Anda di halaman 1dari 110

Introduction to IP

SCTE, Rocky Mountain Chapter November 19, 2009

Suzanne Ewert Ryan Makelky

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Agenda
Introduction to IP Understanding an IP Address g g IP Routing and Networking IP in Cable Networks IP for VoIP, Digital Video Home Networking etc VoIP Video, Networking, etc. IPv6 Fundamentals Conclusion / Q&A

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

What is the Internet Protocol?


Officially named the Internet Protocol Suite Commonly referred to as TCP/IP Suite of protocols which define how devices communicate with each other in an open, non-proprietary manner Facilitates communication between networks and devices of varying underlying technologies (both HW and SW) Provides various Application Level Services
Electronic Mail File Transfer Terminal Emulation Streaming Media World Wide Web Based Services

Isnt unique to the Global (www) Internet; applies to private networks as well
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Why Use the Internet Protocol?


The Internet Protocol is the de facto standard for the Internet Applications can quickly and easily be built upon an IP foundation The Internet Protocol suite is an open specification allowing for interoperability Resources for information related to IP are easy to find

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Internet Protocol Suite History


First packet based switching network was ARPANET packet-based Work began in mid 1970s for an internet technology 1977 1979: 1977-1979: Internet Protocols in current form took shape 1980: Initiation of global Internet (what we have today) 1982: Office of the Secretary of Defense declared TCP/IP y the standard for all military computer networking 1986: National Science Foundation funded an effort to create a wide area backbone network called NSFNET and connected it to ARPANET 2009: Estimated global internet users = 1.7 Billion

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Internet Protocol Suite


OSI Layers Application Presentation Session IPS Layers Internet Protocol Suite FTP, TFTP, TELNET, SMTP, HTTP, DNS, BOOTP, TFTP, SNMP TCP or UDP IP, ARP, ICMP Ethernet, Packet Over SONET, Wireless

Application

Transport Network Data link Physical

Transport Internetwork Network Interface

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

OSI Reference Model


Application

Interacts with user applications, apps outside OSI pp pp Ensures that information sent from one system will be readable by another system. Format, compression Establishes, manages, terminates communication sessions between two hosts. Synchronizes dialogue Implements data transport services that are transparent p p p to upper layers. Flow control, segment/reassemble, mux Provides connectivity between multiple data links, into an internetwork. Logical addresses, best p g path selection How data is formatted for transmission, how access to the network is controlled. Uses physical addresses Specifications for the physical link between systems Cabling, voltage levelsputs bits on the wire
Cisco Confidential

Presentation

Session

Transport p

Network

Data Link

Physical

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Why Layers?
Application pp Presentation Session Transport T 3 Switch Hub
Presentation_ID

7 6 5 4 3 2 1
8

Reduces complexity (one big problem to seven smaller ones) Standardizes interfaces Facilitates modular engineering p Assures interoperable technology Accelerates evolution Simplifies teaching and learning

Router

Network Data Link Physical


Cisco Confidential

2 1
2006 Cisco Systems, Inc. All rights reserved.

Data Encapsulation
HOST A Application Presentation Session Transport Network Data Link Physical
Presentation_ID

HOST B Application
Data

Presentation Session

segment packet
Network Header H d

Transport Header Transport Data Header

Data Data

Transport Network Data Link Physical


9

Frame Frame Network NetworkTransport Transport Data Data Data Data Data Header Header Header Header Header Header

bits

0101101010110001
Cisco Confidential

2006 Cisco Systems, Inc. All rights reserved.

Network Interface Layer


(Physical + Data Link)

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

10

Physical Layer 1: Digital Signaling


1 +
(Manchester Encoding)

Electricity
(voltage) Time

Light

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

11

Physical Layer 1: Cabling


Cable Types yp UTP Thin-net Thick-net Fiber
Single/Multi Mode

Connector Types yp RJ-45 BNC AUI


ST, SC, FC, MIC

V.35 V 35
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

V.35 V 35
Winchester
12

Data Link Layer 2: MAC Address


MAC = Media Access Control Hardware identifier Burned in at time of manufacturing 6 Bytes in length, 12 Hexadecimal ( (Base 16) digits Uniquely identifies devices connected to Ethernet IEEE gives Organizational Unique Identifier, first 3 bytes Identifier Example: Cisco has OUI of 00-00-0c Typical Formats 00-00-0c-12-34-56 0000.0c12.3456 00:00:0c:12:34:56 00 00 0 12 34 56
13

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Data Link Layer 2: MAC Address


24 bits 24 bits

Vendor Code

Serial Number

0000.0c12. 3456
ROM RAM
MAC address: 6 Byte (48 bit), hexadecimal number burned into ROM on a network interface card (NIC), copied into RAM
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

14

Ethernet
Invented by Xerox in Early 1970s Became IEEE Standard in 1980s 1980 s IEEE802.3 and Ethernet Version 2.0 CSMA/CD protocol Ethernet Speeds
Ethernet - 10 Million Bits per Second Fast Ethernet - 100 Million Bits per Second Gigabit Ethernet 1 Billion Bits per Second or 1 Gbps Ten Gi bit Eth T Gigabit Ethernet 10 Billion Bit per S t Billi Bits Second or 10 Gb d Gbps 100 Gigabit Ethernet 100 Billion bps or 100Gbps DRAFT

Why Ethernet?
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

15

Data Link Layer 2: Packet Framing


Ethernet Frame
Frame Frame Network Transport Network Transport Data Data Data Data Data Header Header Header Header Header Header

Preamble

Destination MAC Address

Source MAC Address

Type

CRC

Bytes

Transport Frame = 64 to 1518 Bytes


Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

16

Types of Ethernet Operations

Broadcast
A
Application

B
Application Presentation Session Transport Network Data Link Physical

C
Application Presentation Session Transport Network Data Link Physical

D
Application Presentation Session Transport Network Data Link Physical

Multicast Unicast

Presentation Session Transport Network Data Link Physical

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

17

Ethernet Broadcast

A
Application Presentation Session Transport Network Data Link Physical

B
Application Presentation Session Transport Network Data Link Physical

C
Application Presentation Session Transport Network Data Link Physical

D
Application Presentation Session Transport Network Data Link Physical

All end points receive packets


Broadcast Address = FFFF.FFFF.FFFF

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

18

Ethernet Multicast

A
Application Presentation Session Transport Network Data Link Physical

B
Application Presentation Session Transport Network Data Link Physical

C
Application Presentation Session Transport Network Data Link Physical

D
Application Presentation Session Transport Network Data Link Physical

Only subscribed end points receive packets

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

19

Ethernet Unicast

A
Application Presentation Session Transport Network Data Link Physical

B
Application Presentation Session Transport Network Data Link Physical

C
Application Presentation Session Transport Network Data Link Physical

D
Application Presentation Session Transport Network Data Link Physical

Each packet is destined for one end point

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

20

What Is a Virtual LAN (VLAN)?


A logical grouping of networked devices based on a Layer 2 broadcast/multicast domain VLAN members can be created based on Layer 2 through Layer 7 characteristics Port MAC address Network address User ID Inter-VLAN communication is done through routing Benefits: y Ensure scalability Firewall broadcast/multicasts Improve network performance Enhance network security Reduce administration expenses Offer versatile server connectivity
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

VLAN Membership

OSI Model
Application Presentation Session Transport T t Network Data Link Physical

VLANs

21

Inter VLAN Inter-VLAN Forwarding

Router
Bridge Function Bridge Function

Router

Switch

Switch

Ports grouped together in a virtual bridge Traffic between VLANs must be routed
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

22

Agenda
Introduction to IP Understanding an IP Address g g IP Routing and Networking IP in Cable Networks IP for VoIP, Digital Video Home Networking etc VoIP Video, Networking, etc. IPv6 Fundamentals Conclusion / Q&A

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

23

Internetwork Layer

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

24

Network Addressing
Every network device must be uniquely addressed, using both a network and host identifier

A
1 Network ID
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Host ID

A.1 A1
Unique Device Address
25

IP Addressing
IPv4 uses a 32 bit long address (4 Bytes) to denote g ( y ) a unique network/host device identifier 32 bits
bit

1100 0000 1010 1000 0001 0001 0000 0001


Byte

4 Bytes

192 . 168 . 17 . 1
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

26

Binary Notation
bit position

? ? ? ? _ _ _ _
128 64 32 16

7 6

5 4

? ? ? ? _ _ _ _
8 4 2 1
decimal value

2 1

Decimal value is derived from the relative binary bit position

0 0 0 0
or or or or

0 0 0 0
or or or or

1 1 1 1 _ _ _ _ 1 0 _ 1 _ _ 0 _
128 64 32 16 128
Presentation_ID

1 1 1 1 _ _ _ _ 0 0 1 0 _ _ _ _
8 4 + 2 1 2
Cisco Confidential

Each bit position may contain a single binary value of 0 or 1

= 146

16

Binary 1 indicates the p value in a bit position. Binary 0 indicates no value.


27

2006 Cisco Systems, Inc. All rights reserved.

Decimal Notation

0 0 0 0 _ _ _ _
128 64 32 16

0 0 0 0 _ _ _ _
8 4 2 1

=0

1 1 1 1 _ _ _ _
128 64 32 16

1 1 1 1 _ _ _ _
8 4 2 1

= 255

0 - 255

0 - 255 0 - 255

0 - 255

1100 0000 . 1010 1000 . 0001 0001 . 0000 0001

192 . 168 . 17 . 1
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

28

IP Address Classes
N = Network Address Byte (assigned by InterNIC/IANA) H = Host Address Byte (assigned by organization)

Class A (start bit 0) = 1 126 * . H . H . H 1-126 Class B (start bits 10) = 128-191 . N . H . H 128 191 Class C (start bits 110) = 192-223 . N . N . H
* IP addresses beginning with 0 and 127 are reserved. IP Add Addresses in the range of 10 H H H 172 16 31 H H and i th f 10.H.H.H, 172.16-31.H.H, d 192.168.x.H are reserved for private use and are not assigned.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

29

IP Address Mask
An address mask tells network devices what portion of p the IP address is the Network designator and what portion is the Host designator
A binary 1 in a bit position indicates Network and binary 0 Host 0 Class A IP Address 0111 1110 . 0000 1010 . 0000 1010 . 0000 0001 = 126 . 10 . 10 . 1
Network Host

1111 0000
Network Host

1111 1111 . 0000 0000 . 0000 0000 . 0000 0000 = 255 . 0 . 0 . 0 Class A Address Mask
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

30

Address Class Mask


All IP addresses have an associated class mask

Class A = 255 . 0 . 0 . 0 Class B = 255 . 255 . 0 . 0 Class C = 255 . 255 . 255 . 0 C

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

31

Class full Class-full Network Addressing


Class-full masks limit the number of addressable Networks and Hosts
Class A Class B Class C

-fewLarge Internetworks Router

-balancedMedium Internetworks Router Router

-manySmall Internetworks Router Router Router

256 N t Networks k 16, 777, 216 Hosts


Presentation_ID 2006 Cisco Systems, Inc. All rights reserved.

65, 65 536 N t Networks k 65, 536 Hosts


Cisco Confidential

16, 777, 16 777 216 N t Networks k 256 Hosts


32

Subnetting
Subnetting IP addresses extends class-full networks IANA Assigned 158 . 50 . x . x = 1 Network / 65, 536 Hosts 65 255 . 255 . 0 . 0
Class-full Mask

Address masks define Network and Host boundaries

255 . 255 . 255 . 0


Subnet Mask

= 256 Networks / 256 Hosts

158 . 50 . 0-255 . x
Subnetted Network Addresses
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

33

Subnetted IP Network
158 . 50 . 0-255 . x
Subnetwork Address Range
158.50.1.1 Internet 158.50.2.1 158.50.2.2

255 . 255 . 255 . 0


Subnetwork Mask
158.50.4.1

158.50.3.1 158.50.3.2

158.50.6.1 158.50.7.1

158.50.8.1

158.50.6.2

158.50.7.2

158.50.8.2 158.50.4.2

158.50.5.2 158.50.5.1 158.50.9.1

158.50.9.2
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

34

Address Mask Notation


Three mask notation formats are available, depending on implementation

158 . 150 . 10 . 1
IP Address

255 . 255 . 255 . 0


Dotted-Decimal Mask

IP address with dotted-decimal mask IP address with bitcount mask IP address with hexadecimal mask

158 . 150 . 10 . 1 / 24
IP Address Bit-Count Mask 1111 1111 . 1111 1111 . 1111 1111 . 0000 0000
Twenty Four Twenty-Four (24) bits

158 . 150 . 10 . 1
IP Address

0xFFFFFF00
Presentation_ID

Hexadecimal Mask
2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

35

Addressing Example
172 16 2 160

3
172.16.2.160 255.255.255.192 10101100 11111111 10101100 10101100 10101100 10101100
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved.

00010000 11111111 00010000 00010000 00010000 00010000

00000010 10100000 Host 11111111 11000000 Mask 00000010 10000000 Subnet 00000010 10111111

1 2 4

Broadcast

5
00000010 10000001 First 00000010 10111110 Last

6 7
36

Cisco Confidential

Addressing Example
172 16 2 160

3
172.16.2.160 255.255.255.192 10101100 11111111 10101100 10101100 10101100 10101100 00010000 11111111 00010000 00010000 00010000 00010000 00000010 10100000 Host 11111111 11000000 Mask 00000010 10000000 Subnet 00000010 10111111

1 2 4

9
172.16.2.128 172.16.2.191 172 16 2 191 172.16.2.129 172.16.2.190
Presentation_ID

Broadcast

5
00000010 10000001 First 00000010 10111110
Last

6 7
37

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Private IP Address Space - RFC 1918


As defined in RFC 1918

Class A Address - Network 10.0.0.0

Class B Address - Networks 172.16.0.0 to 172.31.0.0

Class C Address - Range from 192.168.1.0 to 192.168.255.0


If you use any of these addresses in your network, then you MUST use address translation if you want to connect to the INTERNET
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

38

Agenda
Introduction to IP Understanding an IP Address g g IP Routing and Networking IP in Cable Networks IP for VoIP, Digital Video Home Networking etc VoIP Video, Networking, etc. IPv6 Fundamentals Conclusion / Q&A

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

39

Interconnecting Networks
Routers connect Layer 2 networks, each d fi d by logical addresses h defined b l i l dd
Data
Frame Header

A
Data
Switch

Data Header

Network

Transport Data Header

MAC
Switch

Layer 2

Router

Layer 2

Frame Header

Network Header

Transport Header

Data

Switch

IP

Layer 2

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

40

Network Interface Addressing


Routed networks require each node have a logical address g

MAC

A.2

A
A.1

Network Address

MAC
A.3

MAC

Router

MAC

A. A4

Node Address

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

41

Routing IP Packets
MAC {
D
? e0 ?

IP
S
A.1

S
MAC

D
C.1 DATA

Workstation knows network C is not local W k t ti directs frame to Workstation di t f t router MAC for processing

Key S = Source Address D = Destination Address

{ A.1
Switch

Switch e0 MAC A.1 C.1 DATA

Addr. C.1

MAC e0

MAC

B
e1 e2
e2 A.1 A1 C.1 C1 DATA

e0 e3
Router
MAC Net Int. e0 e1 e2 2 e3

Switch

A B

Switch

C.1
MAC Addr. A.1 MAC e2

D
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

C D

42

Default Gateway - Default Router


A gateway forwards data from the local (sub) network to another (sub) network

When a IP host needs to communicate with another IP h t on a diff host different IP network t t k i.e. 170.10.0.0 to 192.1.1.0 or a different sub-network i.e. 192.168.1.64 to 192.168.1.128 Data must be forwarded through a gateway THIS FUNCTION IS NORMALLY DONE BY A

ROUTER OR LAYER 3 SWITCH


Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

43

Routing Protocols

The Th procedures used b th router t d t d d by the t to determine and select i d l t the best route and to share information about network reachability and status with other routers are referred to collectively as a routing protocol.
Jeff Doyle y Routing TCP/IP, Volume 1

44

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

What is Routing?
Routing is the process of forwarding a datagram from one hop to the next Routers forward traffic to a logical destination in an internetwork Routers perform two primary functions
Routing share/learn network routes Switching take packets from the inbound interface and send them through the outbound interface

Routers are a fundamental component to the very fabric of the Internet


Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

45

Why are Routers Important?


Separate internetworks into logical entities Maintain Routing information for end stations Dynamically update Routing information as networks become available/unavailable b il bl / il bl Determine the best path for communication through the internetwork

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

46

Why are Routers Important?


As the network topology changes, all routers will update their tables using their chosen out g p otoco (e g OS ) routing protocol. (e.g. OSPF) When a new link from Network make internetworking possible. Routers 5 to Network 6 is established. The routers on Network 5 and 6 will advertise the new route to Network 3. If the link from Network 5 to Network 3 breaks, the routers will update their tables and will choose the next best path which is now through Network 6.
can no longer IIcan now get to reach Network 3 Network 6 directly! directly!

Network N t k1 Network 3

Network 4

Network 5
I can now get to Network 5 directly!

Network 2

Network 6

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

47

Routing Table Information


Most of the necessary information is contained in the routing table O O 172.16.8.0 [100 /118654] 172.16.8.0 [100/118654] via 172.16.7.9, 00:00:23, Serial0 -- How the route was learned (OSPF) -- Destination logical network or subnet -- Administrative distance (trustworthinessfactor) -- Metric value (reachability)

via 172.16.7.9 -- Next-hop logical address (next router) 00:00:23 Serial0


Presentation_ID

-- Age of entry (in hours:minutes:seconds) -- Interface through which the route was learned and through which the packet will leave
Cisco Confidential

2006 Cisco Systems, Inc. All rights reserved.

48

Sample Routing Table


Backbone_r1#show Backbone r1#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O- OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS IS L1 - IS IS level 1 L2 - IS IS level-2, * - candidate default IS-IS, IS-IS level-1, IS-IS level 2 Gateway of last resort is 10.5.5.5 to network 0.0.0.0 172.16.0.0/24 is subnetted, 2 subnets C 172.16.10.0 is directly connected, Loopback100 C 172.16.11.0 is directly connected, Loopback101 172 16 11 0 i di tl t d L b k101 O E2 172.22.0.0/16 [110/20] via 10.3.3.3, 01:03:01, Serial1/2 [110/20] via 10.4.4.4, 01:03:01, Serial1/3 [110/20] via 10.5.5.5, 01:03:01, Serial1/4 O E2 192.168.4.0/24 [110/20] via 10.4.4.4, 01:03:01, Serial1/3 O E2 192.168.5.0/24 [110/20] via 10.5.5.5, 01:03:01, Serial1/4 10.0.0.0/24 is 10 0 0 0/24 i subnetted, 4 subnets b tt d b t C 10.5.5.0 is directly connected, Serial1/4 C 10.4.4.0 is directly connected, Serial1/3 C 10.3.3.0 is directly connected, Serial1/2 C 10.1.1.0 is directly connected, Serial1/0 O E2 192.168.3.0/24 [110/20] via 10.3.3.3, 01:03:02, Serial1/2 S* 0.0.0.0/0 0 0 0 0/0 [1/0] via 10 5 5 5 i 10.5.5.5

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

49

Static Routes
Routes configured manually Useful when the number of routes exist is small Can be an administrative burden Frequently used for a default route

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

50

Popular Routing Protocols


RIP (v1, v2) (v1 v2) v1,
Open distance vector protocol standardized in 1988

OSPF
Open link-state protocol standardized in late-1980s by IETF

EIGRP
Proprietary enhancement to Cisco IGRP to include link-state algorithms

BGP
Border Gateway Protocol, used to interconnect Service Providers i t t S i P id
51

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Distance Vector vs Link State Updates


Different ways to send route information Routing Table

Distance Vector Approach

Full Table

Routing Table

Link-State Li k St t Approach

Single Entry

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

52

Additional TCP/IP Protocols


Protocol
IP (Internet Protocol) ARP (Address Resolution Protocol) ICMP (Internet Control Message Protocol) TCP (Transmission Control Protocol) UDP (User Datagram Protocol)

Function
Internet Addressing

Maps Layer 2 MAC Address to Layer 3 IP Address Control Protocol for Internetwork Management Connection-Oriented Data Transport p Connectionless Data Transport

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

53

Address Resolution Protocol (ARP)


Resolving between Layer 2 and Layer 3 address

A
MAC A. 2

MAC
{

IP
{

D S S D ? e0 C.1 A.4 DATA MAC A. 3 D FF e0 A.4 DATA e0 A. 1 S e0 MAC A.4 DATA A. 4


I heard that broadcast. The message is for me. Here is my MAC address.
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

I need the

Router

Ethernet address of A.4

Addr. MAC C.1 e0

MAC MAC

Addr. MAC A.4 MAC A.3 ? A.2 ?

54

Proxy ARP
Resolving L R l i Layer 2 and L d Layer 3 addresses b dd between networks k

A Addr. B.1 MAC e0 e0 Router e1 ARP

B Addr. A.1 MAC e1

MAC

Broadcast

MAC e0

B.1

A.1 DATA

e1 MAC B.1

A.1 DATA

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

55

Internet Control Message Protocol - ICMP


IP protocol number 1 Used for troubleshooting p g Error Reporting Mechanism Notifies Hosts and Routers of presence and type of errors

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

56

Ping
Packet InterNet Groper Check end-to-end network connectivity Baseline network layer performance Depending on implementation can indicate:
Host Alive Roundtrip Delay

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

57

Time To Live - TTL


Mechanism to prevent loops in an IP Network Originating host sets the initial TTL value Intermediate hops, i.e. routers, decrement the TTL value b 1 l by When TTL expires:
- The packet is dropped - An ICMP report is sent back to the source

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

58

TTL

Host 1 TTL = 10
10.1.1.1

Host 2
20.1.1.1

TTL = 9

TTL = 6

TTL = 8
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

TTL = 7
59

TTL

Host 1 TTL = 10
10.1.1.1

Host 2
20.1.1.1

TTL = 9TTL = 0

TTL = 6

Introduce a loop with broken routing

TTL = 8
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

TTL = 7
60

Traceroute
Used to determine path through a network between two endpoints Uses the IP Time To Live (TTL) field Initiated via Echo Request or UDP probe on high ports Narrow down connectivity issues Baseline network performance on a hop by hop basis p p y p

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

61

Transport Layer

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

62

Transmission Control Protocol - TCP


IP protocol number 6 Connection oriented p Reliable transport Assumes very little about the underlying protocol and architecture HTTP, Email, Telnet, FTP TCP is a Transport Layer Protocol used to p p y provide reliable, connection oriented communications between two devices. Each packet transmitted is acknowledged by the receiving station.
63

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

User Datagram Protocol - UDP


IP protocol number 17 Connectionless y Unreliable by nature Upper layer applications responsible for reliability Real time applications VoIP Video over IP VoIP, UDP is a Transport Layer Protocol used to provide fast, connectionless communications between to devices. Each packet transmitted is not acknowledged and reliability is left up to higher layer protocols and/or applications.
64

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Application Layer

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

65

Dynamic Host Configuration Protocol DHCP


RFC 2131 Protocol used to supply IP Layer information to Hosts IP Address Subnet Mask IP Gateway DNS Server(s) Often used to simplify the management of IP Address Space p Prevents undertaking laborious task of manually configuring many Hosts

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

66

DHCP
DHCPREQUEST DHCPDISCOVER Host DHCPACK DHCPOFFER DHCP Server

I need an IP Address You can use this IP Address I will use that IP Address ill th t Add

Acknowledged g

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

67

Domain Name Service - DNS


RFCs 1034 and 1035 Resolves hostname with domain to matching IP Address E i t remember www.cisco.com th Easier to b i than 198.133.219.25 Utilizes TCP and UDP as underlying Transport y g p Protocols Alternative to Host Tables on all Hosts
Domain Name Service

www.ietf.org
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Open Standards
68

DNS - Name Resolution


www.cisco.com = 172.16.3.2

I need the IP Address for www.cisco.com

I heard that request. q Here is the IP Address.

www.cisco.com = ???

www.cisco.com = 172.16.3.2

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

69

Putting it all Together

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

70

Putting it All Together g g


DNS Server 192.168.1.2 Host 192.168.1.1 Web Server www.cisco.com 203.10.47.212

The Internet

Lets L t assume we h have a user who wants t visit www.cisco.com h t to i it i


Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

71

Putting it All Together


User requests Web Page http://www cisco com http://www.cisco.com ARP for ethernet address of DNS My ethernet address is 00-00-50-12-34-56 y UDP - What is the IP address of www.cisco.com That IP address is 203.10.47.212

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

72

Putting it All Together


As 203.10.47.212 is in another network, my gateway 203 10 47 212 network needs to forward this for me ARP for ethernet address of gateway My ethernet address is 00-00-0C-98-76-54 00 00 0C 98 76 54 Setup TCP connection to server - SYN REQ Forward data to gateway

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

73

Putting it All Together


Forward data to next gateway g y until it reaches server 2 1 9 10 13 12
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

4 7

8 6

11

14
74

Putting it All Together


ACK TCP connection to client - SYN ACK 2 1 9 10 13 12
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

4 7

8 6

11

14
75

Putting it All Together


ACK the ACK back to Server - ACK 2 1 9 10 13 12
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

4 7

8 6

11

14
76

Putting it All Together


Issue a HTTP GET request for CCO Web Page GET 2 1 9 10 13 12
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

4 7

8 6

11

14
77

Putting it All Together


Start sending Data 2 1 9 10 13 12
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

4 7

8 6

11

14
78

Agenda
Introduction to IP Understanding an IP Address g g IP Routing and Networking IP in Cable Networks IP for VoIP, Digital Video Home Networking etc VoIP Video, Networking, etc. IPv6 Fundamentals Conclusion / Q&A

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

79

Cable Evolution
The video signal is transmitted over fiber to the node, where it is converted to an electrical signal and forwarded to the subscriber over existing coaxial cable Provision is made to support return traffic for future services Cable Serving Area g

HFC
N

> 2000 Homes Coax

Fiber Head-End

Typically Fewer than Five Amplifiers in Cascade


Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

80

Cable Plant Components


Node Node Node

Hub

CMTS

Lifetime VH-1 VH 1 Packetized Data NICK E!

Head-End PSTN Hub Hub Internet

Node Node

COAX
Node ode

Tap

Node

Node

Node

Drop Cable Modem C bl M d PC

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

81

SP Video Headends
MSOs
Headend Primary Hub Taps Coaxial Network

Secondary Hub Video Origination Headend

Amplifiers p Nodes Copper Network

Telcos

VHO

VSO DSLAM

Different networks, different terminology, same enabling technologies


Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

82

The Premises

QPSK/QAM Modulator

MAC

Data an nd Control Lo ogic

RF Tuner

QAM Demodulator

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

83

A Deeper Look on the Cable

6 MHz = 1 QAM channel 1 Channel means


1 analog program Around 12 SD digital MPEG-2 programs Around 24 SD digital MPEG-4 programs MPEG 4 Around 4-6 HD digital MPEG-4 programs

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

84

Understanding MPEG - Video


MPEG Transport Stream (TS) is transported over UDPoIP.
20+4+1316=1340B

IP (20B)

UDP (4B)

MPEG Transport Pkt (188B)

.. (6 more MPEG)

This contains PID

Transport Pkt Header (4B)


184B 184B PES Header

Transport Pkt Payload (184B) PES is encapsulated here


184B PES Header

184 Bytes
PES

PES Header

PES Header

PES Packet Data=ES Data ES

ES

Elementry Stream (coded bitstream) Sequence


Sequence Header

Sequence

Sequence

Sequence

GOP Header Picture Header

I/B/P-Frame
85

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

DOCSIS Basics
DOCSIS is a consortium of Comcast, Cox, Time Warner Cable, Rogers, MediaOne, and CableLabs DOCSIS is a standard supporting DS modulations of QAM 64 and QAM 256, DS FEC of Annex B, US modulations of QPSK and QAM 16, in-band control channels, MPEG framing, and RSA key distribution DOCSIS documents describe the internal and external network interfaces for a system that allows bidirectional transfer of Internet Protocol (IP) traffic between the cable system head-end and customer premises, over a cable television system. Cable Modem Termination System (CMTS) at the HE and Cable Modem (CM) at the CPE
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

86

End-to-End Cable Network: Building Blocks


L2/L3 CPE
CM/ eMTA/ eRouter

L1/L2 Access/Hub
EQAM

L3 (IP/MPLS)

gg g Aggregation Network

Regional Network

Backbone Network

H F C
STB

HFC HFC

CMTS

HR

AR AR

ER

ER

BR

BR

BR ER ER

BR

HR

Residential
L2VPN CM Voice Complex Video Complex Video Complex Network Mgt Complex PEG DS/DB IP Security Complex Voice Complex Video Complex Network Mgt Complex IP Security Complex

FTTP

PE Router

SDV

VoD

Business
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved.

SDC (System/Div)
Cisco Confidential

SDC (Regional)

SDC (National)
87

Agenda
Introduction to IP Understanding an IP Address g g IP Routing and Networking IP in Cable Networks IP for VoIP, Digital Video Home Networking etc VoIP Video, Networking, IPv6 Fundamentals Conclusion / Q&A

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

88

Traditional Telecommunications Components


Tandem Switch
SS7

IXC
Class 4

IXC
SS7 SS7

Toll Trunk

SS7 Class 4 SS7 SS7

Tie Trunk Tr nk

LEC
Class 5

LEC
Class 5

LEC
Class 5

LEC
Class 5

CO Trunk PBX PBX PBX LATA Line Private Branch Exchange (PBX) Local Exchange Carrier (LEC) InterExchange Carrier (IXC) Central Office (CO)
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

PBX

PBX

PBX

89

IP Telephony
Signaling

IP Router Gateway Router Gateway

VoIP (Softswitch)
Signaling

PWR

IP Router Gateway PSTN Router Gateway

PWR

IP Telephony
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

90

Voice Packetization
ATM or IP Packet Transport

Analog

Digital

Compressed
DSP

Packetized
L3 L2

Reverse Process

G.711 (Predigitized)

G.726 ADPCM G.728 LD-CELP G.729(AB) CS-ACELP G.723.1 ACELP/MPMLQ Sampling ( p g (PAM) ) Companding (A-Law, Mu-Law) PCM Coding (PCM G.711)
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

VoIP (ovL2) VoATM (VoFR)


91

Voice Encapsulation over IP


Even-Numbered P E N b d Ports RTP UDP Port Range= <1638432768> Four Ports Dynamically Allocated per Single Full-Duplex Call F ll D l C ll RTP

Voice G Gateway Odd-Numbered Ports Variable 12 8 20

RTCP

IP Network

Voice Gateway

D i Designed t carry real-time d to l ti traffic on top of IP Voice Payload RTP UDP L2 IP Real-Time Protocol (RTP)media Real-Time Transport Control Protocol Routing/Addressing R ti /Add i (RTCP)form of signaling between RTP Ports Multiplexing/(CRC) termination points
Sequence Numbers Payload Type Identification Timestamps
Watches the quality of underlying infrastructure

RFC1889 and 1890


92

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

CableLabs PacketCable Multimedia


Defines an Architectural Framework which provides an IP-based platform t support a variety of multimedia IP b d l tf to t i t f lti di applications and services requiring QoS treatment over DOCSIS access networks A multimedia service is defined as any IP-based service requiring QoS-based network resources
(e.g., (e g transport of cellular telephony calls online gaming video calls, gaming, videoconferencing, streaming media, etc.)

Multimedia services require scheduled service flows, as contrasted with best effort services such as web browsing, e-mail, instant messaging

93
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

93

Quality of Service Operations


How Do QoS Tools Work?

QUEUEING AND CLASSIFICATION AND MARKING (SELECTIVE) DROPPING Post-Queuing Operations

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

94

Quality of Service (QoS)


Type of Service (TOS) and Differentiated Services Code Point (DSCP) Used to differentiate traffic types Provide priority queuing to important packets O i i ti h t or i t Originating host intermediate routers can set TOS value di t t t l Intermediate routers can act upon (Per Hop Behavior) or modify the value TOS has been expanded to Differentiated S i h b d d Diff i d Services C d P i Code Point (DSCP) to provide more levels of service TOS and DSCP are important to classify and prioritize services such as:
Voice over IP Broadcast Video Video on Demand

This ensures our customers have a pleasant TV viewing experience and coherent phone conversations
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

95

Sample ToS/DSCP Effect

Voice Video Data


Step 1: p Define Scheduling

10% 40% 50%

Low Latency, High Servicing (Voice)

Broadcast Video High Speed Data

Step 2: p Define Bandwidth

Class definition sets minimum bandwidth Queue servicing (metering) controls latency Unused capacity is shared amongst the other classes Each C Class can be separately configured f QoS f for Q S
2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Presentation_ID

96

Classic HFC Network for Broadcast Digital Video


Satellite Receivers

SONET Transport
IRTs IRTs

Analog Ad Insertion Local Ad Server

Analog Mods QAM Modulators

1550 TX

1550 RX

MPEG STB

Broadcast Digital Video


DNCS TED APP ATM

SONET

ATM

SONET

ATM

QPSK DS QPSK US

1310 1310 Tx Tx HFC 1310 1310 Rx Rx

Home

Headend

Primary Hub Secondary Hub

HFC Network

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

97

Cable vs.Telco
Broadcast Video
Video Service Provider

IP Video
Video DSLAM

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

98

Today s Todays MSO Network


Satellite Receivers Enc IRTs IRTs Ad Server DNCS TED APP CMS Web GW PSTN Ethernet Switch

Digital Simulcast Si l t
GigE/DWDM Transport
Library VOD Storage Local Ad Server

MPEG Decoders Mux/DPI Mux/DPI

Analog Mods QAM Modulators

1550 TX

1550 RX SDB Server QAM QAM QAM QAM QAM QAM QAM QAM QAM QAM QAM QAM QPSK DS QPSK US EQAM QAM QAM QAM DOCSIS 3.0 1310 1310 Tx Tx HFC 1310 1310 Rx Rx

GigE/DWDM Transport
Bulk Encryptor Local VOD

MPEG STB IP STB Cable Modem EMTA

Switched Digital Broadcast


GigE/DWDM Transport

GigE/DWDM Transport

Video Vid on Demand D d


GigE/DWDM Transport GigE/DWDM Transport

Home

Voice o e IP o ce over
Headend

DOCSIS HSD OCS S S


Primary Hub

M-CMTS

Secondary Hub

HFC Network

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

99

Agenda
Introduction to IP Understanding an IP Address g g IP Routing and Networking IP in Cable Networks IP for VoIP, Digital Video Home Networking etc VoIP Video, Networking, IPv6 Fundamentals Conclusion / Q&A

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

100

A Need for IPv6?


IETF IPv6 WG began in early 90s, to solve addressing growth i th issues, b t but CIDR and NAT were developed IPv4 32 bit address = 4 billion hosts ~25% of the IPv4 address space is still unused (different ) from unallocated) BUT IP is everywhere Data, voice, audio and video integration is a reality Regional registries apply a strict allocation control Latest forecast of IPv4 exhaustion is September 2011 So, the compelling reason is: More IP addresses!
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

101

What changed from IPv4?


Expanded address space Addresses quadrupled from 32 bits to 128 bits Header Format Simplification Fixed length, optional headers are daisy chained length IPv6 header is double that of IPv4, from 20 to 40 bytes No checksum at the IP network layer Relies on lower layer (POS, Ethernet, etc) or upper app cat o aye (TCP, UDP) application layer ( C , U ) No hop-by-hop segmentation/fragmentation Path MTU discovery mandated No broadcast
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

102

IPv4 & IPv6 Header Comparison p


IPv4 Header
Version IHL Type of Service Total Length

IPv6 Header RFC 2460


Version Traffic Class Flow Label

Identification

Flags

Fragment Offset

Payload Length

Next Header

Hop Limit

Time to Live

Protocol

Header Checksum

Source Address Destination Address D ti ti Add


Options Padding

Source Address

Lege end

- fields name kept from IPv4 to IPv6 p - fields not kept in IPv6 - Name & position changed in IPv6 - New field in IPv6
2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Destination Address

Presentation_ID

103

Larger Address Space


IPv4
32 bits = 4,294,967,296 possible addressable devices

IPv6
128 bits 3.4 =3 4 X 1038 possible addressable devices =340,282,366,920,938,463,463,374,607,431,768,211,456 5 x 1028 addresses per person on the planet 13 quintillion IPv4 domains per person (a quintillion is one million trillion)

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

104

IPv6 Addressing
IPv6 addressing rules are covered by multiple RFCs g y p
Architecture defined by RFC 4291 3 Address types: Unicast: One to One (Global and Link Local) An identifier for a single interface A packet sent to a unicast interface. address is delivered to the interface identified by that address. Anycast: One to Nearest (Allocated from Unicast) An identifier for a set of interfaces (typically belonging to different nodes). A packet sent to an anycast address is delivered to one of the interfaces identified by that address (the "nearest" one, according to the routing protocols' measure of distance). Multicast: One to Many An identifier for A id tifi f a set of i t f t f interfaces (t i ll belonging to (typically b l i t different nodes). A packet sent to a multicast address is delivered to all interfaces identified by that address. No Broadcast address use multicast instead address,

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

105

IPv6 Address Representation


All addresses are 128 bits. 16-bit fields in case insensitive colon hexadecimal representation Preferred form
2031:0000:130F:0000:0000:09C0:876A:130B

Leading zeros in a field are optional:


2031:0:130F:0:0:9C0:876A:130B Successive fi ld of 0 represented as ::, b t only once i an S i fields f t d but l in address Compressed form 2031:0:130F::9C0:876A:130B 2031::130F::9C0:876A:130B 0:0:0:0:0:0:0:1 => ::1 0:0:0:0:0:0:0:0 => ::

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

106

Address Type Identification


Localhost: Multicast: Link-Local IPv6 Addresses 00..1 (128 bits) ( ) 1111 1111 1111 1110 10 x x (FE80, FE90, FEA0, FEB0) Used within a network segment Global Unicast: Everything else ::1/128 FF00::/8 FE80::/10

equivalent to 127.0.0.1 in IPv4

All address types (except multicast) have to support EUI-64 (64 bit extended unique identifier)

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

107

IPv6 Global Unicast Addresses

001

Global Routing Prefix

Subnet ID

Interface ID

n bits Provider

(64-n) bits Site

64 bits Host

IPv6 Global Unicast addresses are:


Addresses for generic use of IPv6 Structured as hierarchy to keep the aggregation

First 3 bits 001 (2000::/3) is the first allocation from IANA for IPv6 Unicast use

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

108

Dual Stack Approach


IPv4 Application IPv6-enable Application

TCP

UDP

TCP

UDP

IPv4

IPv6

IPv4

IPv6

0x0800 0 0800

0x86dd 0 86dd

0x0800 0 0800

0x86dd 0 86dd

Frame Protocol ID

Data Link (Ethernet)

Data Link (Ethernet)

Dual stack node means:


Both IPv4 and IPv6 stacks enabled Applications can talk to both Choice of the IP version is based on name lookup and application preference * Does not mean that all applications are dual stack aware

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

109

Q and A

Presentation_ID

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

110

Anda mungkin juga menyukai