1 chapter 3 internetwork layers networking in the internet age by alan dennis copyright © 2002 john...

72
1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc.

Upload: marjorie-joseph

Post on 15-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

1

Chapter 3Internetwork

Layers

Networking

in the

Internet Age by Alan Dennis

Copyright © 2002 John Wiley & Sons, Inc.

Page 2: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

2

Copyright John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. Adopters of the textbook are granted permission to make back-up copies for their own use only, to make copies for distribution to students of the course the textbook is used in, and to modify this material to best suit their instructional needs. Under no circumstances can copies be made for resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Page 3: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

3

Chapter 3. Learning Objectives

• Be aware of four transport/network layer protocols

• Be familiar with segmenting and linking to the application layer

• Be familiar with reliable delivery

• Be familiar with addressing

• Be familiar with routing

• Understand how TCP/IP works

Page 4: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

4

Chapter 3. Outline• Introduction• Internetwork Protocols

– TCP/IP, IPX/SPX, X.25, Systems Network Architecture

• Transport Layer Functions – Linking to the Application Layer, Packetizing

• Addressing– Assigning Addresses, Address Resolution

• Routing – Types of Routing, Routing Protocols, Multicasting

• TCP/IP Example– Known Addresses + Same Subnet, Known Addresses +

Different Subnet, Unknown Addresses, TCP Connections

Page 5: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

5

Introduction

Page 6: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

6

Introduction: The Network and Transport Layers

• The transport layer is responsible for end-to-end delivery of messages.

• The transport layer sets up virtual circuits (when needed) and is also responsible for segmentation (breaking the message into several smaller pieces) at the sending end and reassembly (reconstructing the original message into a single whole) at the receiving end.

• The network layer is responsible for addressing and routing of the message.

• The network and transport layers also perform encapsulation of message segments from the application layer, passing them down to the data link layer on the sending end and passing them up to the application layer on the receiving end (see Figure 3-1).

Page 7: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

7Figure 3-1 Message transmission using layers

Page 8: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

8

Internetwork Protocols

Page 9: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

9

Transport and Network Layer Protocols

• Currently, the most commonly used protocol suites are:– TCP/IP– IPX/SPX– X.25– SNA

Page 10: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

10

Transmission Control Protocol/Internet Protocol (TCP/IP)

• TCP/IP was created in 1974 by Vint Cerf and Bob Kahn as part of Arpanet, a U.S. Department of Defense networking research project.

• Arpanet has since evolved into the Internet, making TCP/IP the protocol suite used by the Internet.

• Almost 70% of all backbone, metropolitan, and wide area networks use TCP/IP.

• In 1998, TCP/IP surpassed IPX/SPX to become the most common protocol on local area networks.

Page 11: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

11

Transmission Control Protocol (3-2)

• TCP performs packetization (segmentation), that is, breaking up the message into smaller pieces, numbering the segments and reassembling them at the destination end of the transmission.

• TCP also ensures that the segments are reliably delivered.

• TCP segments have a 192 bit (24 byte) header. • Header fields include: source and destination port

identifiers and a packet sequence number used in message reassembly.

Page 12: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

12

Figure 3-2 Transmission Control Protocol packet

Page 13: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

13

Internet Protocol (Figures 3-3 and 3-4)

• IP is responsible for addressing and routing of data packets.

• Two versions in current in use: IPv4 & IPv6.• IPv4: uses a 160 bit (20 byte) header, and 32 bit

addresses. • IPv6 was mainly developed to increase IP address

space due to the huge growth in Internet usage during the 1990s.

• IPv6 uses a 320 bit (40 byte) header and 128 bit addresses.

• Header fields include: source and destination addresses, packet length and packet number.

Page 14: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

14

Figure 3-3 Internet Protocol packet (version 4)

Figure 3-4 Internet Protocol packet (version 6)

Page 15: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

15

Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)

• IPX/SPX was developed by Xerox during the 1970s, IPX/SPX today is mainly used by Novell networks (Novell has since replaced it with TCP/IP, however).

• Similar to TCP/IP: – SPX performs transport layer functions:

packetization, packet numbering, ensuring reliable delivery and packet reassembly.

– IPX performs network layer functions: addressing and routing.

Page 16: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

16

X.25• X.25 was developed by ITU-T for use in wide area

networks.• Seldom used in North America, but has been widely

used in other parts of the world, especially in Europe.• X.25 transport layer protocol, called X.3, performs

packetization.• Packet Layer Protocol (PLP) is the network layer

protocol. It performs routing and addressing. • LAP-B is usually used as the data link layer protocol.• ITU recommends packet size of 128 bytes but X.25

can support packet sizes up to 1024 bytes.

Page 17: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

17

Systems Network Architecture (SNA)

• SNA was developed by IBM in 1974 and used on IBM and IBM-compatible mainframes (such as Amdahl mainframes).

• Based on non-standard proprietary protocols, so it is difficult to integrate with non-SNA networks.

• Routing messages between SNA and non-SNA networks require special equipment (gateways).

• IBM now offers TCP/IP on its networks, so SNA will likely disappear over time.

Page 18: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

18

Transport Layer Functions

Page 19: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

19

Linking to the Application Layer• An important transport layer job is knowing which

application layer program to send a message to. This is done using source and destination port numbers, located in the first two TCP header fields.

• Applications sending outgoing messages give TCP both port numbers. Incoming messages also provide port numbers.

• Port addresses are 2-bytes long. Usually, standard port numbers are used:– Web servers use port number 80– FTP servers use port number 21– Telnet, port number 23– SMTP uses port 25

• Nonstandard port numbers are also possible, but TCP must be specially configured to use them.

Page 20: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

20

Segmenting

• The application layer sees a message as a single block (or stream) of data.

• Another transport layer job is breaking large messages into smaller pieces (segmentation) and putting them back together at the destination (reassembly).

• The transport layer also decides whether to deliver incoming packets as they arrive (as with Web pages) or to wait until the entire message arrives (as with e-mail).

Page 21: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

21

Transmission Efficiency (Fig. 3-5)• Each communications protocol has both

information bytes and overhead bytes.• Information bytes convey the user’s meaning,

such as the URL of a Web page.• Overhead bytes carry control data (such as the

information in a packet’s header). For example, TCP has 24 bytes of overhead, while IPv6 has 40.

• Transmission efficiency is the ratio of the number of information bytes, divided by the total number of bytes per packet (information bytes plus the overhead bytes).

• Fig. 3-5 calculates the transmission efficiency for an HTTP request containing a 15 byte URL (7%).

Page 22: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

22Figure 3-5 Transmission efficiency calculations

Page 23: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

23

Optimal Packet Size (Figure 3-6)

• Throughput is the total number of information bits received per second, after taking into account the overhead bits and the need to retransmit packets containing errors.

• In designing a protocol, there is a trade-off between large and small packets.

• Small packets are less efficient, but are less likely to contain errors and less costly in terms of circuit capacity to retransmit if they contain errors.

• Optimal packet size, shown in Figure 3-6, shows how this tradeoff can be balanced to provide optimal network performance.

Page 24: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

24Fig. 3-6 Packet size effects on throughput

Page 25: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

25

Connection-Oriented Routing• TCP also handles end-to-end routing, such as setting up a

virtual circuit (called connection-oriented routing).• Sending data on a virtual circuit means all packets in a

message follow the same route from source to destination.• The first step in creating a virtual circuit is for the sender to

send a special SYN packet, which requests the virtual circuit and negotiates with the receiver over what packet size to use.

• Following this, the packets are sent one by one in order from source to destination using the continuous ARQ.

• Finally, a special FIN packet is sent by TCP to close the virtual circuit.

• HTTP, SMTP, FTP and Telnet all use TCP-based connection-oriented routing.

Page 26: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

26

Connectionless Routing (UDP)• Sending packets individually without using a virtual circuit

is called connectionless routing.• Each packet is sent independently of one another, routed

separately and can follow different routes and arrive at different times.

• With the TCP/IP, the protocol used for connectionless routing is called User Datagram Protocol (UDP).

• UDP uses only a small packet header (only 8 bytes) that contains only four fields (source port, destination port, message length and header checksum).

• UDP is commonly used by protocols that send small control messages, such as DNS, DHCP, RIP and SNMP (see text for details on these).

Page 27: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

27

Quality of Service

• Some applications, especially real time applications (e.g., voice and video frames), require packets be delivered within a certain period of time in order to produce a smooth, continuous output (e-mail doesn’t require this).

• The timely delivery of packets is called quality of service (QoS). QoS routing defines classes of service, each with a different priority:– Real-time applications get the highest priority– a graphical file for a Web page gets a lower priority – E-mail gets the lowest priority (since it can wait a

relatively long time before being delivered).

Page 28: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

28

Quality of Service Protocols• Asynchronous Transfer Mode (ATM) is a high-speed data

link layer protocol that includes QoS.• The TCP/IP protocol suite also includes protocols that use

QoS routing capability permitting applications to request connections with minimum data transfer rates including:– Resource Reservation Protocol (RSVP), a general purpose real-time

application layer protocol – Real-Time Streaming Protocol (RTSP) for audio-video applications

• In both cases, the application first establishes a virtual connection and then uses the Real-Time Transport Protocol (RTP), which adds a sequence number and a timestamp before sending the packets.

• Because of its small header, RTP uses UDP as its transport layer protocol to send real-time packets.

Page 29: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

29

Reliable Delivery

• Reliable delivery means error detection and correction occurs ensuring that packets are delivered free of errors. TCP is a reliable protocol.

• Most error detection techniques work as follows:– An error detection value is first calculated by the sender

and transmitted along with the data.

– At the receiving end, the error detection value is recalculated and checked against the received value.

– If the two values are the same, the data has been received correctly

– If they differ, however, an error has occurred and the data needs to be sent again.

Page 30: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

30

Checksum Error Detection

• TCP uses a 16 bit checksum calculation on each packet as an error detection value.

• This is done by adding 16 bit pieces of the TCP packet’s user data field together using “ones-complement” arithmetic.

• The checksum value is then placed in the checksum field in the TCP segment’s header.

• Upon receiving the packet, the checksum is recalculated and compared to the received value to see if the data was transmitted error free.

Page 31: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

31

Stop-and-Wait Error Correction

• The Stop-and-Wait acknowledgement system is shown in Figure 3-7.

• First the sender first sends a segment.• If it was received without error, the receiver

sends back an acknowledgement (ACK)• When the sender receives the ACK, it sends

the next segment.• If no ACK is received in a given period of

time, a timeout occurs and the segment is retransmitted by the sender.

Page 32: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

32Figure 3-7 Stop-and-wait error control

Page 33: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

33

Sliding Window Error Correction• In Sliding Window system, the sender

continues sending packets without waiting for the receiver to acknowledge that their correct receipt.

• Sliding window takes less time to send than stop-and-wait.

• Acknowledgements are still sent back by the receiver once they have been processed and include must include a segment number to identify which segment was acknowledged.

Page 34: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

34Figure 3-8 Sliding window error control

Page 35: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

35

Error Handling with Sliding Window• If an error occurs and a segment is discarded, the

receiver sees this because the expected sequence number is not received.

• The receiver then stops sending ACKs. • The sender continues sending segments, but

eventually will timeout on the lost segment and retransmit it.

• Once the receiver receives the missing segment, it sends an ACK for that segment as well as for all the other segments with higher sequence numbers it received.

Page 36: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

36

Sliding Window Flow Control• Flow control means making sure the sending

computer is not transmitting too quickly for the receiver.

• When a TCP connection is opened, sender and receiver agree on a maximum number of unacknowledged segments that can be in transit.

• Once it reaches this maximum, the sender stops sending segments until it receives an ACK. This way, the receiver can control the rate at which it is receiving information.

• The term “sliding window” comes from the technique’s ability to handle the transit of several segments at one time (see Figure 3-9).

Page 37: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

37Figure 3-9 Sliding window flow control

Page 38: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

38

Addressing

Page 39: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

39

Assigning Addresses (Figure 3-10)

• The Internet uses three kinds of addresses: – Application layer addresses (domain names) are assigned by

network managers and placed in configuration files. Some servers have more than one application layer address

– Network layer addresses (IP addresses) are also assigned by network managers, or by programs such as DHCP, and placed in configuration files. Every network on the Internet is assigned a range of possible IP addresses for use on its network

– Data link layer addresses are hardware addresses placed on network interface cards by their manufacturers

• Servers have permanent addresses, clients usually do not.• For a message to travel from sender to receiver, these

addresses must be translated from one type to another. This process is called address resolution.

Page 40: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

40

  Address Type Example Software

Example Address

Application Layer

Web Browser

www.kelley.indiana.edu

Network Layer IP 129.79.127.4

Data Link Layer Ethernet 00-0C-00-F5-03-5A

Figure 3-10 Types of addresses

Page 41: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

41

Internet Addresses• ICANN (Internet Corporation for Assigned Names and

Numbers) manages the assignment of both IP and application layer name space, both directly and through authorized registrars around the world.

• ICANN manages some domains directly (e.g., .com, .org, .net) and authorizes private companies to become domain name registrars in other countries (e.g., .ca, .uk, .hk)

• Application layer and network layer addresses are assigned at the same time and in groups.

• For example, Indiana University uses application layer addresses that end in .indiana.edu and iu.edu and uses IP addresses in the 129.79.x.x range (where x is any number between 0 and 255).

Page 42: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

42

IPv4 Addresses

• IPv4, uses 4 byte (32 bit) addresses which are really strings of 32 binary bits.

• To make IP addresses easier to understand for human readers, dotted decimal notation is used.

• Dotted decimal notation breaks the address into four bytes separated by periods and writes the digital equivalent for each byte.

• An example of an IP address in dotted decimal notation would be: 128.192.56.1

Page 43: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

43

The Need for IPv6 Addressing

• IPv4’s 32 bit addresses correspond to a total of one billion possible addresses.

• Because IP addresses have been allocated in very large groups, giving out many numbers at a time, IPv4 address space has been used up quickly.

• For example, Indiana University was allocated a Class A IP address space which includes 65,000 addresses, many thousands more than the university needed.

• IPv6 uses 128 bit addresses, corresponding to 3.2 x 1038 possible addresses. Given how large a number this is, the problem of using up the huge IPv6 address space will likely not be an issue for some time, if ever.

Page 44: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

44

Subnets (see Figure 3-11)• Computers on the same LAN are usually given IP numbers

with the same prefix, called a subnet. For example: – Computers in a University’s Business school might be given addresses

in the range: 128.192.56.x (where x is between 0 & 255)– While the Computer Science IP addresses could be: 128.192.55.x

• The above subnets are 128.192.56.x and 128.192.55.x, respectively. Subnets can also be assigned addresses that are more or less than eight bits in length.

• If 7 bits were used for a subnet, one subnet could have a range of 128.184.55.1-128 and the other 128.184.55.129-255.

• Subnet masks are used to make it easier to separate the subnet part of the address from the host part. In the 7 bit subnet example above, the subnet mask would be: 255.255.255.128 or, in binary: 11111111.11111111.11111111.10000000

Page 45: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

45Figure 3-11 Address subnets

Page 46: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

46

Dynamic Addressing• In order to efficiently use their IP address space, networks

use dynamic addressing, giving IP addresses to clients when they login to the network and taking them back when they logout.

• This way, a small ISP using dynamic addressing would only to assign 500 IP addresses at a time, even though it has several thousands subscribers in total.

• Two programs are currently in use for this: bootp and Dynamic Host Control Protocol (DHCP).

• Unlike static addressing, where the IP address is typed into a configuration file, with DHCP a client broadcasts a message requesting an IP address when it gets connected to the network.

• IP addresses can also be assigned with a time limit. In that case the client must send a new IP address request when the time limit expires.

Page 47: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

47

Server Name Resolution

• Before a message can be sent from a client, the application layer address (or domain name) of the destination host must first be translated in its corresponding IP address (say, www.yahoo.com into 204.71.200.74). This process is called address resolution.

• If the desired IP address is not in the client’s address table, it uses the Domain Name Service (DNS) to resolve the address.

• DNS works through a group of name servers that maintain databases which contain directories of domain names and their corresponding IP addresses.

• Large organizations maintain their own name servers, but smaller ones use name servers provided by their ISPs.

Page 48: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

48

Domain Name Service (Figure 3-12)• When a client cannot translate a domain name itself, it

sends a DNS request to its local DNS server. Because of only a small amount of information is sent, DNS uses connectionless routing and is sent using UDP.

• That computer either responds by sending a UDP packet back to the client or, if it still doesn’t know the IP address, it sends another UDP packet to the next highest name server in the DNS hierarchy.

• The higher level is usually the DNS server at the top level domain (such as the DNS server for all .edu domains).

• If the name server also doesn’t know the IP address, it sends another UDP packet ahead to another name server, often at the next lower level of the DNS hierarchy.

• This is called recursive DNS resolution. Figure 3-12 shows a case of recursive server name resolution for a client at the University of Toronto and a server at Indiana University.

Page 49: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

49

Figure 3-12 How the DNS

system works

Page 50: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

50

Data Link Layer Address Resolution

• As a message moves across the Internet, it travels from one network segment to another. On each of these segments, it uses data link layer addresses to travel from source to destination.

• When a data link layer destination address is not known, the address resolution protocol (ARP) is used to find it.

• ARP works by broadcasting a message to all computers on a local area network asking which computer has a certain IP address. The host with that address then responds to the ARP broadcast message, sending back its data link layer address.

• The sender then stores this data link layer address in its address table and sends its message to the destination host.

Page 51: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

51

Routing

Page 52: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

52

Routing

• Routing is the process of deciding what path to have a packet take through a network from sender to receiver (Figure 3-13).

• More than one route may be possible, so computers and devices that perform routing must keep tables to make decisions about which path to send packets on to reach a given destination (Figure 3-14).

• Routing decisions on the Internet are usually handled by special purpose devices, called routers, that maintain their own routing tables.

Page 53: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

53Figure 3-13 A typical network

Page 54: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

54Figure 3-14 Example of a Routing Table

Destination Host Next Hop

A A

C C

D A

E E

F E

G C

Page 55: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

55

Types of Routing • With centralized routing, routing decisions are made by

one central computer. Centralized routing can be found on small, mainframe-based networks.

• With decentralized routing (used on the Internet) routing decisions are made independently at each routing node (although routers do exchange information).

• Decentralized routing has two types:– Static routing, typically used on simpler networks, uses

fixed routing tables which are developed by network managers.

– Dynamic routing, in which routing decisions are made dynamically, is based on routing condition information exchanged between routing devices.

Page 56: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

56

Figure 3-15 Internet routing

Page 57: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

57

Dynamic Routing Algorithms

• To date, there have been two important routing algorithms:– Distance Vector which uses the least number of hops to

decide how to route a packet

– Link State which uses a variety of information types and takes into account such factors as congestion and response time to decide how to route a packet.

• Because of its more sophisticated approach, link state routing algorithms have become more popular than distance vector algorithms.

Page 58: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

58

Routing Protocols (Figure 3-16)

• Routing algorithms are implemented using routing protocols that can be either interior or exterior.

• Exterior routing protocols are those operating outside of or between networks. Because there are many more possible routes, exterior routing is far more complex than interior routing. Thus, exterior routing protocols can’t maintain tables of every single route and have to concentrate instead on the main routes only.

• Border Gateway Protocol (BGP) is the exterior routing protocol used on the Internet.

• Routing protocols that operate within a network (called an autonomous system) are called interior routing protocols.

Page 59: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

59

Interior Routing Protocols• Routing Information Protocol (RIP): is the original dynamic distance

vector interior routing protocol commonly used on the Internet. – Computers using RIP broadcast routing tables every minute or so. – Now used on simpler networks.

• Open Shortest Path First (OSPF): is another dynamic interior routing protocol used on the Internet using the link state algorithm. – OSPF has overtaken RIP as the most popular interior routing

protocol on the Internet because of OSPF’s ability to incorporate traffic and error rate measures in its routing decisions.

– OSPF is also less burdensome to the network since it sends updates, not entire routing tables, and only to other routers, rather than broadcasting them.

• Enhanced Interior Gateway Routing Protocol (EIGRP): is another dynamic link state interior routing protocol developed by Cisco. – EIGRP records a route’s transmission capacity, delay time,

reliability and load. – The protocol keeps the routing tables for its neighbors and uses

this information in its routing decisions as well.

Page 60: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

60

Figure 3-16 Routing on the Internet with BGP, OSPF and RIP

Page 61: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

61

TCP/IP Example

Page 62: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

62

Sending Messages using TCP/IP• Every computer using TCP/IP must have four kinds of

network layer addressing information before it can operate:– 1. The computer’s own IP address– 2. Its subnet mask, so it can determine what addresses

are part of its subnet.– 3. The local DNS server’s IP address, so it can

translate application layer addresses into IP addresses– 4. The IP address of the router on its subnet, so it

knows where to route messages going outside its subnet• This information is obtained by the computer from a

configuration file or given to it by a DHCP server.• [Servers also need to know their own application layer

addresses (domain names)].

Page 63: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

63

Technical Focus 3-3: Checking your TCP/IP settings

• You can check the TCP/IP settings of your computer by using the program winipcfg.

• To run it, go to the Start menu, select Run, and type winipcfg. Then click on OK.

• A window similar will appear displaying your current TCP/IP and Ethernet information (see Figure 3-17).

• The displayed information includes:– Ethernet adapter address – IP address– Subnet mask– IP address of the default gateway – IP address of the nearest DNS server– UP address of the DHCP server

Page 64: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

64

Figure 3-17 TCP/IPConfigurationInformation(see technicalfocus 3-17for details)

Page 65: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

65

TCP/IP Example (Figure 3-18)

• Figure 3-18 shows a simple, four LAN network connected together with a backbone network:– Building A’s subnet address is 128.192.98.x– Building B’s subnet address is 128.192.95.x– The backbone’s subnet address is 128.192.254.x– The backbone has the DNS server – The backbone also has the gateway router connecting

the network to the Internet.

• Three possible cases of HTTP requests are:– 1. A Known Address, Same Subnet– 2. A Known Address, Different Subnet– 3. An Unknown Address

Page 66: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

66Figure 3-18 TCP/IP Network Example

Page 67: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

67

Case 1a: An HTTP request to a known address on the same subnet

• A client (128.192.98.130) requests a Web page from the Web server (www1.anyorg.com) on its subnet. In this example, the client also knows the server’s network and data link addresses.

• The client’s application layer program (Web browser) first passes the HTTP packet to the transport layer (TCP).

• TCP then places the HTTP packet into a TCP packet and sends it on to the network layer (IP).

• IP then places the TCP packet into an IP packet, adding the packet’s destination IP address, 128.192.98.53.

• IP also uses its subnet mask to compare the destination address with its own and sees that the destination is on the same subnet as itself.

• IP passes the IP packet to the data link layer, which adds the server’s Ethernet address into its destination address field, and sends the Ethernet frame to the Web server.

Page 68: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

68

Case 1b: An HTTP response to a client on the same subnet

• The Web server receives the Ethernet frame, performs error checking and sends back an ACK.

• The incoming frame is then successively processed by the data link, network, transport and application layers until the HTTP request emerges and is processed by the Web server.

• The Web server sends back an HTTP response which includes the requested Web page.

• The outgoing HTTP response is then processed, with each layer adding it’s header until an Ethernet frame is created and sent back out on the network to the client.

• Finally, at the client, the incoming frame is then processed by each successive layer of the client’s protocol stack until the incoming HTTP request emerges at the application layer and is processed by the client’s Web browser.

Page 69: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

69

Case 2: Known Address, Different Subnet• The first part of sending an HTTP request to a destination on a

different subnet is the same as Case 1.• The first difference occurs when the network layer program

determines that the outgoing packet’s destination IP address is on a different subnet.

• The outgoing frames is then sent to the local subnet’s gateway router which connects the subnet to the backbone.

• When the gateway receives the outgoing frame, it first removes the Ethernet header, then examines the packet’s destination IP address against its routing table.

• Once a routing decision is then made, and the router then builds a new Ethernet frame which gets sent to the destination subnet’s router.

• The destination subnet’s router receives the frame, looks at its destination IP address, places the IP packet in a new Ethernet frame and sends it to its destination Web server.

Page 70: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

70

Case 3: Unknown Address

• Sending a packet to an unknown address means first using DNS to determine the packet’s destination IP address.

• A DNS request-response cycle begins by sending a DNS request using a UDP packet to the local DNS server.

• If the local DNS server knows the destination host’s IP address, it sends a DNS response back to the sender.

• If it doesn’t, it sends a second DNS request to the next highest DNS host, and so on, until the destination host’s IP address is determined (see DNS discussion & Figure 3-12).

• Once the destination IP address has been determined, the process of sending the packet to its destination becomes the same as in the Known Address, Different Subnet case.

Page 71: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

71Figure 3-19 TCP/IP and the network layers

Page 72: 1 Chapter 3 Internetwork Layers Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc

72

End of Chapter 3