Anda di halaman 1dari 55

IP Basics

Rajkumar DE(5ESS) ALTTC, Ghaziabad.


1

Introduction
Standalone computers. Computers in a network. Different applications/services between computers: e-mail, File Transfer, Remote Login, Web Surfing, Network Management, chatting, playing games etc.

Introduction
To achieve interworking between computers & other devices like servers, routers etc the computer is made to work in a hierarchical manner ie it is to work as a layered model. Each layer doing certain functionalities & offering services to its upper layer.

Introduction
International Standard Organisation (ISO) devised a 7 layered model called Open System Interconnection (OSI model)
APPLICATION PRESENTATION SESSION TRANSPORT NETWORK DATA LINK PHYSICAL APPLICATION PRESENTATION SESSION TRANSPORT NETWORK DATA LINK PHYSICAL

Introduction
PHYSICAL LAYER
Physical Characteristics and Type Of Transmission Media Representation Of Bits Data Rate Synchronization Line Configuration Physical Topology Transmission Mode-simplex,half Duplex,full Duplex

Introduction
DATA LINK LAYER
Framing Physical addressing Flow Control Error Control Access control

Introduction
NETWORK LAYER
Logical Addressing Routing

TRANSPORT LAYER
Service point addressing Segmentation and reassembly Connection Control Flow Control Error Control

Introduction
SESSION LAYER
Dialog Control Synchronization-Check points

PRESENTATION LAYER
Translation Encryption Compression

Introduction
APPLICATION LAYER
Network Virtual terminal File transfer,access and management(FTAM) Mail Service Directory services

Introduction
Each computer has this OSI model embedded in it. Whenever any computer wants to communicate with any other computer or entity it will adopt a set of rules agreeable to all the computers & entities in the network. This set of rules is called Protocol. Each layer communicates with its peer layer using a protocol before actual data transfer takes place.
10

Introduction
So we require a stack of protocol called Protocol Suite to effect communication between computers in a network. Different protocol suites are available like: (a) AppleTalk (d) TCP/IP (b) OSI (e) DECnet (c) IPX/SPX (f) XNS
11

IP Protocols
Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can carry even voice/video also over IP protocol and in turn has started challenging the complete monopoly of TDM technology in voice communication.

12

TCP/IP and OSI


OSI is made of seven layers. TCP/IP protocol is made of five layers.
APPLICATION PRESENTATION SESSION APPLICATION

OSI Model

TRANSPORT NETWORK DATA LINK PHYSICAL

TRANSPORT NETWORK DATA LINK PHYSICAL

TCP/IP Model

13

TCP/IP Protocol Suite


A FTP SMTP TELNET HTTP TCP ICMP IGMP IP UDP ARP RARP TFTP NFS SNMP DNS

T N D

Ethernet, Token Ring, FDDI, HDLC, FR, PPP, ATM

Protocols defined by the underlying networks

P
14

Data Encapsulation
Application Data

TPT Layer

TCP Header UDP Header

Data Data

TCP Segment

UDP Message NW Layer IP Header TCP-UDP IP Datagram Data Link Frame Head IP Header TCP-UDP Frame Data Trailer Data

15

IP Header
Octet +0 Octet +1 Octet +2 Octet +3 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

VER

HLEN

TOS DM F F

TOTAL LENGTH FRAGMENT OFFSET

IDENTIFICATION TIME TO LIVE PROTOCOL

HEADER CHECKSUM

SOURCE ADDRESS OF HOST DESTINATION ADDRESS OF HOST PADDING

OPTIONS

16

TYPE OF SERVICE
MSB LSB

4 3

0
0

Precedence Priority Field

Priority

0=Normal, 1=Minimize monetary cost 2=Max relieblity 4=Max Throughput, 8=Minimize delay Precedence 0=Normal and 7=N/W control Most gateways ignore this field
17

TCP Header
Octet +0 Octet +1 Octet +2 Octet +3 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

SOURCE PORT

DESTINATION PORT

SEQUENCE NUMBER ACKNOWLEDGEMENT NUMBER


HELEN

UAP RS F RCS S YI GK HT NN CHECKSUM

WINDOW SIZE URGENT POINTER

OPTIONS AND PADDING


18

UDP Header

Octet +0

Octet +1

Octet +2

Octet +3

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 SOURCE PORT MESSAGE LENGTH DESTINATION PORT CHECKSUM

19

Internet Control Message Protocol


Internet Control Message Protocol is a mechanism used by hosts and routers to send notification of datagram problems back to the sender. Sends error messages only to the source and not to intermediate routers. Sole function is to report problems, not to correct them. ICMP (Ping- Packet Internet Gropher) uses echo/reply to test whether a destination is reachable and responding.
20

Address Resolution Protocol


Address Resolution Protocol is used to translate 32 bits IP addresses to 48 bits Ethernet addresses. A hosts physical address is determined by broadcasting its IP address to all machines. The machine with matching IP address, in broadcast message, sends its hardware address to the machine originating broadcast.

21

ARP Operation
Give me MAC address of 129.1.1.4 Here is my MAC address

129.1.1.1

129.1.1.4

ARP Response Accepted

Request Ignored 129.1.1.2

Request Ignored 129.1.1.3

Thats Me

22

Reverse Address Resolution Protocol Reverse Address Resolution Protocol is used to get the 32 bits Source IP address, knowing the 48 bits Hardware address. It is reverse of ARP, hence named Reverse Address Resolution Protocol. A diskless workstation broadcasts RARPRequest to find its IP Address at the time of boot up.
23

RARP Operation
Give me my IP address RARP Response

Diskless work station

RARP Server

08-00-39-00-2F-AB 223.1.2.1 08-00-39-00-2F-C3 223.1.2.2 223.1.2.3 08-00-10-99-AC-54 08-00-5A-21-A7-22

24

Domain Name System (DNS)


DNS is a mechanism which translates host name to IP address in Internet All the network elements in Internet understand only IP address. To reach a site host name is to be converted to IP address. DNS servers in the Internet search IP address of these host names.
25

Domain Name System (DNS)


DNS Server What is the IP Address of www.Yahoo.com What is the IP Address of www.Yahoo.com DNS Server

Internet User traffic

www.yahoo.com , IP address is 210.212.90.15

www.yahoo.com , IP address is 210.212.90.15

yahoo.com

26

IPv4 Address

32 Bits Network 8 Bits 8 Bits Host 8 Bits 8 Bits

172 . 16

. 122 . 204

27

NAT (Network Address Translation)

Private addressing Public IP Addressing Address translation

28

IPV6
IP version 4 has got 32 bit IP addressing scheme. With the explosive growth of Internet there is a severe shortage of IP addresses as every host on internet should have an IP address. To overcome the shortage of IPV4 IP addresses IPV6 has been designed which has 128 bit IP addressing scheme. To implement IPV6 in the network all IPV4 network elements are to be replaced with IPV6 devices as they are directly not compatible.
29

Routers
Internet can be considered as thousands of routers connected with each other in criss-cross manner. Routers can be deployed by a carrier in the core to create the backbone and the customers routers get connected to the backbone. Customers routers act as gateway for their network.
30

Static - Dynamic Routing


Static/Non Adaptive
Choice of route is computed in advance, off line, and downloaded to the router when network is booted.

Dynamic/Adaptive
Routing decisions change to reflect the changes in topology and/or traffic.

31

Static Routing
Routes to destinations are set up manually. Network reachability is not dependent on the existence and state of the network. Route may be up or down but static routes will remain in the routing tables and traffic would still be sent towards the route. Not suitable for large networks.
32

Default Routing
When a router receives a packet and its table does not contain the network number indicated in the packet, it is forwarded to default router. The default router, too, may have a default route. If there is no route or default route at any stage, the router will send a control message (through ICMP) to the originating station.

33

Dynamic Routing
Routes are learnt via an internal or external routing protocols. Network reachability is dependent on the existence and state of the network. If a router is down, its entry will be deleted from the routing table and traffic to that will not be forwarded. Used to enable routers to build their own routing tables and make appropriate decisions.
34

Routing Protocol
It is a language a router speaks with other routers to share information about the reachability and status of the network. Provides mechanisms for sharing routing information. Allows the routers to communicate with other routers to update and maintain routing tables.
35

Routing Protocol
Routing Protocol messages do not carry end user traffic from network to network. Routing Protocol uses the routed protocol ( e.g. IP)to pass information between routers. RIP & OSPF are Dynamic routing protocols.

36

Representing Distance with Metrics 1. Hop count The Lower the hop count better the path 2. Cost (Automatically or Manually) Slower N/W have
higher cost

3. Bandwidth Packet through slower link might be


faster if desired one is busy

4. Delay 5. Load

37

Modern Computer N/W generally use dynamic routing Protocols. Two Protocols are important 1. Distance Vector Routing Protocol 2. Link State Routing Protocol

38

RIP
1. It employs Distance vector Routing algorithms. 2. Each router maintain a table indicating the best known distance to each destination & the preferred O/G port. 3. You can measure a line by number of hops,error rates,delay etc. 4. RIP treats any number higher than 15 (I.e. 16 as infinity) 5. Regular updates are every 30 seconds.(180 seconds for declaring any router down.)

39

RIP
Drawbacks 1. It lacks support for subnet masking.RIP ver 2 improves the situation has not cured all its problems. 2. The RIP protocol is slow to converge.For a N/W with fast and constant change it might never become stable. 3. Its own protocol traffic bites a significant chunk off the total bandwidth. 4. It limits the N/W size as hop count is Max 1540

Counting to Infinity
10.1.5.0 D 1 10.1.5.0 D UR 10.1.5.0 D 5 10.1.5.0 D 9 10.1.5.0 0 10.1.5.0 UR 10.1.5.0 B 4 10.1.5.0 B 8

C 10.1.4.0 D
10.1.1.0

10.1.5.0 10.1.3.0

A 10.1.2.0 B
10.1.5.0 C 10 10.1.5.0 C 6 10.1.5.0 C UR 10.1.5.0 C 2 10.1.5.0 B 2 and so on up to infinity. 10.1.5.0 A 10.1.5.0 10.1.5.0 10.1.5.0 A D D

7 3 UR 1
41

OSPF OVERVIEW 1. Discover the neighbor & learn their N/W address. 2. Measure the delay or cost to each neighbor. 3. Construct the Packet telling all that just been learnt. 4. Send this Packet to all other routers. 5. Compute the shortest path to every computer .

42

OSPF
OSPF is IGP protocol and its IP datagram is 89 It is link state routing protocol based on SPF algorithm. Each router when it comes live, sends a list of his neighbors to all other routers with Hello packet. Each router must broadcast a Hello packet every 10 seconds. When a router has received information from all other routers it deduces the topology of the N/W with the help of Dijkstra alogrithm to find the least cost path.
43

OSPF operation.
Two routers sharing a common link, if agreed on certain parameters specified in their respective Hello packets, become neighbors Adjacencies are formed between some neighboring routers and depends upon:
Type of routers exchanging hellos Type of network

44

OSPF operation
Link State Advertisements (LSAs) i.e. routers links and their state, are exchanged between adjacent routers Each router receiving an LSA from a neighbor records the LSA in Link State Database and sends a copy of the LSA to all of its other neighbors LSAs are exchanged, until all the routers build identical Link State Databases i.e. the link state databases have been synchronised Frequency of LSA is 30 mts.
45

Every OSPF router maintains 3 tables. 1. Neighbors Table 2. Topology Table 3. Routing Table

46

OSPF
The weights on each link are determined by N/W administrators.Which can have their own reasoning. Three factors are important i.e.Line delay,connection throughput ( for type of service) and N/W connectivity ( how stable a connection is).
For example cost of a 56 kbps line is 108 /56000=1785 Cost of 100MB ethernet is 108 / 100* 106 =1

47

OSPF
It can create separate routing table for each type of service. It supports CIDR and sub netting. When several routes exist,It can create load balance by using both routes intermittently.

48

OSPF
It is open source and offers support for multi-vendor hardware. It supports router authentication before exchange of link state information to avoid malicious users.

49

Radius Server
RAS Support for RADIUS authentication and RADIUS Accounting Irrespective of mode of access (such as Dial-up Internet access,outsourced remote access ,managed VPNs, Broadband etc),it will manage the Authentication of all users/customers- both locally and via proxy RADIUS- and deliver the appropriate level of service to each customer. RADIUS will support interfacing with LDAP authentication, billing and Provisioning systems. based

It will include advanced proxy RADIUS support.It will be able to act as a proxy target server, and can forward proxy requests to other RADIUS servers. 50

Radius Server
It will load balance authentication requests between several SQL(STRUCTURED QUERY LANGUAGE SERVER) or LDAP databases, to eliminate the risk of a single point failure, and increase performance on busy networks.

The RADIUS will generate CDRs for the Billing system and the CDRs will contain the following information The calling IP address allotted by the RADIUS Start Time and Date End Time and Date Volume of data transmitted and port type.
51

LDAP (Directory Server)


Light weight Directory Access Protocol The Directory Server shall support unlimited number of read only consumers for authentication queries. The Directory Server shall support Class of Service and Role based mechanism. The Directory Server shall support Storage of Digital Certificates. The LDAP and RADIUS will be able to handle a customer base of 8 Lakhs assuming a concurrency rate of 40% . The authentication will not take more than 1 sec under the full load.
52

Remote Access Server (RAS)


RAS is a device which allows a customer to access internet through his telephone line by dialing an access code. RAS is an interface between PSTN and Internet. Before allowing the access RAS authenticates the dial up user with the help of RADIUS sever. RAS is having circuit switched interface with PSTN and packet switched interface with Internet.

53

Remote Access Server (RAS)


Internet Node

RAS PSTN E1s or PRI


V

Router Modem LAN Switch Internet

54

55

Anda mungkin juga menyukai