Ipv6 … a Simplified Explanation

Total Page:16

File Type:pdf, Size:1020Kb

Ipv6 … a Simplified Explanation IPv6 … A Simplified Explanation Presented by Bryan Crisler Senior Network Engineer Time Warner Cable Housekeeping • Take this time to locate: – Emergency Exits – Bathrooms – Breakroom/Water Fountain – Note taking utensils • Put your Phones on Vibrate – If you need to take a call, feel free to step out of the room. About your Speaker • Bryan Crisler – Started in Cable @ Charter Communications, Riverside, CA in June 2005 – Currently a Senior Network Engineer at Time Warner Cable About your Speaker • Held following positions: – Broadband Technician I-IV (Charter) – Network Operations Specialist (Charter) – Network Technician (Charter) – Network Engineer (Charter & TWC) – SR Network Engineer (TWC) About your Speaker • Email: [email protected] • LinkedIn: linkedin.com/in/bcrisler Today’s Lesson Plan • Session 1: So What About IPv6? • Session 2: Every Day IPv6 and You So What About IPv6? Session 1 Basic History of IP • IP – Internet Protocol • Defined in RFC 791, dated 1981, written by Information Sciences Institute @ USC • Written for DARPA (Defense Advanced Research Projects Agency) Basic History of IP • “… Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks…provides for transmitting blocks of data called datagrams from sources to destinations… identified by fixed length addresses.” (RFC 791, section 1.1) Versions of IP • IPv0 – 3: Experimental Only • IPv4: Defined in 1981 by RFC 760 & 791. First version to implemented publically. Still in use today. • IPv5: Also experimental, called Internet Stream Protocol. • IPv6: Also called IP Next Generation (IPng), Defined in 1998 by RFC 2460-2467 IP Addressing • Layer 3 (Network) form of Addressing • Two different forms of IP Address: – IPv4 • Uses Dotted Decimal (192.168.0.1) • Has 4,294,967,296 total address (public & private) • 32 bit address – IPv6 • Uses Hexadecimal Notation (FE80::1) • Has 3.4×1038 total address (public & private) • 128 bit address IP Addressing – cont. • Both versions represent a real number • For Instance: – 0.0.1.0 = 256 – 10.0.0.4 = 16,777,220 – 0:0:0:0:0:0:0:1 = 1 – 0:0:0:0:1:0:0:0 = 281,462,092,005,375 IP Addressing – cont. • IPv4 Address: – Dotted decimal notation – x.x.x.x, where x is between 0 – 255 • IPv6 Address – Hexadecimal Number system – 0000:0000:0000:0000:0000:0000:0000:00 00 – Leading Zeros can be removed – Multiple blocks of zeros can be simplified using colon “:” IP Addressing – cont. • Blocks of IPs are called Subnets • Each Subnet represents a network (either WAN or LAN) • The range of each subnet is determined by the Subnet Mask • Each Subnet has a Network (First IP address) and a Broadcast (Last IP Address, IPv4 only) IP Address • Network Range is calculated Subtracting Subnet Mask and from 255.255.255.255 (IPv4) or by 2^(128 – prefix) (IPv6). IP Address – cont. • Network Address: First IP in a Subnet used to identify the entire network • Broadcast Address (IPv4 only): Last IP in a Subnet used to communicate any device on the Useable IP Range. • Gateway IP Address: The configured IP address on the next hop router, which contains a path towards a WAN/Internet • Useable IP Range: Any IP in a subnet except the Network and Broadcast (IPv4 only) IPv4 Address Example • A home wireless Router is configured with network address of 192.168.0.0 and a subnet mask of 255.255.255.0 • 255.255.255.255 – 255.255.255.0 = 0.0.0.255 = 256 total addresses • 192.168.0.0 + 0.0.0.255 = 192.168.0.255 • Network Range: 192.168.0.0 to 192.168.0.255 • Network Address: 192.168.0.0 • Broadcast Address: 192.168.0.255 IPv6 Address Example • A home wireless router has received a prefix delegated scope from the ISP 2605:e000:160e:816a::/64. • 2^(128 - prefix) 2^64 -> 18,446,744,073,709,551,616 hosts • Approximately 18.4 Quintillion IP Addresses. • If each IP address was the size of a quarter, you could cover the entire earth approximately 24 times. IPv6 Address Example – cont. • The network Range is – 2605:e000:160e:816a:0000:0000:0000:00 00 -2605:e000:160e:816a:ffff:ffff:ffff:ffff • Network Address: 2605:e000:160e:816a:0000:0000:0000:0000 • Broadcast Address: There is no broadcast address, since multicast is used instead. IPv4 vs IPv6: Comparison IPv4 IPv6 Address 32-bit 128-bit 340,282,366,920,938,4 Number of Addresses 4,294,967,296 63,463,374,607,431,76 8,211,456 Network Address X X Broadcast Address X N/A Link-Local Range 169.254.0.0/16 FE80::/10 224.0.0.0 – Multicast Range FF00::/8 239.255.255.255 Dynamic Addressing DHCP SLAAC or DHCPv6 Security Optional IPSec built-in, optional Header Length Variable Fixed IPv4 vs IPv6: Comparison – cont. IPv4 IPv6 Loopback Address 127.0.0.1/32 ::1/128 Default Gateway 0.0.0.0/0 ::/0 RIP (v1/v2), OSPF, IGP Routing Protocols RIPng, OSPFv3,ISIS ISIS, EIGRP EBGP Routing Protocols BGP BGPv4 Other Protocols ICMP, DHCP, DNS ICMPv6, DHCPv6, DNS IPv6 Features • Larger Address Space • Simplified header makes routing more efficient • Private IP Space not required • Manual configuration not required due to SLAAC • Broadcasting of packets replaced with Multicast/Anycast IPv6 Features – cont. • Security built into IPv6, but is optional • Mobility allows for devices to use the same IPv6 Address (from home network) regardless of what network they are connected to. • Dual Stack / 6 to 4 tunneling is available to provide a smooth transition ARP vs Neighbor Discovery Protocol • ARP – Address resolution protocol uses IPv4 Broadcast address to map an IPv4 Address to a MAC address (ARP) or vise versa (rARP). • Neighbor Discovery Protocol – part of the ICMPv6 protocol, uses multicast to establish communication with devices on the same network segment. Follows the following process: – Neighbor Solicitation: sends a message to FF02::1/16 with all configured IPv6 addresses – DAD (Duplicate Address Detection): If no message is received from LAN segment, configured IPv6 Addresses are assumed not to be duplicates. – Neighbor Assignment: Message sent to confirm configuration of IPv6 addresses to LAN segment. ARP vs Neighbor Discovery Protocol – cont. • NDP – cont. – Router Solicitation: message sent to FF02::2/16 to detect presence of routers on network segment. Determine the default gateway for host. – Router Advertisement: response from router – Redirect: message sent from router specifying that it is not the best gateway for the host. SLAAC • SLAAC – StateLess Address AutoConfiguration • Allows a host to automatically configure their own IPv6 Address • Uses NDP to determine a valid Global IPv6 Address • Uses EUI-64 method Dynamic Host Configuration Protocol (DHCP) • Allows a DHCP server to assign/configure an IP Address to an end device • Will also configure Subnet Mask, Gateway IP, as well as DNS Servers • When an end device is configured for DHCP, the DORA begins (IPv4) or SARR begins (IPv6). DHCP – cont. • DORA (IPv4) – – Discover – Client sends a broadcast message to DHCP Server – Offer – Server sends a message to client with an IP Address Offer – Request – Client formally request IP Address Offered, and sets Subnet Mask, gateway, DNS and lease time – Acknowledge – Server Acknowledges client Request and reserves IP. • Once lease is at half-life, DORA process is repeated. DHCP – cont. • SARR – Solicit – Client sends a multicast message to DHCPv6 Server – Advertise – DHCPv6 Server(s) replies to client with their IPv6 Address – Request – Client formally request IP Address Offered, and sets Prefix, DNS and lease time, but not gateway (learned from ICMPv6) – Reply – Server Acknowledges client Request and reserves IP. • Once lease is at half-life, SARR process is repeated. Domain Name Service (DNS) • DNS – Maps a domain name like google.com to an IP Address • DNS Support for IPv6 has been added • “AAAA” records are used to map a FQDN like google to an IPv6 Address • “A” Records are used to map FQDN to an IPv4 Address. Session 1 Review • How many bits are in an IPv6 Address? • What method is used by DHCPv6? • What does the double colon “::” mean in hexadecimal numbering system for IPv6? • Does ICMPv6 use broadcast or multicast messages? • How is a default route or default gateway determined? Session 1 Q&A • Any Questions??? Break time 15 Minutes Every Day IPv6 and You Session 2 Why did IPv6 become Necessary? • We are out of IPv4 Space • ARIN reports only 0.00374 of /8 left – Only 245 /24s left (62,720 IPs left) • Approximately 42.4% of the world’s population uses the internet as of Dec 2014, where as only 12.7% used the internet in Dec 2004. (internetworldstats.com) Where are we at with IPv6 Deployment? • Since World IPv6 Launch day, on June 6th, 2012, many companies including Time Warner Cable and Comcast have committed to launching IPv6. • Currently most companies are running both IPv4 and IPv6 at the same time. • Comcast, Charter, Cox and Time Warner Cable What are the challenges to IPv6 deployment? • End Device support (software and hardware) – Windows 7 and 8+ Support IPv6 – Mac OS X v10.1 and later Support IPv6 • End Device (Wireless Routers) – Check your vendor’s website to see if IPv6 is supported. Where are we at with IPv6 Deployment? – cont. • Most cable companies are providing IPv6 to customers – Network Devices have already been configured – Network Backbone already supports IPv6 – IPv6 Allocations have already been received and deployed What are the challenges… – cont. • Modem Support – Not all modems have firmware that support IPv6. – Each cable company has a list of supported IPv6 enabled modems. • Website Support – Most websites are IPv4 only. Many bigger sites such as Google,
Recommended publications
  • Br-Asi01 Br-Asx01
    BR-ASI01 BR-ASX01 Data Comm for Business, Inc. 807 Pioneer Street Champaign, IL 61820 217-352-3207 Rev. Date: October 17, 1996 This manual applies to both the “I” and “X” router models. The “I” model (BR-ASI01) is single protocol TCP/IP only. The “X” model (BR-ASX01) is a multi-protocol router that routes TCP/IP, IPX, DECnet, and Appletalk. When using this manual with “I” model router, ignore the manual sections pertaining to protocols other than TCP/IP. CHAPTER 1 - INTRODUCTION 7 ABOUT THE BR ROUTER 7 Getting Started 7 Hardware Installation 7 RouterView Software Installation 8 Command Line Preparation 8 Quickstart Configuration 8 Appendices and Index 8 CHAPTER 2 - GETTING STARTED 9 A FEW NOTES 9 Please Read The Manuals 9 Warranty and Service 9 Getting Help With the BR Router 9 WHAT YOU WILL NEED TO GET STARTED 9 Supplied with the BR Router 9 Needed For Installation 10 Ethernet Connection Requirements 10 Thick Ethernet 10 Thin Ethernet 10 10Base-T Twisted-Pair Ethernet 10 Telco Line Connection Requirements 11 RS-232 Port 11 CHAPTER 3 - HARDWARE INSTALLATION 13 Mounting the Router 13 Connecting the Router to the Ethernet 14 Connecting to Thick Ethernet 14 Connecting to Thin Ethernet 14 Connecting to Twisted-Pair Ethernet 14 Connecting a Line Device to the BR Router 14 Connecting Devices to the RS-232C Port 15 Connecting an Out-of-Band Management Console 15 Powering Up the Router 15 CHAPTER 4 - ROUTERVIEW SOFTWARE INSTALLATION 17 RouterView for Windows 17 System Requirements 17 Installing and Running RouterView for Windows 17 RouterView
    [Show full text]
  • Discussion Chapter#9 Services of Data-Link
    The Islamic University of Gaza ECOM 4314: Data Communication Faculty of Engineering Instructor: Dr. Aiman Abu Samra Department of Computer Engineering T.A.: Eng. Alaa O. Shama Discussion Chapter#9 The data-link layer of a node (host or router) is responsible for delivering a datagram to the next node in the path. The data-link layer is located between the physical and the network layers. The datalink layer provides services to the network layer; it receives services from the physical layer. data-link layer of the source host needs only to encapsulate the datagram received from the network in a frame, the data-link layer of the destination host needs to decapsulate the datagram from the frame, but each intermediate node needs to both encapsulate and decapsulate, because each link may be using a different protocol with a different frame format. Even if one link and the next are using the same protocol, encapsulation and decapsulation are needed because the link-layer addresses are normally different. Services of Data-Link: 1. Framing The data-link layer at each node needs to encapsulate the datagram (packet received from the network layer) in a frame before sending it to the next node. The node also needs to decapsulate the datagram from the frame received on the logical channel. 2. Flow control If the rate of produced frames is higher than the rate of consumed frames, frames at the receiving end need to be buffered while waiting to be consumed (processed). Definitely, we cannot have an unlimited buffer size at the receiving side.
    [Show full text]
  • Session 5: Data Link Control
    Data Communications & Networks Session 4 – Main Theme Data Link Control Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted from course textbook resources Computer Networking: A Top-Down Approach, 6/E Copyright 1996-2013 J.F. Kurose and K.W. Ross, All Rights Reserved 1 Agenda 1 Session Overview 2 Data Link Control 3 Summary and Conclusion 2 What is the class about? .Course description and syllabus: »http://www.nyu.edu/classes/jcf/csci-ga.2262-001/ »http://cs.nyu.edu/courses/Fall13/CSCI-GA.2262- 001/index.html .Textbooks: » Computer Networking: A Top-Down Approach (6th Edition) James F. Kurose, Keith W. Ross Addison Wesley ISBN-10: 0132856204, ISBN-13: 978-0132856201, 6th Edition (02/24/12) 3 Course Overview . Computer Networks and the Internet . Application Layer . Fundamental Data Structures: queues, ring buffers, finite state machines . Data Encoding and Transmission . Local Area Networks and Data Link Control . Wireless Communications . Packet Switching . OSI and Internet Protocol Architecture . Congestion Control and Flow Control Methods . Internet Protocols (IP, ARP, UDP, TCP) . Network (packet) Routing Algorithms (OSPF, Distance Vector) . IP Multicast . Sockets 4 Course Approach . Introduction to Basic Networking Concepts (Network Stack) . Origins of Naming, Addressing, and Routing (TCP, IP, DNS) . Physical Communication Layer . MAC Layer (Ethernet, Bridging) . Routing Protocols (Link State, Distance Vector) . Internet Routing (BGP, OSPF, Programmable Routers) . TCP Basics (Reliable/Unreliable) . Congestion Control . QoS, Fair Queuing, and Queuing Theory . Network Services – Multicast and Unicast . Extensions to Internet Architecture (NATs, IPv6, Proxies) . Network Hardware and Software (How to Build Networks, Routers) . Overlay Networks and Services (How to Implement Network Services) .
    [Show full text]
  • Cisco IOS Appletalk Configuration Guide Release 12.4
    Cisco IOS AppleTalk Configuration Guide Release 12.4 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7817505= Text Part Number: 78-17505-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • 1 Mac Addressing, Ethernet, and Interconnections MAC Addresses
    MAC Addresses and ARP ❒ 32-bit IP address: ❍ network-layer address Mac Addressing, Ethernet, and ❍ used to get datagram to destination IP subnet Interconnections ❒ MAC (or LAN or physical or Ethernet) address: ❍ used to get datagram from one interface to another physically-connected interface (same network) ❍ 48 bit MAC address (for most LANs) burned in the adapter ROM 5: DataLink Layer 5-1 5: DataLink Layer 5-2 LAN Addresses and ARP LAN Address (more) Each adapter on LAN has unique LAN address ❒ MAC address allocation administered by IEEE ❒ manufacturer buys portion of MAC address space 1A-2F-BB-76-09-AD Broadcast address = (to assure uniqueness) FF-FF-FF-FF-FF-FF ❒ Analogy: LAN (a) MAC address: like Social Security Number (wired or = adapter wireless) (b) IP address: like postal address 71-65-F7-2B-08-53 58-23-D7-FA-20-B0 ❒ MAC flat address ➜ portability ❍ can move LAN card from one LAN to another 0C-C4-11-6F-E3-98 ❒ IP hierarchical address NOT portable ❍ depends on IP subnet to which node is attached 5: DataLink Layer 5-3 5: DataLink Layer 5-4 ARP: Address Resolution Protocol ARP protocol: Same LAN (network) ❒ A wants to send datagram to Question: how to determine ❒ Each IP node (Host, B, and B’s MAC address not in ❒ A caches (saves) IP-to-MAC A’s ARP table. MAC address of B Router) on LAN has address pair in its ARP table ❒ A broadcasts ARP query until information becomes old ARP table knowing B’s IP address? packet, containing B's IP (times out) address 237.196.7.78 ❒ ARP Table: IP/MAC ❍ soft state: information ❍ Dest MAC address
    [Show full text]
  • Understand Ipv4
    LESSON 3.2 98-366 Networking Fundamentals UnderstandUnderstand IPv4IPv4 LESSON 3.2 98-366 Networking Fundamentals Lesson Overview In this lesson, you will learn about: APIPA addressing classful IP addressing and classless IP addressing gateway IPv4 local loopback IP NAT network classes reserved address ranges for local use subnetting static IP LESSON 3.2 98-366 Networking Fundamentals Anticipatory Set 1. Write the address range and broadcast address for the following subnet: Subnet: 192.168.1.128 / 255.255.255.224 Address Range? Subnet Broadcast Address? 2. Check your answer with those provided by the instructor. If it is different, review the method of how you derived the answer with your group and correct your understanding. LESSON 3.2 98-366 Networking Fundamentals IPv4 A connectionless protocol for use on packet-switched Link Layer networks like the Ethernet At the core of standards-based internetworking methods of the Internet Network addressing architecture redesign is underway via classful network design, Classless Inter-Domain Routing, and network address translation (NAT) . Microsoft Windows uses TCP/IP for IP version 4 (a networking protocol suite) to communicate over the Internet with other computers. It interacts with Windows naming services like WINS and security technologies. IPsec helps facilitate the successful and secure transfer of IP packets between computers. An IPv4 address shortage has been developing. LESSON 3.2 98-366 Networking Fundamentals Network Classes Provide a method for interacting with the network All networks have different sizes so IP address space is divided in different classes to meet different requirements. Each class fixes a boundary between the network prefix and the host within the 32-bit address.
    [Show full text]
  • Ip Directed Broadcast Wake on Lan
    Ip Directed Broadcast Wake On Lan Labrid and judicable Hussein inseminates his mandorlas case yank restrainedly. Sherwood usually paraffin unfavorably or ascribe tattily when pericranial Winnie countenance barefacedly and tight. Orobanchaceous and intensional Giles often Atticize some lasagnes intently or dissuades adjunctly. So they can do directed broadcast ip address Lan broadcasts to wake no ip directed broadcasts destined for that ip address of one or software, lan is done some inherent risks. The packet is then directed exactly where it needs to go, time exceeded, among other things. In value scale networks, which can completely inundate the line whose address is being falsified. This consumes standby power, locker a Unicast Packet. Unicast transmissions are routed through scripts described in a wake on ip directed lan broadcast is supported by lan tool that wake up by you from outside you must be solely between switches? Enables bootp broadcast message will wake on ip directed broadcast packet sent over simplification vlans belonging to wake on windows command here to protecting data attribute on. It is the english version that will display a lan broadcast ip on directed broadcast address indicated below. Only stub undefined methods. More you can specify that vlan and help is it does anyone please keep an individual computers that know here for complying with upgrades or on ip directed broadcast address of a tcp source. Where are not here are owned by telephone, wake on ip directed lan broadcast. If the computer is open, time consuming, AND contract AND BELKIN EACH IRREVOCABLY SUBMITS TO THE EXCLUSIVE JURISDICTION AND VENUE FOR satisfy SUCH PROCEEDING.
    [Show full text]
  • 1.7 Link-Layer Addressing
    ROHINI COLLEGE OF ENGINEERING &TECHNOLOGY 1.7 LINK-LAYER ADDRESSING A link-layer address is called a link address, called a physical address, and sometimes a MAC address. Since a link is controlled at the data-link layer, the addresses need to belong to the data-link layer. When a datagram passes from the network layer to the data-link layer,the datagram will be encapsulated in a frame and two data-link addresses are added to the frame header.These two addresses are changed every time the frame moves from one link to another. Figure 1.7.1 shows, IP addresses and link-layer addresses in a small internet. This is easy to understand. Fig1.7.1: IP addresses and link-layer addresses in a small internet. [Source :”Data Communications and Networking” by Behrouz A. Forouzan,Page-243] Here we have three links and two routers. We have two hosts: Alice (source) and Bob (destination). For each host, we have shown two addresses, the IP addresses (N) and the link-layer addresses (L). EC8551 COMMUNICATION NETWORKS ROHINI COLLEGE OF ENGINEERING &TECHNOLOGY We have three frames, one in each link.Each frame carries the same datagram with the same source and destination addresses (N1 and N8), but the link-layer addresses of the frame change from link to link. In link 1, the link-layer addresses are L1 and L2. In link 2, they are L4 and L5. In link 3, they are L7 and L8. Note that the IP addresses and the link-layer addresses are not in the same order.
    [Show full text]
  • Internet Protocols
    Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks p MAC is the part of the underlying network n MAC is used on the LAN p What is the addressing mechanism in WAN? TCP/IP Stack n WAN is interconnections of man many LANS p Networking addressing is required n Making the network of networks to appear seamless p For Internet we use IP addressing Ethernet Addressing p MAC address is 48 bits: n 24 bits (OUI – Organizationally unique Identifier n 24 bit hardware address – burned in the ROM Ethernet Addressing My OUI Network Layer Architecture p Layer 3 of the seven-layer p Provides services to upper layer (Primitives and parameter) p The Network Layer is responsible for routing packets delivery n Note the Data Link Layer is responsible for Media TCP/IP Stack Access Control, Flow Control and Error Checking p Connection model: connectionless communication n No setup path is required n The recipient does not have to send an acknowledgement p Provides unique host addressing Network Layer Examples Internet Protocol p We focus on IP p IP was the connectionless datagram service p Originally introduced by Vint Cerf and Bob Kahn in 1974 to be interfaced with TCP n The first major version of IP is known as Internet Protocol Version 4 (IPv4) – dominant n Internet Protocol Version 6 (IPv6) is the successive version p Main responsibility: addressing hosts and routing datagrams (packets) from a source host to the destination host across one or more IP networks n Addresses identify hosts n Provides a logical location service
    [Show full text]
  • (IP) Addressing and Protocols Feature Overview and Configuration Guide
    Technical Guide Internet Protocol (IP) Addressing and Protocols Feature Overview and Configuration Guide Introduction This guide describes how to configure IPv4 addressing and the protocols used to help IP function on your network. As well as the familiar Internet (with uppercase “I”), the term internet (with lowercase “i”) can refer to any network (usually a wide area network) that uses the Internet Protocol. This guide concentrates on this definition—a generalized network that uses IP as its network protocol. Products and software version that apply to this guide This guide applies to all AlliedWare Plus™ products, running version 5.4.4 or later. However, feature support and implementation varies between products. To see whether a product supports a particular feature or command, see the following documents: The product’s Datasheet The AlliedWare Plus Datasheet The product’s Command Reference These documents are available from the above links on our website at alliedtelesis.com. Feature support may change in later software versions. For the latest information, see the above documents. C613-22007-00 REV I alliedtelesis.com Internet Protocol (IP) Addressing and Protocols Content Introduction .........................................................................................................................................1 Products and software version that apply to this guide ...............................................................1 Assigning an IP Address .....................................................................................................................3
    [Show full text]
  • Chapter 5 Link Layer
    Chapter 5 Link Layer Computer Networking: A Top Down Approach th 6 edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Link Layer 5-1 Chapter 5: Link layer our goals: v understand principles behind link layer services: § error detection, correction § sharing a broadcast channel: multiple access § link layer addressing § local area networks: Ethernet, VLANs v instantiation, implementation of various link layer technologies Link Layer 5-2 Link layer, LANs: outline 5.1 introduction, services 5.5 link virtualization: 5.2 error detection, MPLS correction 5.6 data center 5.3 multiple access networking protocols 5.7 a day in the life of a 5.4 LANs web request § addressing, ARP § Ethernet § switches § VLANS Link Layer 5-3 Link layer: introduction terminology: v hosts and routers: nodes global ISP v communication channels that connect adjacent nodes along communication path: links § wired links § wireless links § LANs v layer-2 packet: frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to physically adjacent node over a link Link Layer 5-4 Link layer: context v datagram transferred by transportation analogy: different link protocols over v trip from Princeton to Lausanne different links: § limo: Princeton to JFK § e.g., Ethernet on first link, § plane: JFK to Geneva frame relay on § train: Geneva to Lausanne intermediate links, 802.11 v tourist = datagram on last link v transport segment = v each link protocol
    [Show full text]
  • Address Resolution Protocol
    Cmpt 471 ARP Address Resolution Protocol @ In order to send an IP packet from one host to another, we need to know the IP address. But often that’s not enough. More than likely, we have to deliver this packet over a LAN, and that means we have to know how to address the frame that will transport the packet over the LAN. @ An example will make this clear. If you go to the Network Lab and look at the host summer, you’ll see that it has only one interface, connected to the net16 Ethernet segment. If you examine summer’s routing table, you’ll find an entry similar to this: Destination Gateway Genmask Metric Iface 172.18.0.0 172.16.1.254 255.255.0.0 1 eth0 The entry says that when summer wants to send an IP packet to a destination address that matches 172.18.0.0/16, the packet should be sent to the net16 interface on the Cisco router, which has IP address 172.16.1.254. Suppose that summer wants to send an IP packet to the workstation july, using the IP address 172.18.1.7 (the eth1 interface on july). Summer con- structs in IP packet with source address 172.16.1.13 and destination ad- dress 172.18.1.7 (hex ac.12.01.07). Applying the IP routing algorithm, ac.12.01.07 ∧ ff.ff.00.00 = ac.12.00.00 = 172.18.0.0 so summer should use its eth0 interface and send this packet to the gateway at IP address 172.16.1.254.
    [Show full text]