers.
 When information is transferred over the
Internet, computer systems send and
receive data using the TCP/IP protocol.
 If there is a problem with the connection,
error and status messages regarding the
connection are sent using ICMP, which is
part of the Internet protocol.
ICMP Internet Control Message Protocol
 ICMP is a protocol used for exchanging
control messages.
 ICMP uses IP to deliver messages.
 ICMP messages are usually generated
and processed by the IP software, not
the user process.
ICMP Internet Control Message Protocol
 Each ICMP message contains three fields that
define its purpose and provide a checksum.
 They are TYPE, CODE, and CHECKSUM fields.
 The TYPE field identifies the ICMP message,
the CODE field provides further information
about the associated TYPE field, and the
CHECKSUM provides a method for
determining the integrity of the message.
UDP User Datagram Protocol
 UDP is a transport-layer protocol
 UDP (User Datagram Protocol) is a
communications protocol that offers a
limited amount of service when
messages are exchanged between
computers in a network that uses the
Internet Protocol (IP).
 UDP uses IP to deliver datagrams to the
right host.
UDP User Datagram Protocol
 Unlike TCP, however, UDP does not provide
the service of dividing a message into
packets (datagrams) and reassembling it at
the other end.
 Specifically, UDP doesn't provide sequencing
of the packets that the data arrives in.
 This means that the application program
that uses UDP must be able to make sure
that the entire message has arrived and is in
the right order.
Ports
 UDP/IP uses an abstract destination
point called a protocol port.
 Ports are identified by a positive integer.
 Operating systems provide some
mechanism that processes use to
specify a port.
Ports
Host A
Host A Host B
Host B
Process
Process
Process
Process
Process
Process
UDP
 Datagram Delivery
 Connectionless
 Unreliable
 Minimal UDP Datagram Format
UDP Datagram Format
no handshaking between UDP
sender, receiver
TCP Transmission Control Protocol
 TCP is an alternative transport layer protocol
supported by TCP/IP.
 ensures that a packet has been received by the
destination by using acknowledgements and
retransmission
 TCP provides:
 Connection-oriented
- applications need to establish a TCP connection
prior to transfer.
-3-way handshake.
TCP Transmission Control Protocol
 Reliable
 Full-duplex
-Both ends can simultaneously read and
write
 Byte-Stream
-Ignores message boundaries
TCP vs. UDP
Q: Which protocol is better ?
Q: Which protocol is better ?
A: It depends on the application.
A: It depends on the application.
TCP provides a connection-oriented, reliable
TCP provides a connection-oriented, reliable
byte stream service (lots of overhead).
byte stream service (lots of overhead).
UDP offers minimal datagram delivery
UDP offers minimal datagram delivery
service (as little overhead as possible).
service (as little overhead as possible).
TCP vs. UDP
IPv6
IPv6 Advantages
 Virtually unlimited addresses
 End to end security IPSec Mandate
 Improved Mobile IP support
 Faster Routing : simplified header
 Autoconfiguration for adhoc networks
 Co-existence with IPv4

chapter7.ppt introduction to networking and subneting for ip version four

  • 1.
  • 2.
    Introduction  As organizationgrow in size, network also grow and performance decreases.  Sometime necessary to break or segment a local area network into smaller, multiple segments, and some type of interconnection among segment is required to access wide range of resources.  Interconnecting multiple networks or multiple segments of networks is called internetworking.  Breaking a large network into smaller networks is called segmentation.
  • 3.
    Why segment orInternetwork?  To separate / connect one corporate division with another.  Improve performance  To provide a security wall between two different types of users.  Communication between different types of networks.
  • 4.
    Connecting Devices/ NetworkDevices  Most common features of network devices are to interconnect networks, boost signals etc.  Commonly used devices are:  Repeater  Hub  Bridge  Switch  Router
  • 5.
    5 Hubs A hub interconnectstwo or more workstations into a local area network. Hub is a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions. When a workstation transmits to a hub, the hub immediately resends the data frame to all connecting links. Physical layer. Hubs are classified as Layer 1 devices per the OSI model. Hubs expand one Ethernet connection into many. For example, a four-port hub connects up to four machines.
  • 6.
  • 7.
    Hubs  Hubs canbe arranged in a hierarchy (or multi-tier design), with backbone hub at its top
  • 8.
    8 Types of Hub Thereare many types of hubs with various features/specifications, which provide the type of functionality you need in building a network. On the basis of its working methods, the Hubs can be divided into three types, given as: Active Hub Passive Hub Intelligent Hub
  • 9.
    9 Passive Hub As thename suggests, passive hubs are the ones, which do not provide any additional feature except for working just as an interface between the topology.(Just a connector.) These types do not help in rectifying/enhancing the signals they pass on in the network, in other terms, they do not help in enhancing the performance of the network/LAN. It simply receives signal(s) on input port(s) and broadcasts it (them) on the output port(s) without even rectifying it (them).
  • 10.
    10 Active Hub As itsname suggests, Active Hub is a hub which can amplify or regenerate the information signal. This type of bus has an advantage as it also amplifies the incoming signal as well as forward it to multiple devices. active hub takes active participation in data communication within the network/LAN. receives the frame from an incoming link, regenerates it, and sends it to all outgoing links. Active hubs also help in troubleshooting at a certain level
  • 11.
    11 Intelligent Hubs They addsome more features to that provided by the active hubs.  It provides all the features of a passive and an active hub; it also provides some features, which help in managing the network resources effectively and efficiently. They help in improving the performance of the network/LAN that you are using. As an active hub helps in finding out where the problem persists, an intelligent hub itself finds out the problem in the network, diagnoses it and tries to rectify it without letting the problem hamper the performance of the network.
  • 12.
    12 Contd. Intelligent Hubs Theyprovide a feature that helps in determining the exact cause and exact place of the fault.  Another feature of the intelligent hub is that they can decide which packet goes in which output line, this helps in controlling and minimizing data traffic in the network, which results in improved performance of the network/LAN. They also help in managing the data communication within the network, it recognizes the slower devices automatically and helps them to transmit the data with their own speed, and during this time, the hub manages the traffic within the network effectively.
  • 13.
    Hub Pros &Cons Disadvantages  Bandwidth is shared by all hosts i.e. 10Mbs shared by 25 ports/users.  Hubs repeat everything they receive and can be used to extend the network  Can create bottlenecks when used with switches.  Most Hubs are unable to utilise VLANS.  Hubs have limited port to connect client, so it is not suitable for large network. Advantages  As an active hubs regenerate signals, it increases the distance that can be spanned by the LAN (up to 100 meters per segment).  Hubs can also be connected locally to a maximum of two other hubs, thereby increasing the number of devices that can be attached to the LAN.  Active hubs are usually used against attenuation, which is a decrease in the strength of the signal over distance.
  • 14.
    14 Repeaters Signal gets weakeneddue to attenuation. In order to boost the data signal repeaters are needed to amplify weakened signal. Repeaters are known as signal boosters are amplifiers. Physical layer device Connects two segment of networks, refines and regenerate the digital signals on the cable.  Repeaters require a small amount of time to regenerate the signal.  Repeaters do not understand frames, packets, or headers. -Understand volts only
  • 15.
    Figure A repeaterconnecting two segments of a LAN
  • 16.
  • 17.
    Advantages & Disadvantagesof using Repeaters Advantages  Repeaters can extend a network’s total distance.  Repeaters do not seriously impact network performance  Certain repeaters can connect network using different physical media.([ex. fiber optic, UTF, coaxial cable] is possible. Disadvantages  Can not connect different network architecture  Do not reduce network traffic.
  • 18.
  • 19.
    19 Contd.  A bridgeconnects networks and forwards frames from one network to another.  A Bridge is a device that filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN .  Filter traffic between network segments by examining the destination MAC address  Based on the destination MAC address, the bridge either forwards or discards the frame  It connects on the data-link layer, (layer 2) of the OSI model. A B C D E F G H BRIDGE PORTS
  • 20.
    20 Contd. Bridges To determinethe network segment a MAC address belongs to, bridges use one of: Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. If the address is not in the bridging table, the packet is forwarded to all segments other than the one it came from. This type of bridge is used on ethernet networks. Source route bridging - The source computer provides path information inside the packet. This is used on Token Ring networks.
  • 21.
    Figure A bridgeconnecting two LANs
  • 23.
  • 24.
    24 A bridge interconnectingtwo dissimilar LANs
  • 25.
    25 Advantages and Disadvantagesof Bridges  Advantages  Can extend a network by acting as a repeater  Can reduce network traffic on a segment by subdividing network communications  Increase the available bandwidth to individual nodes because fewer nodes share a collision domain  Reduce collisions  Some bridges connect networks using different media types and architectures
  • 26.
    26 Advantages and Disadvantagesof Bridges (continued)  Disadvantages  Slower than repeaters and hubs  Extra processing by viewing MAC addresses  Forward broadcast frames indiscriminately, so they do not filter broadcast traffic  More expensive than repeaters and hubs  Broadcast storm  When two or more stations engage in the transmission of excessive broadcast traffic
  • 27.
    27 Cisco Catalyst 2900switch • Switches operate at the Data Link layer (layer 2) of the OSI model Usually used to connect individual computers not LANs like bridge. Allows more than one device connected to the switch directly to transmit simultaneously • Switches resemble bridges and can be considered as multiport bridges • By having multiport, can better use limited bandwidth and prove more cost-effective than bridge Switches
  • 28.
    28 Contd. Switches  Likebridges, support concurrent communication.  Switch opens a virtual circuit between the source and the destination.  Prevents communications between just two computers from being broadcast to every computer on the network or segment  It stores MAC addresses in an internal lookup table  Host A can talk to C, while B talks to D switch A B C D
  • 29.
  • 30.
    30 Contd. The difference betweenhubs and switches is in how the devices deal with the data that they receive. Whereas a hub forwards the data it receives to all of the ports on the device, a switch forwards it only to the port that connects to the destination device. It does this by learning the MAC address of the devices attached to it, and then by matching the destination MAC address in the data it receives. .
  • 31.
    31 Advantages and Disadvantagesof Switches  Advantages  Switches increase available network bandwidth  Switches reduce the workload on individual computers  Switches increase network performance  Networks that include switches experience fewer frame collisions because switches create collision domains for each connection (a process called microsegmentation)  Switches connect directly to workstations
  • 32.
    32 Advantages and Disadvantages ofSwitches (continued)  Disadvantages  Switches are significantly more expensive than bridges  Network connectivity problems can be difficult to trace through a switch  Broadcast traffic may be troublesome
  • 33.
    33 Routers Routers are anothertype of internetworking device.  These devices pass data packets between networks based on network protocol or layer 3 information.  We represent a router as a black box that accepts incoming packets from one of the input ports (interfaces), uses a routing table to find the departing output port, and sends the packet from this output port.
  • 34.
    34 Routers Routers have theability to make intelligent decisions as to the best path for delivery of data on the network. The device that connects a LAN to a WAN or a WAN to a WAN (the INTERNET! – uses IP addresses).  Routers generally have 2 connections: -WAN connection (Connection to ISP) -LAN connection
  • 35.
    Contd. Router  Datais sent in form of packets between 2 end devices  Routers are used to direct packet to its destination
  • 36.
    Router as aComputer  Router components and their functions”  CPU - Executes operating system instructions  Random access memory (RAM) - Contains the running copy of configuration file. Stores routing table. RAM contents lost when power is off  Read-only memory (ROM) - Holds diagnostic software used when router is powered up. Stores the router’s bootstrap program.
  • 37.
    Router as aComputer  Non-volatile RAM (NVRAM) - Stores startup configuration. This may include IP addresses (Routing protocol, Hostname of router)  Flash memory - Contains the operating system (Cisco IOS)  Interfaces - There exist multiple physical interfaces that are used to connect network. Examples of interface types:  -Ethernet / fast Ethernet interfaces  -Serial interfaces  -Management interfaces
  • 38.
    Contd.  Router Interfaceis a physical connector that enables a router to send or receive packets  Each interface connects to a separate network  Consist of socket or jack found on the outside of a router  Types of router interfaces:  -Ethernet  -Fastethernet  -Serial  --Cable
  • 40.
    How do routersdiffer from bridges?  Routers differ from bridges in several respects. First, bridging occurs at the data link layer or layer 2,while routing occurs at the network layer or layer 3 of the OSI model.  Second, bridges use physical or MAC addresses to make data forwarding decisions. Routers use a different addressing scheme that occurs at layer three
  • 41.
    Bridges vs Routers Bridge:A bridge is a device that connects two segments of the same network. The two networks being connected can be alike or dissimilar. Bridges are protocol- independent. They simply forward packets without analyzing and re-routing messages. Router: A router is a device that connects two distinct networks. Routers are similar to bridges, but provide additional functionality, such as the ability to filter messages and forward them to different places based on various criteria. The Internet uses routers extensively to forward packets from one host to another. 41
  • 42.
    42 Advantages and Disadvantages ofRouters  Advantages  Can connect different network architectures, such as Ethernet and Token Ring  Can choose the best path across an internetwork using dynamic routing techniques  Reduce network traffic by creating collision domains  Reduce network traffic by creating broadcast domains
  • 43.
    43 Advantages and Disadvantagesof Routers (continued)  Disadvantages  Routers work only with routable network protocols; most but not all protocols are routable  Routers are more expensive than other devices  Dynamic router communications (inter-router communication) cause additional network overhead, which results in less bandwidth for user data  Routers are slower than other devices because they must analyze a data transmission from the Physical through the Network layer
  • 44.
    44 Gateway A gateway cantranslate information between different network data formats or network architectures.  It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brand computers. Most gateways operate at the application layer, but can operate at the network or session layer of the OSI model.  Gateways will start at the lower level and strip information until it gets to the required level and repackage the information and work its way back toward the hardware layer of the OSI model.
  • 45.
    The OSI ReferenceModel 45 Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer
  • 46.
    The Physical LayerConnection 46 Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Specifies Specifies electrical electrical connection connection
  • 47.
    The Physical LayerConnection 47 Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Hub Amplification Amplification Regeneration Regeneration
  • 48.
    The Data LinkConnection 48 Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Delineation Delineation of of Data Data Error Error Detection Detection Address Address Formatting Formatting
  • 49.
  • 50.
    The Network LayerConnection 50 Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer End to end End to end routing routing
  • 51.
    The Network LayerConnection 51 Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Route r
  • 52.
    52 IP address (INTRODUCTION) Theidentifier used in the IP layer of the TCP/IP The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the protocol suite to identify each device connected to the Internet is called the Internet address or IP address. Internet is called the Internet address or IP address. An IP address is a An IP address is a 32-bit address 32-bit address that uniquely and that uniquely and universally defines the connection of a host or a router universally defines the connection of a host or a router to the Internet. to the Internet. IP addresses are unique. They are unique in the sense IP addresses are unique. They are unique in the sense that each address defines one, and only one, that each address defines one, and only one, connection to the Internet. connection to the Internet. Two devices on the Internet can never have the same Two devices on the Internet can never have the same address. address.
  • 53.
    The address spaceof IPv4 is The address space of IPv4 is 2 232 32 or or 4,294,967,296. 4,294,967,296. IPv4 address space IPv4 address space
  • 54.
  • 55.
    55 Change the followingIP addresses from binary notation to dotted-decimal notation. a. 10000001 00001011 00001011 11101111 b. 11000001 10000011 00011011 11111111 c. 11100111 11011011 10001011 01101111 d. 11111001 10011011 11111011 00001111 Example 1 Solution We replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation: a. 129.11.11.239 b. 193.131.27.255 c. 231.219.139.111 d. 249.155.251.15
  • 56.
    56 Change the followingIP addresses from dotted-decimal notation to binary notation. a. 111.56.45.78 b. 221.34.7.82 c. 241.8.56.12 d. 75.45.34.78 Example 2 Solution We replace each decimal number with its binary equivalent: a. 01101111 00111000 00101101 01001110 b. 11011101 00100010 00000111 01010010 c. 11110001 00001000 00111000 00001100 d. 01001011 00101101 00100010 01001110
  • 57.
    57 Find the error,if any, in the following IP addresses: a. 111.56.045.78 b. 221.34.7.8.20 c. 75.45.301.14 d. 11100010.23.14.67 Example 3 Solution a. There are no leading zeroes in dotted-decimal notation (045). b. We may not have more than four numbers in an IP address. c. In dotted-decimal notation, each number is less than or equal to 255; 301 is outside this range. d. A mixture of binary notation and dotted-decimal notation is not allowed.
  • 58.
    58 Change the followingIP addresses from binary notation to hexadecimal notation. a. 10000001 00001011 00001011 11101111 b. 11000001 10000011 00011011 11111111 Example 4 Solution We replace each group of 4 bits with its hexadecimal equivalent (see Appendix B). Note that hexadecimal notation normally has no added spaces or dots; however, 0X (or 0x) is added at the beginning or the subscript 16 at the end to show that the number is in hexadecimal. a. 0X810B0BEF or 810B0BEF16 b. 0XC1831BFF or C1831BFF16
  • 59.
    59 CLASSFUL ADDRESSING IP addresses,when started a few decades IP addresses, when started a few decades ago, used the concept of classes. This ago, used the concept of classes. This architecture is called architecture is called classful addressing classful addressing. . In the mid-1990s, a new architecture, In the mid-1990s, a new architecture, called classless addressing, was introduced called classless addressing, was introduced and will eventually supersede the original and will eventually supersede the original architecture. architecture. However, part of the Internet is still using However, part of the Internet is still using classful addressing, but the migration is very classful addressing, but the migration is very fast. fast.
  • 60.
    60 Figure Occupation ofthe address space In classful addressing the address space is divided into 5 classes: A A, , B B, , C C, , D D, and , and E E. . Table Addresses per class Table Addresses per class
  • 61.
    61 Figure Finding theclass in binary notation
  • 62.
    62 Figure Finding theaddress class
  • 63.
    63 Find the classof each address: a. 00000001 00001011 00001011 11101111 b. 11000001 10000011 00011011 11111111 c. 10100111 11011011 10001011 01101111 d. 11110011 10011011 11111011 00001111 Example 6 Solution See the procedure in Figure above. a. The first bit is 0. This is a class A address. b. The first 2 bits are 1; the third bit is 0. This is a class C address. c. The first bit is 1; the second bit is 0. This is a class B address. d. The first 4 bits are 1s. This is a class E address..
  • 64.
    64 Figure Finding theclass in decimal notation
  • 65.
    65 Find the classof each address: a. 227.12.14.87 b.193.14.56.22 c.14.23.120.8 d. 252.5.15.111 e.134.11.78.56 Example 7 Solution a. The first byte is 227 (between 224 and 239); the class is D. b. The first byte is 193 (between 192 and 223); the class is C. c. The first byte is 14 (between 0 and 127); the class is A. d. The first byte is 252 (between 240 and 255); the class is E. e. The first byte is 134 (between 128 and 191); the class is B.
  • 66.
    Network vs. Host Every IP address has 2 parts:  1 identifying the network it resides on  1 identifying the host address on the network  The class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the host address
  • 67.
  • 68.
    Subnet Mask  Subnetmasks are applied to an IP address to identify the Network portion and the Host portion of the address.  Your computer performs a bitwise logical AND operation between the address and the subnet mask in order to find the Network Address or number.
  • 69.
    Subnet Mask contd… To get the host portion, invert the subnet mask and again perform a binary AND with the ip address.  To obtain the broadcast address, Take the inverted subnet mask and perform a binary XOR with the network address:
  • 70.
    Default Subnet Masks ClassA - 255.0.0.0 11111111.00000000.00000000.00000000 Class B - 255.255.0.0 11111111.11111111.00000000.00000000 Class C - 255.255.255.0 11111111.11111111.11111111.00000000
  • 71.
    Example  IP Address140.179.240.200  It’s a Class B, so the subnet mask is:  255.255.0.0 ip address : 10001100.10110011.11110000.11001000 subnet mask : 11111111.11111111.00000000.00000000 -----------------------------------------------------------AND Network address :10001100.10110011.00000000.00000000 which translated back to dotted decimal notation is 140.179.0.0
  • 72.
     IP Address140.179.240.200  To get the host portion, invert the subnet mask and perform a binary AND with the ip address ip address: 10001100.10110011.11110000.11001000 inv. subnet mask 00000000.00000000.11111111.11111111 --------------------------------------------------------AND host portion: 00000000.00000000.11110000.11001000 which translated back to dotted decimal notation is 0.0.240.200 Example contd…
  • 73.
     IP Address140.179.240.200  To obtain the broadcast address, Take the inverted subnet mask and perform a binary XOR with the network address: network address: 10001100.10110011.00000000.00000000 inv subnet mask: 00000000.00000000.11111111.11111111 ------------------------------------------------------XOR broadcast addr : 10001100.10110011.11111111.11111111 which translated back to dotted decimal notation is 140.179.255.255 Example contd…
  • 74.
    74 Given the address23.56.7.91, find the beginning address (network address). Examples Solution The default mask is 255.0.0.0, which means that only the first byte is preserved and the other 3 bytes are set to 0s. The network address is 23.0.0.0. Exercise: Given the address 132.6.17.85, find the beginning address (network address). Exercise: Given the address 201.180.56.5, find the beginning address (network address).
  • 75.
    Subnetting  Subnetting isa way of taking an existing class and breaking it down to create more Network Addresses.  This will always reduce the number of host addresses for a given network.  Subnetting makes more efficient use of the address or addresses assigned to you.
  • 76.
  • 77.
    The number ofsubnets must be The number of subnets must be a power of 2. a power of 2.
  • 78.
    78 Figure Default maskand subnet mask
  • 79.
    79 What is thesubnetwork address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0? Example Solution We apply the AND operation on the address and the subnet mask. Address ➡ 11001000 00101101 00100010 00111000 Subnet Mask ➡ 11111111 11111111 11110000 00000000 Subnetwork Address ➡ 11001000 00101101 00100000 00000000.
  • 80.
    Subnet Addressing cont… Regular (Class B) IP address: 0 8 16 24 31 1 0 netid hostid 0 8 16 24 31 1 0 netid subnet hostid
  • 81.
    How many bitsto borrow?  First, you need to know how many bits you have to work with.  Second, you must know either how many subnets you need or how many hosts per subnet you need.  Finally, you need to figure out the number of bits to borrow.
  • 82.
    How many bitsto borrow?  How many bits do I have to work with?  Depends on the class of your network address.  Class C: 8 host bits  Class B: 16 host bits  Class A: 24 host bits  Remember: you must borrow at least 2 bits for subnets and leave at least 2 bits for host addresses.  2 bits borrowed allows 22 - 2 = 2 subnets
  • 83.
    How many bitsto borrow?  A simple formula:  Host Bits = Bits Borrowed + Bits Left  HB = BB + BL  Need x subnets: x 2 2BB   • Need x hosts: x 2 2BL   • Remember: we need to subtract two to provide for the subnetwork and broadcast addresses.
  • 84.
    Example: Suppose we havethe address of: 206.15.143.89? Class C 255.255.255.0 206.15.143.0 0.0.0.89 What class is it? What is the subnet mask? What is the Network Address? What is the host portion of the address?
  • 85.
    Subnetting Example  Sowe have 1 Class C Network (206.15.143.0)  And we have 254 host addresses (1 to 254) 206.15.143.1 to 206.15.143.254  But what if our LAN has 5 networks in it and each network has no more than 25 hosts on it?  Do we apply for 4 more Class C addresses, so we have one for each network?  We would be wasting 224 addresses on each network, a total of 1120 addresses!
  • 86.
     To calculatethe number of subnets (networks) and/or hosts, we need to do some math:  Use the formula 2n -2 where the n can represent either how many subnets (networks) needed OR how many hosts per subnet needed. Subnetting Example
  • 87.
     We knowwe need at least 5 subnets. So 23 -2 will give us 6 subnet addresses (Network Addresses).  We know we need at least 25 hosts per network. 25 -2 will give us 30 hosts per subnet (network).  This will work, because we can steal the first 3 bits from the host’s portion of the address to give to the network portion and still have 5 (8- 3) left for the host portion: Subnetting Example
  • 88.
     Let’s goback to what portion is what: We have a Class C address: NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH With a Subnet mask of: 11111111.11111111.11111111.00000000 We need to steal 3 bits from the host portion to give it to the Network portion: NNNNNNNN.NNNNNNNN.NNNNNNNN.NNNHHHHH Subnetting Example
  • 89.
    NNNNNNNN.NNNNNNNN.NNNNNNNN.NNNHHHH H This will changeour subnet mask to the following: 11111111.11111111.11111111.11100000  Above is how the computer will see our new subnet mask, but we need to express it in decimal form as well: 255.255.255.224 128+64+32=224 Subnetting Example
  • 90.
     Which ofour 254 addresses will be a Subnet (or Network) address and which will be our host addresses?  Because we are using the first 3 bits for our subnet mask, we can configure them into eight different ways (binary form): 000 001 010 011 100 101 110 111 •We are left with 6 useable network numbers. Subnetting Example
  • 91.
    Network (Subnet) Addresses 12864 32 16 8 4 2 1 Equals Now our 3 bit configurations: 0 0 1 H H H H H 32 0 1 0 H H H H H 64 0 1 1 H H H H H 96 1 0 0 H H H H H 128 1 0 1 H H H H H 160 1 1 0 H H H H H 192 Each of these numbers becomes the Network Address of their subnet...
  • 92.
  • 93.
    host Addresses  Thedevice assigned the first address will receive the first number AFTER the network address shown before. 206.15.143.33 or 32+1 0 0 1 0 0 0 0 1 And the last address in the Network will look like this: 206.15.143.62 0 0 1 1 1 1 1 0 *Remember, we cannot use all “1”s, that is the broadcast address (206.15.143.63)
  • 94.
    Network: Host Range 206.15.143.32206.15.143.33 to 206.15.143.62 206.15.143.64 206.15.143.65 to 206.15.143.94 206.15.143.96 206.15.143.97 to 206.15.143.126 206.15.143.128 206.15.143.129 to 206.15.143.158 206.15.143.160 206.15.143.161 to 206.15.143.190 206.15.143.192 206.15.143.193 to 206.15.143.222 Subnetting Example What are the broadcast addresses ?
  • 95.
    How the computerfinds the Network Address: 206.15.143.89 An address on the subnet 225.225.225.224 The new subnet mask  When the computer does the Logical Bitwise AND Operation it will come up with the following Network Address (or Subnet Address): 11001110.00001111.10001111.01011001= 206.15.143.89 11111111.11111111.11111111.11100000 = 255.255.255.224 11001110.00001111.10001111.01000000 = 206.15.143.64 This address falls on our 2nd Subnet (Network)
  • 96.
  • 97.
    What is Supernetting? Supernetting, also called Classless Inter- Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.  Supernetting is the opposite of Subnetting  In subnetting you borrow bits from the host part  Supernetting is done by borrowing bits from the network side.  And combine a group of networks into one large supernetwork.
  • 98.
  • 100.
    Rules:  The numberof blocks must be a power of 2 (1, 2, 4, 8, 16, . . .).  The blocks must be contiguous in the address space (no gaps between the blocks).  The third byte of the first address in the superblock must be evenly divisible by the number of blocks. In other words, if the number of blocks is N, the third byte must be divisible by N.
  • 104.
    CIDR  CIDR aggregationrequires the network segments involved to be contiguous (numerically adjacent) in the address space  Backbone routers (those that manage traffic between Internet Service Providers) all generally support CIDR to achieve the goal of conserving IP address space  CIDR is supported by BGP4 and based on ro ute aggregation
  • 107.
    Supernetting Sample  Anorganization with 4 class C addresses 193.0.32.0 , 193.0.33.0 , 193.0.34.0 , 193.0.35.0 11111111 11111111 11111100 00000000 mask 255.255.252.0 11000001 00000000 00100000 00000000 net 193.0.32.0 11000001 00000000 00100001 00000000 net 193.0.33.0 11000001 00000000 00100010 00000000 net 193.0.34.0 11000001 00000000 00100011 00000000 net 193.0.35.0 Bit wise AND results 193.0.32.0: 11000001 00000000 00100 000 00000000 written as 193.0.32.0/22  This organization’s network has changed from 4 nets to a single net with 1022 hosts
  • 108.
    Comparison of subnet,default, and supernet masks
  • 109.
    Mapping IP Addressesto Hardware Addresses  IP Addresses are not recognized by hardware.  If we know the IP address of a host, how do we find out the hardware address ?  The process of finding the hardware address of a host given the IP address is called Address Resolution Address Resolution
  • 110.
    Reverse Address Resolution The process of finding out the IP address of a host given a hardware address is called Reverse Address Resolution Reverse Address Resolution
  • 111.
    ARP  On atypical physical network, such as a LAN, On a typical physical network, such as a LAN, each device on a link is identified by a each device on a link is identified by a physical or station address that is usually physical or station address that is usually imprinted on the NIC. imprinted on the NIC.  The Address Resolution Protocol is used by a The Address Resolution Protocol is used by a sending host when it knows the IP address of sending host when it knows the IP address of the destination but needs the Ethernet address. the destination but needs the Ethernet address.  ARP is a broadcast protocol - every host on ARP is a broadcast protocol - every host on the network receives the request. the network receives the request.  Each host checks the request against it’s IP Each host checks the request against it’s IP address - the right one responds. address - the right one responds.
  • 112.
  • 113.
    113 An ARP requestis broadcast; an ARP reply is unicast. Note: Note:
  • 114.
    114 RARP RARP finds thelogical address for a RARP finds the logical address for a machine that only knows its physical address. machine that only knows its physical address. The RARP request packets are broadcast; the RARP reply packets are unicast.
  • 115.
  • 116.
    TCP/IP Protocol Suite116 DHCP The Dynamic Host Configuration Protocol The Dynamic Host Configuration Protocol (DHCP) provides static and dynamic address (DHCP) provides static and dynamic address allocation that can be manual or automatic. allocation that can be manual or automatic. Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol automates network-parameter assignment to automates network-parameter assignment to network devices from one or more network devices from one or more fault-tolerant DHCP servers. DHCP servers. Even in small networks, DHCP is useful Even in small networks, DHCP is useful because it can make it easy to add new because it can make it easy to add new machines to the network. machines to the network.
  • 117.
    TCP/IP Protocol Suite117 Contd. DHCP When a DHCP-configured client (a computer When a DHCP-configured client (a computer or any other network-aware device) connects to or any other network-aware device) connects to a network, the DHCP client sends a a network, the DHCP client sends a broadcast query requesting necessary information from a query requesting necessary information from a DHCP server. DHCP server. The DHCP server manages a pool of IP The DHCP server manages a pool of IP addresses and information about client addresses and information about client configuration parameters such as configuration parameters such as default gateway, , domain name, the , the DNS servers, other servers such as , other servers such as time servers, and so forth , and so forth
  • 118.
    TCP/IP Protocol Suite118 Contd. DHCP On receiving a valid request, the server On receiving a valid request, the server assigns the computer an IP address, a lease assigns the computer an IP address, a lease (length of time the allocation is valid), and (length of time the allocation is valid), and other IP configuration parameters, such as the other IP configuration parameters, such as the subnet mask and the default gateway. and the default gateway. The query is typically initiated immediately The query is typically initiated immediately after booting, and must complete before the after booting, and must complete before the client can initiate IP-based communication with client can initiate IP-based communication with other hosts. other hosts.
  • 119.
    TCP/IP Protocol Suite119 Contd. DHCP Depending on implementation, the DHCP Depending on implementation, the DHCP server may have three methods of allocating IP- server may have three methods of allocating IP- addresses: addresses: Dynamic allocation Automatic allocation Static allocation
  • 120.
    TCP/IP Protocol Suite120 Dynamic allocation A network administrator assigns a range of IP A network administrator assigns a range of IP addresses to DHCP, and each client computer addresses to DHCP, and each client computer on the LAN has its IP software configured to on the LAN has its IP software configured to request an IP address from the DHCP server request an IP address from the DHCP server during network initialization. during network initialization. The request-and-grant process uses a lease The request-and-grant process uses a lease concept with a controllable time period, concept with a controllable time period, allowing the DHCP server to reclaim (and then allowing the DHCP server to reclaim (and then reallocate) IP addresses that are not renewed reallocate) IP addresses that are not renewed (dynamic re-use of IP addresses). (dynamic re-use of IP addresses).
  • 121.
    TCP/IP Protocol Suite121 Automatic allocation The DHCP server permanently assigns a free The DHCP server permanently assigns a free IP address to a requesting client from the range IP address to a requesting client from the range defined by the administrator. defined by the administrator. This is like dynamic allocation, but the DHCP This is like dynamic allocation, but the DHCP server keeps a table of past IP address server keeps a table of past IP address assignments, so that it can preferentially assign assignments, so that it can preferentially assign to a client the same IP address that the client to a client the same IP address that the client previously had. previously had.
  • 122.
    TCP/IP Protocol Suite122 Static allocation The DHCP server allocates an IP address The DHCP server allocates an IP address based on a table with MAC address/IP address based on a table with MAC address/IP address pairs, which are manually filled in (perhaps by pairs, which are manually filled in (perhaps by a network administrator). a network administrator). Only requesting clients with a MAC address Only requesting clients with a MAC address listed in this table will be allocated an IP listed in this table will be allocated an IP address. address.
  • 123.
    ICMP Internet ControlMessage Protocol  Is one of the protocols of the internet protocol suite.  It is used by network devices, like routers.  When information is transferred over the Internet, computer systems send and receive data using the TCP/IP protocol.  If there is a problem with the connection, error and status messages regarding the connection are sent using ICMP, which is part of the Internet protocol.
  • 124.
    ICMP Internet ControlMessage Protocol  ICMP is a protocol used for exchanging control messages.  ICMP uses IP to deliver messages.  ICMP messages are usually generated and processed by the IP software, not the user process.
  • 125.
    ICMP Internet ControlMessage Protocol  Each ICMP message contains three fields that define its purpose and provide a checksum.  They are TYPE, CODE, and CHECKSUM fields.  The TYPE field identifies the ICMP message, the CODE field provides further information about the associated TYPE field, and the CHECKSUM provides a method for determining the integrity of the message.
  • 126.
    UDP User DatagramProtocol  UDP is a transport-layer protocol  UDP (User Datagram Protocol) is a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol (IP).  UDP uses IP to deliver datagrams to the right host.
  • 127.
    UDP User DatagramProtocol  Unlike TCP, however, UDP does not provide the service of dividing a message into packets (datagrams) and reassembling it at the other end.  Specifically, UDP doesn't provide sequencing of the packets that the data arrives in.  This means that the application program that uses UDP must be able to make sure that the entire message has arrived and is in the right order.
  • 128.
    Ports  UDP/IP usesan abstract destination point called a protocol port.  Ports are identified by a positive integer.  Operating systems provide some mechanism that processes use to specify a port.
  • 129.
    Ports Host A Host AHost B Host B Process Process Process Process Process Process
  • 130.
    UDP  Datagram Delivery Connectionless  Unreliable  Minimal UDP Datagram Format UDP Datagram Format no handshaking between UDP sender, receiver
  • 131.
    TCP Transmission ControlProtocol  TCP is an alternative transport layer protocol supported by TCP/IP.  ensures that a packet has been received by the destination by using acknowledgements and retransmission  TCP provides:  Connection-oriented - applications need to establish a TCP connection prior to transfer. -3-way handshake.
  • 132.
    TCP Transmission ControlProtocol  Reliable  Full-duplex -Both ends can simultaneously read and write  Byte-Stream -Ignores message boundaries
  • 133.
    TCP vs. UDP Q:Which protocol is better ? Q: Which protocol is better ? A: It depends on the application. A: It depends on the application. TCP provides a connection-oriented, reliable TCP provides a connection-oriented, reliable byte stream service (lots of overhead). byte stream service (lots of overhead). UDP offers minimal datagram delivery UDP offers minimal datagram delivery service (as little overhead as possible). service (as little overhead as possible).
  • 134.
  • 135.
  • 136.
    IPv6 Advantages  Virtuallyunlimited addresses  End to end security IPSec Mandate  Improved Mobile IP support  Faster Routing : simplified header  Autoconfiguration for adhoc networks  Co-existence with IPv4

Editor's Notes

  • #94 206.15.143.63 206.15.143.95, .127, .191, .223
  • #136 Larger address space The main feature of IPv6 is the larger address space: addresses in IPv6 are 128 bits long. The larger address space avoids the potential exhaustion of the IPv4 address space without the need for NAT and other devices that break the end-to-end nature of Internet traffic. 128 bits might seem overkill to achieve that goal. However, since IPv6 addresses are plentiful, it is reasonable to allocate addresses in large blocks, which makes administration easier and avoids fragmentation of the address space, which in turn leads to smaller routing tables. The current allocation policies allocate 64 bits of address space to an end-user, and 96 bits or more to an organization. A technical reason for selecting 128-bit for the address length is that since most future network products will be based on 64 bit processors, it is more efficient to manipulate 128-bit addresses. The drawback of the large address size is that IPv6 is less efficient in bandwidth usage, and this may hurt regions where bandwidth is limited. Another advantage of the larger address space is that it makes scanning certain IP blocks for vulnerabilities significantly more difficult than in IPv4, which makes IPv6 more resistant to malicious traffic. [edit] Stateless autoconfiguration of hosts IPv6 hosts can be configured automatically when connected to a routed IPv6 network. When first connected to a network, a host sends a link-local multicast request for its configuration parameters; if configured suitably, routers respond to such a request with a router advertisement packet that contains network-layer configuration parameters. If IPv6 autoconfiguration is not suitable, a host can use stateful autoconfiguration (DHCPv6) or be configured manually. Stateless autoconfiguration is only suitable for hosts; routers must be configured manually or by other means. [edit] Multicast Multicast (both on the local link and across routers) is part of the base protocol suite in IPv6. This is in opposition to IPv4, where multicast is optional. IPv6 multicast is, however, not yet widely deployed across routers. IPv6 does not have a link-local broadcast facility; the same effect can be achieved by multicasting to the all-hosts group with a hop count of one. [edit] Jumbograms In IPv4, packets are limited to 64KiB of payload. When used between capable communication partners, IPv6 has support for packets over this limit, referred to as jumbograms. Use of jumbograms might improve performance over high-throughput networks. [edit] Faster routing By using a simpler and more systematic header structure, IPv6 was supposed to improve the performance of routing. Recent advances in router technology, however, may have made this improvement obsolete. [edit] Performance : Simplified header , No checksum , fragmentation, MTU , fewer fields Network-layer security IPsec, the protocol for IP network-layer encryption and authentication, is an integral part of the base protocol suite in IPv6. It is, however, not yet deployed widely except for securing BGP traffic between IPv6 routers. Network Management Auto configuration Plug-and-Play. Automate network address renumbering DHCP support is mandated – Every host can download their network configurations from a server at startup time Address changes are automated – Stateless ; Routers advertise prefixes that identify the subnet(s) associated with a link ; Hosts generate an "interface token" that uniquely identifies an interface on a subnet ; An address is formed by combining the two. – Stateful ; Clients obtain address and / or configuration from a DHCP server ; DHCP server maintains the database and has a tight control over address assignments. Page 1818 All IP Workshop, IPv6 Advantages, Feb. 2000 www.compaq.com Automatic Renumbering Renumbering IPv6 Hosts is easy Add a new Prefix to the Router Reduce the Lifetime of the old prefix As nodes depreciate the old prefix the new Prefix will start to be used for new connections Renumbering in IPv6 is designed to happen! An end of ISP “lock in”! Improved competition Page 1919 All IP Workshop, IPv6 Advantages, Feb. 2000 www.compaq.com Putting the IT Director back in control IPv6 Address Scope Some addresses are GLOBAL Others are Link or Site LOCAL Addressing Plan also controls network access Configuration Policy Control Stateless Stateful (DHCPv6) Routers Dictate the Configuration Policy Router Managers are “in control” of the network Routers also dictate MTU size for the Link Page 2020 All IP Workshop, IPv6 Advantages, Feb. 2000 www.compaq.com Mobile IPv6 IPv6 Mobility is based on core features of IPv6 The base IPv6 was designed to support Mobility Mobility is not an “Add-on” features – All IPv6 Networks are IPv6-Mobile Ready – All IPv6 nodes are IPv6-Mobile Ready – All IPv6 LANs / Subnets are IPv6 Mobile Ready IPv6 Neighbor Discovery and Address Autoconfiguration allow hosts to operate in any location without any special support No single point of failure (Home Agent) More Scalable : Better Performance Less traffic through Home Link Less redirection / re-routing (Traffic Optimisation) Page 21www.compaq.com The power of IPv6 Security Page 2222 All IP Workshop, IPv6 Advantages, Feb. 2000 www.compaq.com IPv6 - Mandates Security Security features are standardized and mandated All implementations must offer them No Change to applications Authentication (Packet signing) Encryption (Data Confidentiality) End-to-End security Model Protects DHCP Protects DNS Protects IPv6 Mobility Protects End-to-End traffic over IPv4 networks Page 23www.compaq.com Other IPv6 goodies Page 2424 All IP Workshop, IPv6 Advantages, Feb. 2000 www.compaq.com Enables Next Generation Applications IPv6 Flow Labels provide Support for Data Flows Allows Packet Prioritizing Ensures that high priority traffic (voice, data, real-time manufacturing, etc.) is not interrupted by less critical data IPv6 Multicast & Anycast Multicast delivers data simultaneously to all hosts that sign up to receive it – Makes conferencing more efficient Anycast delivers data to one host in the group – Could be used to implement fault tolerant client/server applications more efficiently Page 25www.compaq.com Summary What the future hold? Page 2626 All IP Workshop, IPv6 Advantages, Feb. 2000 www.compaq.com IPv6 Features and Advantages Larger Address Space Efficient and Extensible IP datagram Efficient Route Computation and Aggregation Improved Host and Router Discovery Mandated New Stateless and Stateful Address Autoconfiguration Easy renumbering Mobility support Mandated Security for IP datagrams Page 2727 All IP Workshop, IPv6 Advantages, Feb. 2000 www.compaq.com Is IPv6 part of the future? IPv6 Solves many of the problems caused by the IPv4 success and more... Will the whole Internet get upgraded any time soon? No way! Will bits of IPv6 appear in production use soon? Yes and IPv6 offer useful features for TODAY’s networks Page 28www.compaq.com Questions? Page 29Compaq Computer Corporation © 1999 II. Potential Benefits and Uses of IPv6 II.A. Increased Address Space “The task force ... seeks comment on the potential uses for this greatly expanded pool of addresses.” Before delving into how IPv6 might make use of its increased address space, it is very important to reflect on some key elements of the original IPv4 architecture. All the early papers and practice on the Internet architecture stress that each computer attached to the Internet will have a globally unique IP address. Typical is this passage from Doug Comer's 1988 text on TCP/IP: “Each host on the Internet is assigned a unique 32-bit Internet address that is used in all communication with that host.” (Douglas Comer, Internetworking with TCP/IP: Principles, Protocols, and Architecture, Prentice-Hall, 1988.) Thus, if one speaks of the IPv4 architecture, it is understood that globally unique IP addresses per host is part of that architecture. Further, the applications-level flexibility provided by globally unique addresses helps explain the ongoing vitality of applications innovation within the Internet. If, for example, a hard decision had been made at the outset of the Internet that some hosts would be clients and others would have been servers, then this would have constrained and ultimately weakened the early work on voice over IP, on person-to-person chats, and on teleconferencing. The original IPv4 address space cannot sustain the original IP addressing architecture, given the dramatic growth in the number of devices capable of performing as IP hosts, now or soon Page 2including PDAs, mobile phones, and other appliances. Given this growth in the number of hosts, we must either expand the number of addresses or change the architecture. IPv6 implements the former option, while the widespread deployment of NATs as the solution implements the latter. We therefore argue that the deployment of IPv6 is architecturally conservative, in that it maintains the essence of the Internet architecture in the presence of an increasing number of hosts, while NAT deployment is architecturally radical, in that it changes the essence of the Internet architecture. By taking this architecturally conservative approach, IPv6 retains the ability of the Internet to enjoy its classic strength of applications innovation. While it is difficult to predict exactly what forms future applications innovation might take, a few examples will help. • The new generation of SIP-based interpersonal communications applications, including voice over IP, innovative forms of messaging, presence, and conferencing, make effective use of central servers to allow users to locate each other, but then also makes effective use of direct host-to-host communications in support of the actual communications. This enables applications flexibility and allows for high performance. • Other conferencing applications, such as VRVS, also require direct host-to-host communications and break when either user is placed behind a NAT. • The new Grid computing paradigm supports high-speed distributed computing by allowing flexible patterns of computer-to-computer communications. The performance of such systems would be crippled were it required for servers to be involved in these computer-to-computer communications. The point to be stressed, however, is the difficulty of anticipating such applications. “The task force understands that [NAT and CIDR] have slowed the consumption of available IPv4 addresses. We seek comment on the accuracy of this understanding. ... We seek comment on the effects that NATs may have on network performance and network reliability.” The introduction of CIDR has been useful and architecturally benign. Its success has been moderate and its negative side-effects few. The principles of CIDR are carried forward into IPv6, and thus CIDR specifics do not seem to be key to understanding the importance of IPv6. NATs, however, are another story. As noted above, the widespread deployment of NATs is architecturally radical and interferes with application innovation by removing the ability of one host to initiate direct communication with another host. Instead, all applications must be mediated by a centralserver with a global IP address. Apart from this major negative impact on application innovation, there are other negative impacts on performance and network management. The performance problems stem from the need to change the IP address and port numbers within the IP header and the TCP (or UDP, as appropriate) headers of packets. The resulting complexity will be a difficult-to-diagnose source of performance problems. More dangerously, however, NATs destroy both global addressability (as mention above) and end-to-end transparency, another key Internet architectural principle. According to the principle of end-to-end transparency, all the routers and switches between a pair of communicating hosts simply pass IP packets along and do not modify their contents (apart from decrementing the TTL field of the IP header at each hop along the path). This principle is key to the support for new applications, and it also eases the task of debugging an application between a pair of hosts. When NAT and other middleboxes modify the contents of the packets, it becomes more difficult for applications developers to understand how to get new applications (those not known when the Page 3given middlebox was designed) to work. NAT boxes also break a number of tools, such as ping and traceroute, that depend on adherence to the classic Internet architecture and which are key to diagnosing network problems. Both expert ISP engineers and ordinary users have their time wasted trying to debug network problems either caused by the NAT boxes or made more difficult to diagnose by the NAT boxes. Finally, note that NATs are deployed in a wonderfully incremental manner. This is a kind of strength, but it also makes it difficult to project the picture that will emerge if continued reliance on themcontinues. If IPv6 is not deployed so that our reliance on NATs as the solution to address scaling problems increases, we will begin to cascade NATs behind NATs and may eventually find ourselves one day in a situation like that reported by an ISP engineer from India who recently stated that they connected customers by cascading NATs five deep. The progressive difficulty of diagnosing performance and other network problems in this context will be severe. II.B. Purported Security Improvements While significant, IPv6's strengths in improving security should not be overstated or hyped. Careful distinction needs to be made with respect to several points. • IPsec is important for security. This work will be key to scalable secure communications as the Internet continues to grow and as we continue to rely on it more and more. • IPsec is important both for pure host-to-host and for support by gateways in a variety of ways. • IPv6 was designed to support IPsec and complete implementations of IPv6 will include IPsec. (It should be noted, however, that many current implementations of IPv6 are not technically complete and do not support IPsec. This reflects the current immature state of IPv6 implementations.) • When no NATs are in the path, IPv4 can also provide quite good support for IPsec. Thus, statements of the form “IPv4 supports IPsec almost as well as IPv6 does” are correct. • But when NATs are present in the path, IPv4 will not be able to support IPsec well. Although we expect NATs to be less important in the IPv6 infrastructure, IPv6 NATs are conceivable and, when actually present, they would also defeat support for IPsec. Thus, the key issue is not so much IPv4 vs IPv6 per se, but rather classic IP (either v4 or v6 but without NATs in the path) vs NATted IP. II.C. End User Applications IPv6 provides somewhat better support for changing the address blocks assigned to a set of hosts and, thus, will improve the ease with which address assignment within a site can be maintained. This will result in eventual reduced operational costs and better performance for end hosts with more appropriate address assignments. IP mobility is quite a bit cleaner in an IPv6 context than in an IPv4 context. The number of steps involved is similar, but once achieved the path is more direct than with IPv4. This will help improve end-to-end performance in mobile contexts and will also remove sources of instability in these mobile IP contexts. The IP header in an IPv6 packet contains a flow field that can help provide improved support Page 4QoS. There are many uncertainties here, however, and this advantage should not be overstated. The basic problems are common to both IPv4 and IPv6. Again, in either case, the presence of NATs would complicate deployment of QoS and thus this adds to the broader notion of transparent and globally addressable IP (whether v4 or v6) as far stronger than either in a NATted environment. “some have argued that NATs will not preclude peer-to-peer devices and applications.” For any given such device or application, this statement might possibly be true. Generally, though, two patterns emerge: • The value of the device or application is reduced, since its usefulness requires such a workaround, and • The workaround generally involves adding yet another middlebox or proxy server, thus increasing the complexity and/or cost and also usually reducing the performance and robustness of the application. Thus, while it's hard to argue a negative, the apology for NATs here is very weak. The specific problems mentioned will have the general effect of inhibiting the development and deployment and use of the devices and applications referred to. II.D. Network Evolution “... some observers have claimed that the increase in address space afforded by IPv6 is the only compelling reason for adopting the new protocol, not the availability of other capabilities. The task force seeks comment on this assertion.” Taken positively, this assertion is true. That is, without undercutting the value of the 'other capabilities' (such as somewhat stronger support for IPsec, IP mobility, address renumbering, and QoS), the deep value of permitting the Internet to grow while retaining the strengths of global addressability and end-to-end transparency at the core of the classic IP architecture must not be underestimated. The real issue is not IPv4 vs IPv6, but IP with transparency vs IP with NATs along almost all paths. II.E. Other Benefits and Uses “... does VoIP represent the kind of application that could drive IPv6 adoption, and if so, how? Will IPv6 improve the performance of VoIP?” As with other points in section II, the issue is not IPv4 vs IPv6, but rather transparent IP vs NATted IP. With classic IP with end-to-end transparency and global addressability, SIP-based VoIP will be able to benefit from servers for the purpose of allowing users to identify and connect to each other, but then, when the actual voice packets begin to flow, those voice packets can go directly from source to destination without needing to go through an intermediate server. And, in this setting, once the voice packets begin to flow, any instability in that intermediate server will not cause the voice flow to fail. Thus, both performance and robustness will benefit. Again, this would be true for either IPv4 or IPv6, provided that no NATs are in the path between the two endpoints. But, of course, the widespread deployment of VoIP would require just the kind of massive increase in the number of IP devices that the limited 32-bit IPv4 address space cannot support. Thus, this becomes de facto a case for IPv6. “We also seek comment on any spectrum management issues that might arise when IPv6-based wireless and hybrid networks are used to support mobile and fixed applications.” Page 5Without giving a complete answer (which would be beyond my scope of expertise), I would point out that VoIP using the IEEE 802.11b 'WiFi' protocols are being experimented on at least one Internet2 member campus, and experience with that will likely help us over time to judge the answers. Note that, even apart from any issues of VoIP, university campuses are ideal places for deploying 802.11b/g in support of laptop and PDA uses. As IPv6 support in these environments begins to emerge, it appears very likely that various forms of VoIP will be explored on our campuses. Finally, it should be stressed that IPv6 is likely to be important internationally. Moreover, since our international colleagues, especially in the Asia/Pacific and the European regions, suffer from address shortage much more than we do, they are moving forward on IPv6 technology development and on IPv6 deployment at a vigorous rate. To the degree that strong IPv6 infrastructure, IPv6-based applications, and content reachable via IPv6 infrastructure is of value in the United States, this should motivate our work on IPv6. It should be noted, at least in passing, that IPv6 developers all over the world have benefitted greatly from IPv6 software development done overseas.