SlideShare a Scribd company logo
1 of 66
CHAPTER 2
Internet Protocols
Some basics
• The term internet is short for “internetworking”
— interconnection of networks with different network access
mechanisms, addressing, different routing techniques, etc.
• An internet
— Collection of communications networks interconnected by layer
3 switches and/or routers
• The Internet - note the uppercase I
— The global collection of individual machines and networks
• IP (Internet Protocol)
— most widely used internetworking protocol
— foundation of all internet-based applications
MTAC MBALE campus 2
Protocols of TCP/IP Protocol
Suite
MTAC MBALE campus 3
Internet Protocol (IP)
• IP provides connectionless (datagram) service
• Each packet treated separately
• Network layer protocol common to all routers
—which is the Internet Protocol (IP)
MTAC MBALE campus 4
Connectionless
Internetworking (General)
• Advantages
—Flexible and robust
• e.g. in case of congestion or node failure, packets find their
way easier than connection-oriented services
—No unnecessary overhead for connection setup
—Can work with different network types
• does not demand too much services from the actual network
• Disadvantage: Unreliable
—Not guaranteed delivery
—Not guaranteed order of delivery
• Packets can take different routes
—Reliability is responsibility of next layer up (e.g. TCP)
MTAC MBALE campus 5
Example Internet Protocol
Operation
MTAC MBALE campus 6
Design Issues
• Routing
• Datagram lifetime
• Fragmentation and re-assembly
• Error control
• Flow control
• Addressing
MTAC MBALE campus 7
Routing
• End systems and routers maintain routing tables
— Indicate next router to which datagram should be sent
— Static
• Tables do not change but may contain alternative routes
— Dynamic
• If needed, the tables are dynamically updated
• Flexible response to congestion and errors
• status reports issued by neighbors about down routers
• Source routing
— Source specifies route as sequential list of routers to be followed
— useful, for example, if the data is top secret and should follow a
set of trusted routers.
• Route recording
— routers add their address to datagrams
— good for tracing and debugging purposes
MTAC MBALE campus 8
Datagram Lifetime
• Datagrams could loop indefinitely
—Not good
• Unnecessary resource consumption
• Transport protocol needs upper bound on datagram life
• Datagram marked with lifetime
—Time To Live (TTL) field in IP
—Once lifetime expires, datagram discarded (not
forwarded)
—Hop count
• Decrement time to live on passing through each router
—Time count
• Need to know how long since last router
• global clock is needed
MTAC MBALE campus 9
Fragmentation and
Re-assembly
• Different maximum packet sizes for different
networks
—routers may need to split the datagrams into smaller
fragments
• When to re-assemble
—At destination
• Packets get smaller as data travel
– inefficiency due to headers
—Intermediate reassembly
• Need large buffers at routers
• All fragments must go through same router
– Inhibits dynamic routing
MTAC MBALE campus 10
IP Fragmentation
• In IP, reassembly is at destination only
• Uses fields in header
— Data Unit Identifier – In order to uniquely identify datagram – all
fragments that belong to a datagram share the same identifier
1. Source and destination addresses
2. Upper protocol layer (e.g. TCP)
3. Identification supplied by that layer
— Data length
• Length of user data in octets (if fragment, length of fragment data)
• Actually header contains total length incl. header but data length can be
calculated
— Offset
• Position of fragment of user data in original datagram (position of the first
byte of the fragment)
• In multiples of 64 bits (8 octets)
— More flag
• Indicates that this is not the last fragment (if this flag is 1)
MTAC MBALE campus 11
Fragmentation Example
MTAC MBALE campus 12
Dealing with Failure
• Reassembly may fail if some fragments get lost
• Need to detect failure to free up the buffers
• One solution: Reassembly time out
—Assign a reassembly lifetime to the first fragment
—If timer expires before all fragments arrive, discard
partial data
MTAC MBALE campus 13
Error Control
• In IP, delivery is not guaranteed
• Router may attempt to inform source if packet
discarded, if possible
— specify the reason of drop, e.g. for time to live
expiration, congestion, bad checksum (error detected)
• Datagram identification needed
• When source receives failure notification, it
—may modify transmission strategy
—may inform high layer protocol
• Note that such a failure notification is not
guaranteed
MTAC MBALE campus 14
Flow Control (in IP layer)
• Allows routers and/or stations to limit rate of
incoming data
• In connectionless systems (such as IP),
mechanisms are limited
• Send flow control packets requesting reduced
flow
—e.g. using source quench packet of ICMP
MTAC MBALE campus 15
Addressing in TCP/IP
port
MTAC MBALE campus 16
Internet Protocol (IP) Version 4
• Part of TCP/IP
—Used by the Internet
• Specifies interface with higher layer
—e.g. TCP
• Specifies protocol format and mechanisms
• RFC 791
—Dated September 1981
—Only 45 pages
• Will (eventually) be replaced by IPv6 (see later)
MTAC MBALE campus 17
IP Services
• Information and commands exchanged across
adjacent layers (e.g. between IP and TCP)
• Primitives (functions to be performed)
—Send
• Request transmission of data unit
—Deliver
• Notify user of arrival of data unit
• Parameters
—Used to pass data and control info
MTAC MBALE campus 18
Parameters (1)
• Source IP address
• Destination IP address
• Protocol
—Recipient e.g. TCP
• Type of Service Indicators
—Specify treatment of data unit during transmission
through networks
• Identification
—Uniquely identifies PDU together with source,
destination IP addresses and user protocol
—Needed for re-assembly and error reporting
MTAC MBALE campus 19
Parameters (2)
• Don’t fragment indicator
—Can IP fragment data?
—If not, may not be possible to deliver
• Time to live (initial TTL value)
• Data length
• Options
• Data from/to upper layer
MTAC MBALE campus 20
Type of Service Indicators
• Requests for service quality
—now different QoS (Quality of Service) mechanisms
are used, but this is out of scope of this course
• Precedence
—8 levels
• Reliability
—Normal or high
• Delay
—Normal or low
• Throughput
—Normal or high
MTAC MBALE campus 21
Options
• Security
—security label - mostly for military applications
• Source routing
• Route recording
• Stream identification
—identifies reserved resources for stream traffic (like
video)
• Timestamping
—added by source and routers
MTAC MBALE campus 22
IPv4 Header
MTAC MBALE campus 23
Header Fields (1)
• Version
— Currently 4
— IP v6 - see later
• Internet header length
— Unit is 32 bit words
— Including options
— minimum 5 (means 20 octets)
• DS (Differentiated Services) and ECN (Explicit
Congestion Notification)
— previously used for “Type of Service”
— now used by (interpreted as) DS and ECN
— DS is for QoS support (that we will not cover)
— we will see the concept of Explicit Congestion Notification later
MTAC MBALE campus 24
Header Fields (2)
• Total length
— of datagram (header + data), in octets
• Identification
— Sequence number
— Used with addresses and user protocol to identify datagram
uniquely
• Flags
— More bit
— Don’t fragment
• Fragmentation offset
• Time to live
• Protocol
— Next higher layer to receive data field at destination
MTAC MBALE campus 25
Header Fields (3)
• Header checksum
—Verified and recomputed at each router
• Source address
• Destination address
• Options
• Padding
—To fill to multiple of 32 bits long
MTAC MBALE campus 26
Data Field
• User (upper layer) data
• any octet length is OK
—But max length of IP datagram (header plus data) is
65,535 octets
MTAC MBALE campus 27
IPv4 Address Formats
• 32 bit global Internet address
• Network part and host part
• All-zero host part identifies the network
• All-one host part means broadcast (limited to current
network)
MTAC MBALE campus 28
IP Addresses - Class A
• Start with binary 0
• 7-bit network - 24-bit host
• All zero
—Special meaning (means “this computer”)
• 01111111 (127) (network part ) reserved for
loopback
—Generally 127.0.0.1 is used
• Range 1.x.x.x to 126.x.x.x
—10.x.x.x is for private networks
• Few networks - many hosts
• All networks have been allocated
MTAC MBALE campus 29
IP Addresses - Class B
• Starts with binary 10
• Range 128.x.x.x to 191.x.x.x
—Second octet is also part of the network id.
• 14-bit network, 16-bit host number
—214 = 16,384 class B addresses
—216 = 65,536 hosts per network
• Actually minus 2 due to network and broadcast addresses
• All networks have been allocated
MTAC MBALE campus 30
IP Addresses - Class C
• Start binary 110
• Range 192.x.x.x to 223.x.x.x
• Second and third octets are also part of network
address
• 221 = 2,097,152 addresses (networks)
• 256 – 2 = 254 hosts per network
• Nearly all allocated
MTAC MBALE campus 31
Some Special IP address forms
Prefix
(network)
Suffix (host) Type & Meaning
all zeros all zeros this computer
(used during
bootstrap)
network address all zeros identifies network
network address all ones broadcast on the
specified network
all ones all ones broadcast on local
network
127 any loopback (for
testing purposes)
MTAC MBALE campus 32
Subnets and Subnet Masks
• Allow arbitrary complexity of internetworked LANs within
organization
— By not having one network class for each LAN within the
organization
— Each such LAN is called a subnet.
• Such a network with several subnets looks like a single
network from the point of view of the rest of internet
• Each subnet is assigned a subnet number
• Host portion of address partitioned into subnet number and
host number
• Local routers route within subnetted network
• Subnet mask indicates which bits are network/subnet number
and which are host number
— Subnet mask must be in the form of several 1's followed by several
0's (total 32 bits) - 111..111000…0
— number of 0's is used to determine the number of hosts in that
subnet (see next example)
MTAC MBALE campus 33
Routing Using Subnets (Example)
Subnet Mask:
255.255.255.224
Addresses start with 192, so class
C addresses. Last octet is for
Subnet number and Host number
224 -> 11100000 in binary last 5
bits are for Host number, previous
3 bits are for Subnet number
Don't forget! All zero host number
identifies the subnet and all ones
is used for broadcast
MTAC MBALE campus 34
Classless Addresses
• Extension of subnet idea to the whole Internet
• Assigning IP numbers at any size together with
a subnet number
• A precaution against exhaustion of IP addresses
• Special notation (CIDR notation)
—network address/number of 1-bits in the mask
—e.g. 128.140.168.0/21
• subnet mask is 255.255.248.0
• Lowest host address?
• Highest host address?
• Using classless addresses to generate several subnetworks will be
explained in lab 4 and you will have a quiz on this.
MTAC MBALE campus 35
Example Network
Configuration
• IP address is the address of a connection (not of
a computer or router)
MTAC MBALE campus 36
ICMP
• Internet Control Message Protocol - RFC 792
— Sister protocol of IP
— All IP implementations should also implement ICMP
• Transfer of (control) messages from routers-to-hosts
and hosts-to-hosts
• Feedback about problems
— e.g. datagram discarded, router’s buffer full
• Some simple applications can be implemented using
ICMP
— e.g. ping
• Read pages 287 – 290 for ICMP related mechanisms
• Encapsulated in IP datagram
— Thus not reliable MTAC MBALE campus 37
ICMP Message Formats
MTAC MBALE campus 38
IP v6 - Version Number
• IP v 1-3 defined and replaced
• IP v4 - current version
• IP v5 - stream protocol
—Connection oriented internet layer protocol
• IP v6 - replacement for IP v4
—Not compatible with IP v4
—During the initial development it was called IPng
(Next Generation)
MTAC MBALE campus 39
Driving Motivation to change IP
• Address space exhaustion
—Two level addressing (network and host) wastes
space
—Growth of networks and the Internet
—Extended use of TCP/IP
• e.g. for POS terminals
• Wireless nodes
• Vehicles
• Current trend: Internet of Things
MTAC MBALE campus 40
IPv6 RFCs
• 1752 - Recommendations for the IP Next
Generation Protocol
• 2460 - Overall specification (December 1998)
• 2373 - Addressing structure
• Several others
MTAC MBALE campus 41
IPv6 Enhancements (1)
• Expanded address space
—128 bit
—6*1023 addresses per square meter on earth!
• Improved option mechanism
—Separate optional headers between IPv6 header and
transport layer PDU
—Some are not examined by intermediate routers
• Improved speed and simplified router processing
—Easier to extend with new options
• Flexible protocol
MTAC MBALE campus 42
IPv6 Enhancements (2)
• Support for resource allocation
—Labeling of packets for particular traffic flow
—Allows special handling
• e.g. real time video
MTAC MBALE campus 43
IPv6 Packet with Extension
Headers
IPv6 header + optional
extension headers
MTAC MBALE campus 44
Extension Headers
• Hop-by-Hop Options
— special options that require hop-by-hop processing
• Routing
— Similar to source routing
• Fragment
— fragmentation and reassembly information
• Authentication
— Integrity and Authentication
• Encapsulating security payload
— Privacy and Confidentiality (plus optional authentication)
• Destination options
— Optional info to be processed at destination node
MTAC MBALE campus 45
IPv6 Header
MTAC MBALE campus 46
IP v6 Header Fields (1)
• Version
— 6 (in binary: 0110)
• DS/ECN
—Previously, Traffic Class (Types of Service)
• Classes or priorities of packet
—Now interpretation is different as discussed in v4
• Flow Label
—Identifies a sequence of packets (a flow) that has
special handling requirements
• Payload length
—Length of all extension headers plus user data
MTAC MBALE campus 47
IP v6 Header Fields (2)
• Next Header
— Identifies type of header
• Extension or next layer up
• Hop Limit
— Remaining number of hops
— As in TTL of IPv4, decremented by one at each router
— Packet discarded if reaches zero
• Source Address
• Destination address
• Longer header but less number of fields
— simplified processing
MTAC MBALE campus 48
Flow Label
• Flow
—Sequence of packets from particular source to
particular destination
—Source desires special handling by routers
—Uniquely identified by source address, destination
address, and 20-bit flow label
• Router's view
—Sequence of packets that share some attributes
affecting how packets handled
• Path, resource allocation, discard needs, security, etc.
—Handling must somehow be arranged a priori
• Negotiate handling ahead of time using a control protocol
(not to be discussed in CS 408)
MTAC MBALE campus 49
Differences Between v4 and v6
Headers
• No header length (IHL) in v6
— main header is of fixed length in v6
• No Protocol info in v6
—next header field will eventually point to the transport
layer PDU
• No fragmentation related fields in v6 base
header
—fragmentation is an extension header
• No checksum in v6
—rely on reliable transmission medium and checksums
of upper and lower layers
• Flow label is part of base header in v6
—it was in the options part in v4
MTAC MBALE campus 50
IPv6 Addresses
• 128 bits long
• Assigned to interface
— An interface may have multiple addresses
• network/host id parts
— arbitrary boundary
— like CIDR addresses in v4
• Multilevel hierarchy
— ISP - Organization - Site - …
— Helps faster routing due to aggregation of IP addresses
• Smaller routing tables and faster lookup
• IPv4 addresses are mapped into v6 addresses
• Three types of address
MTAC MBALE campus 51
Types of address
• Unicast
— an address that is assigned to a single interface
• Anycast
—Set of computers (interfaces) that share a single
address
—Delivered to any one interface
• the “nearest”
• Multicast
—One address for a set of interfaces/computers
—Delivered to all interfaces/computers identified by
that address
MTAC MBALE campus 52
IPv6 Extension Headers
MTAC MBALE campus 53
Hop-by-hop Options
• Next header
• Header extension length
• Options
— Type (8 bits), length (8 bits) , option data (variable size)
• type also says what should router do if it does not recognize the option
— Pad1 / Pad N
• Insert one/N byte(s) of padding into Options area of header
• Ensure header is multiple of 8 bytes
— Jumbo payload (Jumbogram)
• Option data field (32 bits) gives the actual length of packet in octets
– excluding the base IPv6 header
• For packets over 216 -1 = 65,535 octets, we use this option
– up to 232 octets
– for large video packets
— Router alert
• Tells the router that the content of packet is of interest to the router
• Provides support for Resource Reservation Protocol (RSVP)
MTAC MBALE campus 54
Fragment Header
• Fragmentation only allowed at source
• No fragmentation at intermediate routers
• Node must perform path discovery to find
smallest MTU (max. transmission unit) of
intermediate networks
—iterative process
• Source fragments to match MTU
• Otherwise limit to 1280 octets
—1280 is the minimum supported by each network
MTAC MBALE campus 55
Fragment Header Fields
• Next Header
• Fragmentation offset
—as in v4
• More flag
—as in v4
• Identification
—as in v4
MTAC MBALE campus 56
Routing Header
• Source routing method of IPv6
• List of intermediate nodes to be visited
• Next Header
• Header extension length
• Routing type
• Segments left
—i.e. number of nodes still to be visited
MTAC MBALE campus 57
Routing Header
• Type 0 routing
— The only one defined in RFC
2460
• Base header contains the
address of next router
• Router examines the
routing header and
replaces the address in
the base header before
forwarding
Ultimate
destination
address
MTAC MBALE campus 58
Destination Options
• Same format as Hop-by-Hop options header
• RFC 2460 defines Pad 1/Pad N as in hop-by-hop
options header
MTAC MBALE campus 59
Migration to IPv6
• Not an overnight operation
—lots of investments in v4 networking equipment and software
—currently equipment and software are IPv6 compatible
—however, turning the key on synchronously all around the
world is not easy
• isolated v6 islands
—communicating via tunnels
• eventually those islands will get larger and merge
• Specialized networks of small devices with IPv6
addresses
—e.g. a network of sensors that covers a large area for security
protection
MTAC MBALE campus 60
IPv4 and IPv6 Security
• Section 16.6
• IPSec
• Security within the IP level
—so that all upper level applications will be secured
—Integrity, authentication and encryption
• A very brief summary is given next
MTAC MBALE campus 61
IPSec Scope
• Authentication header (AH)
—Authentication and integrity
• Encapsulated Security Payload (ESP)
—encryption + optional (authentication + integrity)
• Key exchange
—Oakley, IKE, ISAKMP
• RFC 2401,2402,2406,2408,2409
MTAC MBALE campus 62
Security Association
• Identifies security relationship between sender
and receiver
• Details are at local databases
MTAC MBALE campus 63
Authentication Header
MTAC MBALE campus 64
ESP Packet
Next Header identifies the first header in the payload
MTAC MBALE campus 65
Transport and Tunnel Modes
• Transport mode
—Protection coverage is the payload of IP packet
• generally headers are not included
—Protection for upper layer protocol
—End to end between hosts
• Tunnel mode
—Protection for the entire IP packet
—Entire packet treated as payload for "outer" IP packet
—No routers examine inner packet
—mostly for router to router connection
—VPNs (Virtual Private Networks) are constructed in
this way
MTAC MBALE campus 66

More Related Content

Similar to Networking and data communication IP.ppt

Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptxitwkd
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxRonoh Kennedy
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptVINAYTANWAR18
 
tcp ip protocols.ppt
tcp ip protocols.ppttcp ip protocols.ppt
tcp ip protocols.pptssuser3acfba
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Comptia Security + Chapter 1 501
Comptia Security           + Chapter 1 501Comptia Security           + Chapter 1 501
Comptia Security + Chapter 1 501AbdulalimBhnsawy
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxPondinesh2
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocolsIUBAT
 
Network_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptxNetwork_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptx20CE112YASHPATEL
 

Similar to Networking and data communication IP.ppt (20)

Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
8 network devices
8 network devices8 network devices
8 network devices
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Internet Protocol Version 4
Internet Protocol Version 4Internet Protocol Version 4
Internet Protocol Version 4
 
Tcpip
TcpipTcpip
Tcpip
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
tcp ip protocols.ppt
tcp ip protocols.ppttcp ip protocols.ppt
tcp ip protocols.ppt
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Dik acn presentation
Dik acn presentationDik acn presentation
Dik acn presentation
 
Comptia Security + Chapter 1 501
Comptia Security           + Chapter 1 501Comptia Security           + Chapter 1 501
Comptia Security + Chapter 1 501
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocols
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Network_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptxNetwork_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptx
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Networking and data communication IP.ppt

  • 2. Some basics • The term internet is short for “internetworking” — interconnection of networks with different network access mechanisms, addressing, different routing techniques, etc. • An internet — Collection of communications networks interconnected by layer 3 switches and/or routers • The Internet - note the uppercase I — The global collection of individual machines and networks • IP (Internet Protocol) — most widely used internetworking protocol — foundation of all internet-based applications MTAC MBALE campus 2
  • 3. Protocols of TCP/IP Protocol Suite MTAC MBALE campus 3
  • 4. Internet Protocol (IP) • IP provides connectionless (datagram) service • Each packet treated separately • Network layer protocol common to all routers —which is the Internet Protocol (IP) MTAC MBALE campus 4
  • 5. Connectionless Internetworking (General) • Advantages —Flexible and robust • e.g. in case of congestion or node failure, packets find their way easier than connection-oriented services —No unnecessary overhead for connection setup —Can work with different network types • does not demand too much services from the actual network • Disadvantage: Unreliable —Not guaranteed delivery —Not guaranteed order of delivery • Packets can take different routes —Reliability is responsibility of next layer up (e.g. TCP) MTAC MBALE campus 5
  • 7. Design Issues • Routing • Datagram lifetime • Fragmentation and re-assembly • Error control • Flow control • Addressing MTAC MBALE campus 7
  • 8. Routing • End systems and routers maintain routing tables — Indicate next router to which datagram should be sent — Static • Tables do not change but may contain alternative routes — Dynamic • If needed, the tables are dynamically updated • Flexible response to congestion and errors • status reports issued by neighbors about down routers • Source routing — Source specifies route as sequential list of routers to be followed — useful, for example, if the data is top secret and should follow a set of trusted routers. • Route recording — routers add their address to datagrams — good for tracing and debugging purposes MTAC MBALE campus 8
  • 9. Datagram Lifetime • Datagrams could loop indefinitely —Not good • Unnecessary resource consumption • Transport protocol needs upper bound on datagram life • Datagram marked with lifetime —Time To Live (TTL) field in IP —Once lifetime expires, datagram discarded (not forwarded) —Hop count • Decrement time to live on passing through each router —Time count • Need to know how long since last router • global clock is needed MTAC MBALE campus 9
  • 10. Fragmentation and Re-assembly • Different maximum packet sizes for different networks —routers may need to split the datagrams into smaller fragments • When to re-assemble —At destination • Packets get smaller as data travel – inefficiency due to headers —Intermediate reassembly • Need large buffers at routers • All fragments must go through same router – Inhibits dynamic routing MTAC MBALE campus 10
  • 11. IP Fragmentation • In IP, reassembly is at destination only • Uses fields in header — Data Unit Identifier – In order to uniquely identify datagram – all fragments that belong to a datagram share the same identifier 1. Source and destination addresses 2. Upper protocol layer (e.g. TCP) 3. Identification supplied by that layer — Data length • Length of user data in octets (if fragment, length of fragment data) • Actually header contains total length incl. header but data length can be calculated — Offset • Position of fragment of user data in original datagram (position of the first byte of the fragment) • In multiples of 64 bits (8 octets) — More flag • Indicates that this is not the last fragment (if this flag is 1) MTAC MBALE campus 11
  • 13. Dealing with Failure • Reassembly may fail if some fragments get lost • Need to detect failure to free up the buffers • One solution: Reassembly time out —Assign a reassembly lifetime to the first fragment —If timer expires before all fragments arrive, discard partial data MTAC MBALE campus 13
  • 14. Error Control • In IP, delivery is not guaranteed • Router may attempt to inform source if packet discarded, if possible — specify the reason of drop, e.g. for time to live expiration, congestion, bad checksum (error detected) • Datagram identification needed • When source receives failure notification, it —may modify transmission strategy —may inform high layer protocol • Note that such a failure notification is not guaranteed MTAC MBALE campus 14
  • 15. Flow Control (in IP layer) • Allows routers and/or stations to limit rate of incoming data • In connectionless systems (such as IP), mechanisms are limited • Send flow control packets requesting reduced flow —e.g. using source quench packet of ICMP MTAC MBALE campus 15
  • 17. Internet Protocol (IP) Version 4 • Part of TCP/IP —Used by the Internet • Specifies interface with higher layer —e.g. TCP • Specifies protocol format and mechanisms • RFC 791 —Dated September 1981 —Only 45 pages • Will (eventually) be replaced by IPv6 (see later) MTAC MBALE campus 17
  • 18. IP Services • Information and commands exchanged across adjacent layers (e.g. between IP and TCP) • Primitives (functions to be performed) —Send • Request transmission of data unit —Deliver • Notify user of arrival of data unit • Parameters —Used to pass data and control info MTAC MBALE campus 18
  • 19. Parameters (1) • Source IP address • Destination IP address • Protocol —Recipient e.g. TCP • Type of Service Indicators —Specify treatment of data unit during transmission through networks • Identification —Uniquely identifies PDU together with source, destination IP addresses and user protocol —Needed for re-assembly and error reporting MTAC MBALE campus 19
  • 20. Parameters (2) • Don’t fragment indicator —Can IP fragment data? —If not, may not be possible to deliver • Time to live (initial TTL value) • Data length • Options • Data from/to upper layer MTAC MBALE campus 20
  • 21. Type of Service Indicators • Requests for service quality —now different QoS (Quality of Service) mechanisms are used, but this is out of scope of this course • Precedence —8 levels • Reliability —Normal or high • Delay —Normal or low • Throughput —Normal or high MTAC MBALE campus 21
  • 22. Options • Security —security label - mostly for military applications • Source routing • Route recording • Stream identification —identifies reserved resources for stream traffic (like video) • Timestamping —added by source and routers MTAC MBALE campus 22
  • 24. Header Fields (1) • Version — Currently 4 — IP v6 - see later • Internet header length — Unit is 32 bit words — Including options — minimum 5 (means 20 octets) • DS (Differentiated Services) and ECN (Explicit Congestion Notification) — previously used for “Type of Service” — now used by (interpreted as) DS and ECN — DS is for QoS support (that we will not cover) — we will see the concept of Explicit Congestion Notification later MTAC MBALE campus 24
  • 25. Header Fields (2) • Total length — of datagram (header + data), in octets • Identification — Sequence number — Used with addresses and user protocol to identify datagram uniquely • Flags — More bit — Don’t fragment • Fragmentation offset • Time to live • Protocol — Next higher layer to receive data field at destination MTAC MBALE campus 25
  • 26. Header Fields (3) • Header checksum —Verified and recomputed at each router • Source address • Destination address • Options • Padding —To fill to multiple of 32 bits long MTAC MBALE campus 26
  • 27. Data Field • User (upper layer) data • any octet length is OK —But max length of IP datagram (header plus data) is 65,535 octets MTAC MBALE campus 27
  • 28. IPv4 Address Formats • 32 bit global Internet address • Network part and host part • All-zero host part identifies the network • All-one host part means broadcast (limited to current network) MTAC MBALE campus 28
  • 29. IP Addresses - Class A • Start with binary 0 • 7-bit network - 24-bit host • All zero —Special meaning (means “this computer”) • 01111111 (127) (network part ) reserved for loopback —Generally 127.0.0.1 is used • Range 1.x.x.x to 126.x.x.x —10.x.x.x is for private networks • Few networks - many hosts • All networks have been allocated MTAC MBALE campus 29
  • 30. IP Addresses - Class B • Starts with binary 10 • Range 128.x.x.x to 191.x.x.x —Second octet is also part of the network id. • 14-bit network, 16-bit host number —214 = 16,384 class B addresses —216 = 65,536 hosts per network • Actually minus 2 due to network and broadcast addresses • All networks have been allocated MTAC MBALE campus 30
  • 31. IP Addresses - Class C • Start binary 110 • Range 192.x.x.x to 223.x.x.x • Second and third octets are also part of network address • 221 = 2,097,152 addresses (networks) • 256 – 2 = 254 hosts per network • Nearly all allocated MTAC MBALE campus 31
  • 32. Some Special IP address forms Prefix (network) Suffix (host) Type & Meaning all zeros all zeros this computer (used during bootstrap) network address all zeros identifies network network address all ones broadcast on the specified network all ones all ones broadcast on local network 127 any loopback (for testing purposes) MTAC MBALE campus 32
  • 33. Subnets and Subnet Masks • Allow arbitrary complexity of internetworked LANs within organization — By not having one network class for each LAN within the organization — Each such LAN is called a subnet. • Such a network with several subnets looks like a single network from the point of view of the rest of internet • Each subnet is assigned a subnet number • Host portion of address partitioned into subnet number and host number • Local routers route within subnetted network • Subnet mask indicates which bits are network/subnet number and which are host number — Subnet mask must be in the form of several 1's followed by several 0's (total 32 bits) - 111..111000…0 — number of 0's is used to determine the number of hosts in that subnet (see next example) MTAC MBALE campus 33
  • 34. Routing Using Subnets (Example) Subnet Mask: 255.255.255.224 Addresses start with 192, so class C addresses. Last octet is for Subnet number and Host number 224 -> 11100000 in binary last 5 bits are for Host number, previous 3 bits are for Subnet number Don't forget! All zero host number identifies the subnet and all ones is used for broadcast MTAC MBALE campus 34
  • 35. Classless Addresses • Extension of subnet idea to the whole Internet • Assigning IP numbers at any size together with a subnet number • A precaution against exhaustion of IP addresses • Special notation (CIDR notation) —network address/number of 1-bits in the mask —e.g. 128.140.168.0/21 • subnet mask is 255.255.248.0 • Lowest host address? • Highest host address? • Using classless addresses to generate several subnetworks will be explained in lab 4 and you will have a quiz on this. MTAC MBALE campus 35
  • 36. Example Network Configuration • IP address is the address of a connection (not of a computer or router) MTAC MBALE campus 36
  • 37. ICMP • Internet Control Message Protocol - RFC 792 — Sister protocol of IP — All IP implementations should also implement ICMP • Transfer of (control) messages from routers-to-hosts and hosts-to-hosts • Feedback about problems — e.g. datagram discarded, router’s buffer full • Some simple applications can be implemented using ICMP — e.g. ping • Read pages 287 – 290 for ICMP related mechanisms • Encapsulated in IP datagram — Thus not reliable MTAC MBALE campus 37
  • 38. ICMP Message Formats MTAC MBALE campus 38
  • 39. IP v6 - Version Number • IP v 1-3 defined and replaced • IP v4 - current version • IP v5 - stream protocol —Connection oriented internet layer protocol • IP v6 - replacement for IP v4 —Not compatible with IP v4 —During the initial development it was called IPng (Next Generation) MTAC MBALE campus 39
  • 40. Driving Motivation to change IP • Address space exhaustion —Two level addressing (network and host) wastes space —Growth of networks and the Internet —Extended use of TCP/IP • e.g. for POS terminals • Wireless nodes • Vehicles • Current trend: Internet of Things MTAC MBALE campus 40
  • 41. IPv6 RFCs • 1752 - Recommendations for the IP Next Generation Protocol • 2460 - Overall specification (December 1998) • 2373 - Addressing structure • Several others MTAC MBALE campus 41
  • 42. IPv6 Enhancements (1) • Expanded address space —128 bit —6*1023 addresses per square meter on earth! • Improved option mechanism —Separate optional headers between IPv6 header and transport layer PDU —Some are not examined by intermediate routers • Improved speed and simplified router processing —Easier to extend with new options • Flexible protocol MTAC MBALE campus 42
  • 43. IPv6 Enhancements (2) • Support for resource allocation —Labeling of packets for particular traffic flow —Allows special handling • e.g. real time video MTAC MBALE campus 43
  • 44. IPv6 Packet with Extension Headers IPv6 header + optional extension headers MTAC MBALE campus 44
  • 45. Extension Headers • Hop-by-Hop Options — special options that require hop-by-hop processing • Routing — Similar to source routing • Fragment — fragmentation and reassembly information • Authentication — Integrity and Authentication • Encapsulating security payload — Privacy and Confidentiality (plus optional authentication) • Destination options — Optional info to be processed at destination node MTAC MBALE campus 45
  • 47. IP v6 Header Fields (1) • Version — 6 (in binary: 0110) • DS/ECN —Previously, Traffic Class (Types of Service) • Classes or priorities of packet —Now interpretation is different as discussed in v4 • Flow Label —Identifies a sequence of packets (a flow) that has special handling requirements • Payload length —Length of all extension headers plus user data MTAC MBALE campus 47
  • 48. IP v6 Header Fields (2) • Next Header — Identifies type of header • Extension or next layer up • Hop Limit — Remaining number of hops — As in TTL of IPv4, decremented by one at each router — Packet discarded if reaches zero • Source Address • Destination address • Longer header but less number of fields — simplified processing MTAC MBALE campus 48
  • 49. Flow Label • Flow —Sequence of packets from particular source to particular destination —Source desires special handling by routers —Uniquely identified by source address, destination address, and 20-bit flow label • Router's view —Sequence of packets that share some attributes affecting how packets handled • Path, resource allocation, discard needs, security, etc. —Handling must somehow be arranged a priori • Negotiate handling ahead of time using a control protocol (not to be discussed in CS 408) MTAC MBALE campus 49
  • 50. Differences Between v4 and v6 Headers • No header length (IHL) in v6 — main header is of fixed length in v6 • No Protocol info in v6 —next header field will eventually point to the transport layer PDU • No fragmentation related fields in v6 base header —fragmentation is an extension header • No checksum in v6 —rely on reliable transmission medium and checksums of upper and lower layers • Flow label is part of base header in v6 —it was in the options part in v4 MTAC MBALE campus 50
  • 51. IPv6 Addresses • 128 bits long • Assigned to interface — An interface may have multiple addresses • network/host id parts — arbitrary boundary — like CIDR addresses in v4 • Multilevel hierarchy — ISP - Organization - Site - … — Helps faster routing due to aggregation of IP addresses • Smaller routing tables and faster lookup • IPv4 addresses are mapped into v6 addresses • Three types of address MTAC MBALE campus 51
  • 52. Types of address • Unicast — an address that is assigned to a single interface • Anycast —Set of computers (interfaces) that share a single address —Delivered to any one interface • the “nearest” • Multicast —One address for a set of interfaces/computers —Delivered to all interfaces/computers identified by that address MTAC MBALE campus 52
  • 53. IPv6 Extension Headers MTAC MBALE campus 53
  • 54. Hop-by-hop Options • Next header • Header extension length • Options — Type (8 bits), length (8 bits) , option data (variable size) • type also says what should router do if it does not recognize the option — Pad1 / Pad N • Insert one/N byte(s) of padding into Options area of header • Ensure header is multiple of 8 bytes — Jumbo payload (Jumbogram) • Option data field (32 bits) gives the actual length of packet in octets – excluding the base IPv6 header • For packets over 216 -1 = 65,535 octets, we use this option – up to 232 octets – for large video packets — Router alert • Tells the router that the content of packet is of interest to the router • Provides support for Resource Reservation Protocol (RSVP) MTAC MBALE campus 54
  • 55. Fragment Header • Fragmentation only allowed at source • No fragmentation at intermediate routers • Node must perform path discovery to find smallest MTU (max. transmission unit) of intermediate networks —iterative process • Source fragments to match MTU • Otherwise limit to 1280 octets —1280 is the minimum supported by each network MTAC MBALE campus 55
  • 56. Fragment Header Fields • Next Header • Fragmentation offset —as in v4 • More flag —as in v4 • Identification —as in v4 MTAC MBALE campus 56
  • 57. Routing Header • Source routing method of IPv6 • List of intermediate nodes to be visited • Next Header • Header extension length • Routing type • Segments left —i.e. number of nodes still to be visited MTAC MBALE campus 57
  • 58. Routing Header • Type 0 routing — The only one defined in RFC 2460 • Base header contains the address of next router • Router examines the routing header and replaces the address in the base header before forwarding Ultimate destination address MTAC MBALE campus 58
  • 59. Destination Options • Same format as Hop-by-Hop options header • RFC 2460 defines Pad 1/Pad N as in hop-by-hop options header MTAC MBALE campus 59
  • 60. Migration to IPv6 • Not an overnight operation —lots of investments in v4 networking equipment and software —currently equipment and software are IPv6 compatible —however, turning the key on synchronously all around the world is not easy • isolated v6 islands —communicating via tunnels • eventually those islands will get larger and merge • Specialized networks of small devices with IPv6 addresses —e.g. a network of sensors that covers a large area for security protection MTAC MBALE campus 60
  • 61. IPv4 and IPv6 Security • Section 16.6 • IPSec • Security within the IP level —so that all upper level applications will be secured —Integrity, authentication and encryption • A very brief summary is given next MTAC MBALE campus 61
  • 62. IPSec Scope • Authentication header (AH) —Authentication and integrity • Encapsulated Security Payload (ESP) —encryption + optional (authentication + integrity) • Key exchange —Oakley, IKE, ISAKMP • RFC 2401,2402,2406,2408,2409 MTAC MBALE campus 62
  • 63. Security Association • Identifies security relationship between sender and receiver • Details are at local databases MTAC MBALE campus 63
  • 65. ESP Packet Next Header identifies the first header in the payload MTAC MBALE campus 65
  • 66. Transport and Tunnel Modes • Transport mode —Protection coverage is the payload of IP packet • generally headers are not included —Protection for upper layer protocol —End to end between hosts • Tunnel mode —Protection for the entire IP packet —Entire packet treated as payload for "outer" IP packet —No routers examine inner packet —mostly for router to router connection —VPNs (Virtual Private Networks) are constructed in this way MTAC MBALE campus 66