SlideShare a Scribd company logo
1 of 25
INTERNETWORKING
Why : Interconnect External World for Effective Communication
Goal : Make an Communication system
 Seamless, Uniform, General-purpose
 Universal, Hides heterogeneity from user
Heterogeneity Is Inevitable : No single networking technology
best for all needs
Let’s look at how to build an internet from ground up…
By,
Mahendhira kumar.C
3rd ECE-A
JSRGI
INTERCONNECT+NETWORK’s
2
TCP/IP Layers
• Layer 1: Physical
– Basic network hardware
• Layer 2: Network Interface(N2N)
– MAC frame format
– MAC addressing
– Interface between computer and network
• Layer 3: Internet
– Facilities to send packets across
internet composed of multiple routers
• Layer 4: Transport(P2P)
– Transport from an application on one
computer to application on another
• Layer 5: Application(User)
– Everything else
Messages (UDP) or
Streams (TCP)
Application
Transport
Internet
UDP or TCP packets
IP datagrams
Network-specific frame
Message
Layers
Underlying network
Network interface
Howis it possible to send bits across incompatible
LANs and WANs?
Solution: protocol software running on each host and router
smooth's out differences between different networks
Implements an internet protocol (i.e., set of rules) that
governs how hosts and routers should cooperate when
they transfer data from network to network.
TCP/IP is protocol (family) for global IP Internet
Note: TCP/IP layering model replaces the old ISO model
• Typically, packet starts in its LAN. Gateway receives it (broadcast
on LAN to “unknown” destination).
• Gateway sends packet to gateway on the destination network
using its routing table. If it can use the packet’s native protocol,
sends packet directly. Otherwise, tunnels it.
 What happens when large packet
wants to travel through network
with smaller maximum packet
size? Fragmentation(MTU <
datagram)
 HOW :
• Gateways break packets into
fragments; each sent as
separate packet.
• Gateway on the other side have
to reassemble fragments into
original packet.
How internet Works?
Problem’s In internet
Ethernet :1500 Bytes,
FDDI: 4500 Bytes,
PPP : 512 Bytes.
Transparent Fragmentation
Non-Transparent Fragmentation
2 kinds of fragmentation
 Small-packet network transparent to
other subsequent networks.
 Fragments of a packet addressed to
the same exit gateway, where packet
is reassembled.
 All fragments to go through same
gateway
 Only reassemble at destination host.
 Each fragment becomes a separate
packet.
 Thus routed independently.
 Problems : Hosts must reassemble.
Every fragment must carry header
until it reaches destination host.
Internet as Collection of Sub-networks
Internet Protocol -Kahn-Cerf
What is IP (Glue)
• IP stands for Internet Protocol
• Key tool used today to build scalable, heterogeneous internetworks
IP addresses
• Configured, or learned dynamically
• Like a postal mailing address
• Hierarchical name space of 32 bits (e.g., 12.178.66.9)
• Not portable, and depends on where the host is attached
• Used to get a packet to destination IP subnet.
• Another way of thinking of this is that it is unreliable
Work Flow
• Transport layer breaks data streams into datagrams; fragments
transmitted over Internet, possibly being fragmented.
• When all packet fragments arrive at destination, reassembled by network
layer and delivered to transport layer at destination host.
dataIP address of destinationIP address of source
header
up to 64 kilobytes
 IP address identifies the host computer.
 Port number identifies a running
process in the host computer
IP (Internet Protocol) : “Network" layer protocol (H2H) for addressing
Connection-less(Un-Reliable)
TCP (Transmission Control Protocol) : Transport layer (P2P)
Connection-oriented (Reliable)
UDP (User Datagram Protocol) : Transport layer (P2P)
Connection-less(Un-Reliable)
Faster than TCP
Con’d (Internet Protocol)
UDP carries the port numbers of
source and destination, and an
optional checksum, in addition
 Telnet
 Serial Line Internet Protocol (SLIP)
 Point-to-Point Protocol (PPP)
 Simple Mail Transport Protocol (SMTP)
 Simple Network Management Protocol (SNMP)
 File Transfer Protocol (FTP)
 Routing Information Protocol (RIP)
Other Similar Protocol’s :
Packet Delivery Model (Datagram Delivery)
 Connectionless model for data delivery
 Best-effort delivery (unreliable service)
• packets are lost
• packets are delivered out of order
• duplicate copies of a packet are delivered
• packets can be delayed for a long time
Packet Format(IPv6)Packet Format(IPv4)
 Version (4): currently 4
 Hlen (4): number of 32-bit words in
header
 TOS (8): type of service (not widely
used)
 Length (16): number of bytes in this
datagram
 Ident (16): used by fragmentation
 Flags/Offset (16): used by
fragmentation
 TTL (8): number of hops this
datagram has traveled
 Protocol (8): demux key (TCP=6,
UDP=17)
 Checksum (16): of the header only
 DestAddr & SrcAddr (32)
Source address
(128 bits)
Destination address
(128 bits)
Version (4 bits) Traffic class (8 bits) Flow label (20 bits)
Payload length (16 bits) Hop limit (8 bits)Next header (8 bits)
IPv4 : 2^32 ~ 4M-Addresses
IP addresses:128 bits (16 bytes)
IPv6 : 2^128 Addresses
IP addresses:32 bits (4 bytes)
Migration from IPv4
 backward compatibility: IPv6
addresses include IPv4 addresses
 Islands of IPv6 networks, traffic
tunnels though other IPv4 networks
IP ADDRESSES
 IP address formats.
10
 4 Billion IP address: Half are A type, ¼ is B type, and 1/8 is C type.
 Type’s: IPv4: Current, predominant version (32-bit long)
IPv6( IPng): Evolution of IPv4 (16-byte long)
Unused -
IPClassification
• Class A: 128 networks with 16M hosts each.
• Class B: 16,384 networks with 65K hosts each.
• Class C: 2M networks with 256 hosts each.
More than 500K networks connected to the Internet.
Network numbers centrally administered by ICANN.
• Class D: Class D is reserved for multicast addresses
• Class E: It is reserved for future use as a Class E IP address.
Problem: A single A, B, or C address refers to a single
network.
As organizations grow, what happens?
12
Solution=>Sub-netting
• Sub-netting: Add another level to address/routing hierarchy : subnet
• Divide the organization’s (A, B, and C) address space into multiple
“subnets”.
• How? Use part of the host number bits as the “subnet number”.
• Example: Consider a university with 35 departments.
• With a class B IP address, use 6-bit subnet number and 10-bit
host number.
• This allows for up to 64 subnets
each with 1024 hosts.
• For Increases routing efficiency
TunnelingSub-netMask
A B
IPv6 IPv6
IPv6 encapsulated in IPv4 packets
Encapsulators
IPv4 network
 Transition away from address classes
–Enables more conservative allocation of IP addresses
 CIDR notation
– Specify network through combination of
IP + Routing prefix(/n)
– (/n) number of leftmost contiguous bits to be used for the
network mask
 Example: 69.166.48.43/23 IP address Routing prefix
Classless Inter-Domain Routing (CIDR)
Problem: We need to send message to some IP address, but don’t know
what MAC address to send to
ARP : Protocol to query machines on a network for the correct MAC
address
 Broadcasts “Who has IP address: 1.2.3.4”???
 1.2.3.4 should respond “MAC address 00:11:22:33:44:55, for
1.2.3.4”
 So that, System can now correctly address the link layer frame
Security Issue: Attacker can send ARP reply's with wrong address to
“hijack” network traffic!
1=Request
2=Reply
= IPv4
Address Resolution Protocol (ARP)
 Defines a collection of error messages that are sent back to the source host
whenever a router or host is unable to process an IP datagram successfully.
 Protocol to support Network diagnosis/Error reporting/Simple queries
 Can identify sender when an error message occurs:
Internet Control Message Protocol (ICMP)
Packet Format
Question : How do hosts get an IP address, net-mask, routing when they first
join a network?
DHCP :
 DHCP server is responsible for providing configuration information to
hosts.
 There is at least one DHCP server for an administrative domain
Protocol :
 Discovery – client sends broadcast UDP packet asking for an address
lease
 Offer – server will offer a lease for an address
 Request – client a sends acknowledgement that they want to accept the
offer
 Acknowledgement – includes lease configuration information and
duration
Dynamic Host Configuration Protocol (DHCP)
IEEE No. Name Title Reference
802.3 Ethernet CSMA/CD Networks (Ethernet) [IEEE 1985a]
802.4 Token Bus Networks [IEEE 1985b]
802.5 Token Ring Networks [IEEE 1985c]
802.6 Metropolitan Area Networks [IEEE 1994]
802.11 WiFi Wireless Local Area Networks [IEEE 1999]
802.15.1 Bluetooth Wireless Personal Area Networks [IEEE 2002]
802.15.4 ZigBee Wireless Sensor Networks [IEEE 2003]
802.16 WiMAX Wireless Metropolitan Area Networks[IEEE 2004a]
IEEE Version’s
Quiz’s
 For a CIDR address of the form W.X.Y.Z/20, what is the maximum
number of hosts possible in the network?
 Segment it with 5 possible Segments with starting address 22,050. When
9000 bytes are transferred?
 What is the subnet address if the destination IP address is 144.16.34.124
and the subnet mask is 255.255.240.0?
 For an IP address 10.17.5.122 and subnet mask 255.255.128.0, what is
the subnet address? How many hosts per subnet are possible?
 For the subnet mask 255.255.192.0, how many hosts per subnet are
possible?
 Which of the following can be the starting address of a CIDR block that
contains 512 addresses?
144.16.24.128 144.16.75.0
144.16.24.0 144.16.0.0
 Using simple subnets, is it possible to divide a network into unequal sized
subnets?
THANK YOU FOR YOUR ATTENTION…
Questions
...
21
Example: A Sending a Packet to B
How does host A send an IP packet to host B?
A
R
B
A sends packet to R, and R sends packet to B.
22
Host A Decides to Send Through R
• Host A constructs an IP packet to send to B
– Source 111.111.111.111, destination 222.222.222.222
• Host A has a gateway router R
– Used to reach destinations outside of 111.111.111.0/24
– Address 111.111.111.110 for R learned via DHCP
A
R
B
23
Host A Sends Packet Through R
• Host A learns the MAC address of R’s interface
– ARP request: broadcast request for 111.111.111.110
– ARP response: R responds with E6-E9-00-17-BB-4B
• Host A encapsulates the packet and sends to R
A
R
B
24
R Decides how to Forward Packet
• Router R’s adaptor receives the packet
– R extracts the IP packet from the Ethernet frame
– R sees the IP packet is destined to 222.222.222.222
• Router R consults its forwarding table
– Packet matches 222.222.222.0/24 via other adaptor
A
R
B
25
R Sends Packet to B
• Router R’s learns the MAC address of host B
– ARP request: broadcast request for 222.222.222.222
– ARP response: B responds with 49-BD-D2-C7-56-2A
• Router R encapsulates the packet and sends to B
A
R
B

More Related Content

What's hot

What's hot (20)

Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Osi model
Osi modelOsi model
Osi model
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Osi model
Osi modelOsi model
Osi model
 
Iap final
Iap finalIap final
Iap final
 
OSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil ShaikhOSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil Shaikh
 
Osi model
Osi modelOsi model
Osi model
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
Protocol
ProtocolProtocol
Protocol
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Bhargavi osi
Bhargavi osiBhargavi osi
Bhargavi osi
 
Osi model
Osi modelOsi model
Osi model
 
53426980 tcp-ip
53426980 tcp-ip53426980 tcp-ip
53426980 tcp-ip
 

Similar to Internetworking

5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxDESTROYER39
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addressesAmandeep Kaur
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial junaidahmedsaba
 
Basic ip and networking ver 3 kl
Basic ip and networking ver 3 klBasic ip and networking ver 3 kl
Basic ip and networking ver 3 klAzhar Ali
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in detailsapel7
 
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptIDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptJayaprasanna4
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 

Similar to Internetworking (20)

Tcp
TcpTcp
Tcp
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
IP Address
IP AddressIP Address
IP Address
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
Hardware9
Hardware9Hardware9
Hardware9
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
 
Basic ip and networking ver 3 kl
Basic ip and networking ver 3 klBasic ip and networking ver 3 kl
Basic ip and networking ver 3 kl
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
I pv4 and ipv6
I pv4 and ipv6I pv4 and ipv6
I pv4 and ipv6
 
Data link layer
Data link layerData link layer
Data link layer
 
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptIDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Internetworking

  • 1. INTERNETWORKING Why : Interconnect External World for Effective Communication Goal : Make an Communication system  Seamless, Uniform, General-purpose  Universal, Hides heterogeneity from user Heterogeneity Is Inevitable : No single networking technology best for all needs Let’s look at how to build an internet from ground up… By, Mahendhira kumar.C 3rd ECE-A JSRGI INTERCONNECT+NETWORK’s
  • 2. 2 TCP/IP Layers • Layer 1: Physical – Basic network hardware • Layer 2: Network Interface(N2N) – MAC frame format – MAC addressing – Interface between computer and network • Layer 3: Internet – Facilities to send packets across internet composed of multiple routers • Layer 4: Transport(P2P) – Transport from an application on one computer to application on another • Layer 5: Application(User) – Everything else Messages (UDP) or Streams (TCP) Application Transport Internet UDP or TCP packets IP datagrams Network-specific frame Message Layers Underlying network Network interface Howis it possible to send bits across incompatible LANs and WANs? Solution: protocol software running on each host and router smooth's out differences between different networks Implements an internet protocol (i.e., set of rules) that governs how hosts and routers should cooperate when they transfer data from network to network. TCP/IP is protocol (family) for global IP Internet Note: TCP/IP layering model replaces the old ISO model
  • 3. • Typically, packet starts in its LAN. Gateway receives it (broadcast on LAN to “unknown” destination). • Gateway sends packet to gateway on the destination network using its routing table. If it can use the packet’s native protocol, sends packet directly. Otherwise, tunnels it.  What happens when large packet wants to travel through network with smaller maximum packet size? Fragmentation(MTU < datagram)  HOW : • Gateways break packets into fragments; each sent as separate packet. • Gateway on the other side have to reassemble fragments into original packet. How internet Works? Problem’s In internet Ethernet :1500 Bytes, FDDI: 4500 Bytes, PPP : 512 Bytes.
  • 4. Transparent Fragmentation Non-Transparent Fragmentation 2 kinds of fragmentation  Small-packet network transparent to other subsequent networks.  Fragments of a packet addressed to the same exit gateway, where packet is reassembled.  All fragments to go through same gateway  Only reassemble at destination host.  Each fragment becomes a separate packet.  Thus routed independently.  Problems : Hosts must reassemble. Every fragment must carry header until it reaches destination host.
  • 5. Internet as Collection of Sub-networks
  • 6. Internet Protocol -Kahn-Cerf What is IP (Glue) • IP stands for Internet Protocol • Key tool used today to build scalable, heterogeneous internetworks IP addresses • Configured, or learned dynamically • Like a postal mailing address • Hierarchical name space of 32 bits (e.g., 12.178.66.9) • Not portable, and depends on where the host is attached • Used to get a packet to destination IP subnet. • Another way of thinking of this is that it is unreliable Work Flow • Transport layer breaks data streams into datagrams; fragments transmitted over Internet, possibly being fragmented. • When all packet fragments arrive at destination, reassembled by network layer and delivered to transport layer at destination host. dataIP address of destinationIP address of source header up to 64 kilobytes  IP address identifies the host computer.  Port number identifies a running process in the host computer
  • 7. IP (Internet Protocol) : “Network" layer protocol (H2H) for addressing Connection-less(Un-Reliable) TCP (Transmission Control Protocol) : Transport layer (P2P) Connection-oriented (Reliable) UDP (User Datagram Protocol) : Transport layer (P2P) Connection-less(Un-Reliable) Faster than TCP Con’d (Internet Protocol) UDP carries the port numbers of source and destination, and an optional checksum, in addition  Telnet  Serial Line Internet Protocol (SLIP)  Point-to-Point Protocol (PPP)  Simple Mail Transport Protocol (SMTP)  Simple Network Management Protocol (SNMP)  File Transfer Protocol (FTP)  Routing Information Protocol (RIP) Other Similar Protocol’s :
  • 8. Packet Delivery Model (Datagram Delivery)  Connectionless model for data delivery  Best-effort delivery (unreliable service) • packets are lost • packets are delivered out of order • duplicate copies of a packet are delivered • packets can be delayed for a long time
  • 9. Packet Format(IPv6)Packet Format(IPv4)  Version (4): currently 4  Hlen (4): number of 32-bit words in header  TOS (8): type of service (not widely used)  Length (16): number of bytes in this datagram  Ident (16): used by fragmentation  Flags/Offset (16): used by fragmentation  TTL (8): number of hops this datagram has traveled  Protocol (8): demux key (TCP=6, UDP=17)  Checksum (16): of the header only  DestAddr & SrcAddr (32) Source address (128 bits) Destination address (128 bits) Version (4 bits) Traffic class (8 bits) Flow label (20 bits) Payload length (16 bits) Hop limit (8 bits)Next header (8 bits) IPv4 : 2^32 ~ 4M-Addresses IP addresses:128 bits (16 bytes) IPv6 : 2^128 Addresses IP addresses:32 bits (4 bytes) Migration from IPv4  backward compatibility: IPv6 addresses include IPv4 addresses  Islands of IPv6 networks, traffic tunnels though other IPv4 networks
  • 10. IP ADDRESSES  IP address formats. 10  4 Billion IP address: Half are A type, ¼ is B type, and 1/8 is C type.  Type’s: IPv4: Current, predominant version (32-bit long) IPv6( IPng): Evolution of IPv4 (16-byte long) Unused -
  • 11. IPClassification • Class A: 128 networks with 16M hosts each. • Class B: 16,384 networks with 65K hosts each. • Class C: 2M networks with 256 hosts each. More than 500K networks connected to the Internet. Network numbers centrally administered by ICANN. • Class D: Class D is reserved for multicast addresses • Class E: It is reserved for future use as a Class E IP address. Problem: A single A, B, or C address refers to a single network. As organizations grow, what happens?
  • 12. 12 Solution=>Sub-netting • Sub-netting: Add another level to address/routing hierarchy : subnet • Divide the organization’s (A, B, and C) address space into multiple “subnets”. • How? Use part of the host number bits as the “subnet number”. • Example: Consider a university with 35 departments. • With a class B IP address, use 6-bit subnet number and 10-bit host number. • This allows for up to 64 subnets each with 1024 hosts. • For Increases routing efficiency
  • 13. TunnelingSub-netMask A B IPv6 IPv6 IPv6 encapsulated in IPv4 packets Encapsulators IPv4 network
  • 14.  Transition away from address classes –Enables more conservative allocation of IP addresses  CIDR notation – Specify network through combination of IP + Routing prefix(/n) – (/n) number of leftmost contiguous bits to be used for the network mask  Example: 69.166.48.43/23 IP address Routing prefix Classless Inter-Domain Routing (CIDR)
  • 15. Problem: We need to send message to some IP address, but don’t know what MAC address to send to ARP : Protocol to query machines on a network for the correct MAC address  Broadcasts “Who has IP address: 1.2.3.4”???  1.2.3.4 should respond “MAC address 00:11:22:33:44:55, for 1.2.3.4”  So that, System can now correctly address the link layer frame Security Issue: Attacker can send ARP reply's with wrong address to “hijack” network traffic! 1=Request 2=Reply = IPv4 Address Resolution Protocol (ARP)
  • 16.  Defines a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully.  Protocol to support Network diagnosis/Error reporting/Simple queries  Can identify sender when an error message occurs: Internet Control Message Protocol (ICMP) Packet Format
  • 17. Question : How do hosts get an IP address, net-mask, routing when they first join a network? DHCP :  DHCP server is responsible for providing configuration information to hosts.  There is at least one DHCP server for an administrative domain Protocol :  Discovery – client sends broadcast UDP packet asking for an address lease  Offer – server will offer a lease for an address  Request – client a sends acknowledgement that they want to accept the offer  Acknowledgement – includes lease configuration information and duration Dynamic Host Configuration Protocol (DHCP)
  • 18. IEEE No. Name Title Reference 802.3 Ethernet CSMA/CD Networks (Ethernet) [IEEE 1985a] 802.4 Token Bus Networks [IEEE 1985b] 802.5 Token Ring Networks [IEEE 1985c] 802.6 Metropolitan Area Networks [IEEE 1994] 802.11 WiFi Wireless Local Area Networks [IEEE 1999] 802.15.1 Bluetooth Wireless Personal Area Networks [IEEE 2002] 802.15.4 ZigBee Wireless Sensor Networks [IEEE 2003] 802.16 WiMAX Wireless Metropolitan Area Networks[IEEE 2004a] IEEE Version’s
  • 19. Quiz’s  For a CIDR address of the form W.X.Y.Z/20, what is the maximum number of hosts possible in the network?  Segment it with 5 possible Segments with starting address 22,050. When 9000 bytes are transferred?  What is the subnet address if the destination IP address is 144.16.34.124 and the subnet mask is 255.255.240.0?  For an IP address 10.17.5.122 and subnet mask 255.255.128.0, what is the subnet address? How many hosts per subnet are possible?  For the subnet mask 255.255.192.0, how many hosts per subnet are possible?  Which of the following can be the starting address of a CIDR block that contains 512 addresses? 144.16.24.128 144.16.75.0 144.16.24.0 144.16.0.0  Using simple subnets, is it possible to divide a network into unequal sized subnets?
  • 20. THANK YOU FOR YOUR ATTENTION… Questions ...
  • 21. 21 Example: A Sending a Packet to B How does host A send an IP packet to host B? A R B A sends packet to R, and R sends packet to B.
  • 22. 22 Host A Decides to Send Through R • Host A constructs an IP packet to send to B – Source 111.111.111.111, destination 222.222.222.222 • Host A has a gateway router R – Used to reach destinations outside of 111.111.111.0/24 – Address 111.111.111.110 for R learned via DHCP A R B
  • 23. 23 Host A Sends Packet Through R • Host A learns the MAC address of R’s interface – ARP request: broadcast request for 111.111.111.110 – ARP response: R responds with E6-E9-00-17-BB-4B • Host A encapsulates the packet and sends to R A R B
  • 24. 24 R Decides how to Forward Packet • Router R’s adaptor receives the packet – R extracts the IP packet from the Ethernet frame – R sees the IP packet is destined to 222.222.222.222 • Router R consults its forwarding table – Packet matches 222.222.222.0/24 via other adaptor A R B
  • 25. 25 R Sends Packet to B • Router R’s learns the MAC address of host B – ARP request: broadcast request for 222.222.222.222 – ARP response: B responds with 49-BD-D2-C7-56-2A • Router R encapsulates the packet and sends to B A R B

Editor's Notes

  1. A network consists of a collection of computers, printers, mobiles and other equipment which is embedded, that is connected together by any of the Networking Topologies and with some interface mechanism. So that they can communicate with each other. A router can interconnect networks that use different technologies, including different media and media access techniques, physical addressing schemes, or frame formats. Multiple incompatible LANs can be physically connected by specialized computers called routers The connected networks are called an internet Internet An International info network linking computers and service providing to it. An internetwork (internet) is an interconnected set of networks Global IP Internet (uppercase “I”) is most famous example of an internet (lowercase “i”) Create ‘‘virtual’’ network Invent: Addressing scheme and Naming scheme Implemented with Protocol software Note: protocol software needed on both hosts and routers
  2. How is it possible to send bits across incompatible LANs and WANs? Solution: protocol software running on each host and router smooth's out differences between different networks Implements an internet protocol (i.e., set of rules) that governs how hosts and routers should cooperate when they transfer data from network to network TCP/IP is protocol (family) for global IP Internet
  3. The IP layer is responsible for sending and receiving packets over a variety of link level protocols. These protocols are diverse and one of the main differences is the size of the MTU (Maximum Transmission Unit) Ex: Ethernet :1500 Bytes, FDDI: 4500 Bytes, PPP : 512 Bytes. Unless we limit our MTU to be the MTU of the smallest supported Data Link protocol we must provide a way of organized fragmentation and re-assembly of larger messages into datagram packets. If a fragment is lost the entire datagram is discarded. Header Fields Differentiates the Un-fragmented and Fragmented Packet or Datagram. restricted length: sufficient buffer storage, reduce hogging
  4. In 1993, the Internet consisted of one backbone (NSFNET) that connected 13 sites via 45 Mbps T3 links. Connecting to the Internet involved connecting one of your routers to a router at a backbone site, or to a regional network that was already connected to the backbone.
  5. Chapter 3 - Internetworking
  6. Chapter 3 - Internetworking
  7. Chapter 3 - Internetworking
  8. Provides naming scheme Defines uniform format for host addresses Each host (and router) is assigned at least one internet address that uniquely identifies it Provides delivery mechanism An internet protocol defines a standard transfer unit (packet) Packet consists of header and payload Header: contains info such as packet size, source and destination addresses Payload: contains data bits sent from source host Encapsulation - key to network messages
  9. 1. Hosts are mapped to a set of 32-bit IP(v4) and 16-bytes IP(v6) addresses : Class structure: A, B, C, now CIDR 2. IP addresses are mapped to set of identifiers called Internet domain names 134.173.42.2 is mapped to www.cs.hmc.edu 128.2.203.164 is mapped to www.cs.cmu.edu 163.118.131.9 (www.fit.edu) 3. Process on one Internet host can communicate with process on another via a connection—IP Address, Port Number
  10. Tunneling : Communicate through an "alien" protocol “Hide” in the payload IPv6 traffic using IPv4 protocols
  11. As the Internet evolved and become more familiar to people it become clear that internet would face several serious scaling problems. These included: exhaustion of class B addresses, routing information overflow and IP address space exhaustion. CIDR is a method to stem the tide of IP address allocation as well as routing table overflow. Basically, CIDR eliminates the concept of class A, B, and C networks and replaces this with a generalized “IP prefix”. The size of the global routing tables have grown very fast in recent years CIDR is a new concept to manage IP networks (/N) number of leftmost contiguous bits to be used for the network mask
  12. ARP announcements: – Host can announce IP or MAC address changes – Detection of conflicts – Gratuitous ARP messages – Basically no security Request – Sender protocol address := target protocol addresses – Sender hardware address := sender hardware address – Target hardware address := FF:FF:FF:FF:FF:FF Reply – Sender protocol address := target protocol addresses – Sender hardware address := target hardware addresses ARP spoofing/ARP cache poisoning – Denial of service attack – Man in the middle attack ARP cache flooding (and also MAC flooding) – ARP table size has often a limit – Older/unused entries can be removed to free space – Some dump switches go into hub mode when table overflows – Can be prevented when switches accept only one MAC address at a time per port ARP Flux