Internet Routing Protocols Lecture 01

Total Page:16

File Type:pdf, Size:1020Kb

Internet Routing Protocols Lecture 01 Internet Routing Protocols Lecture 01 Advanced Systems Topics Lent Term, 2008 Timothy G. Griffin Computer Lab Cambridge UK Common View of the Telco Network Brick 1 Common View of the IP Network (Layer 3) IP routing is the little bit-o-smarts left in the IP network layer • Dynamic Routing protocols are used to implement and maintain connectivity in the Internet. • Which protocols are used? • How do they work? • How do they behave? • What are some of the fundamental tradeoffs in the design space of routing protocols? 2 Outline • Lecture 1 : Routing vs. Forwarding. Internet routing architecture • Lecture 2: Intra-domain routing with “shortest paths”. Link-state vs. distance- vector. • Lecture 3 : Inter-domain routing. The Border Gateway Protocol (BGP) • Lecture 4 : BGP continued • Lecture 5 : BGP dynamics • Lecture 6 : BGP routing anomalies 3 4 GARR-B 5 wiscnet.net UW-Superior Rice Lake Rhinelander Stiles UW-Stout Wausau Jct. UW-River Falls Marshfield UW-Eau Claire Clintonville er '02) (Summ Qwest UW-Stevens Point and Other UW-Green Bay (Sum Provider(s) mer '02) Fox Valley TC (S ( u S m u m UW-Oshkosh m e r m ' 0 e 2 UW-La Crosse r ) ' 0 3 La Crosse ) Portage Internet 2 & Qwest Dodgeville Genuity UW-Madison (Summer '03) UW-Milwaukee GO BUCKY! ( UW-Whitewater W UW-Parkside UW-Platteville i n t e r Gigabit Ethernet ' 0 2 OC-12 (622Mbps) ) OC-3 (155Mbps) Chicago ! Peering - Public and Private 2) r '0 Chicago - 2 DS-3 (45Mbps) ! Commodity Internet Transit inte (W (Winter '02) ! Internet2 T1 (1.5Mbps) ! Merit and Other State Networks Chicago - 1 ! National Education Network ! Regional Research Peers 6 WorldCom (UUNet) Internet Initiative Japan (IIJ) 7 Telstra international Anchorage, AK AT&T IP Backbone Year end 2001 Seattle Spokane Portland Worcester Portland Manchester Minneapolis Albany R St. Paul Glenvie Syracuse Rochester Cambridge Milwaukee w Hartford Framingham Madison Grand Wayne Rolling Rapids Birmingham Buffalo R Stamford PProrovvidideennccee Meadows R Bridgepor Detroit Harrisburg t Des Moines New Brunswick NYC White Oak Plains Salt Lake Davenport Plymouth Phil Cedar Knolls Brook Pittsburgh Sacramento City Chicago Wash. Rochelle Pk R Cleveland Akron San South Bend Hamilton R R Omaha DC San Las Chicago Silver R Square Francisco Denver Dayto Columbus Newark Francisco Vegas n Springs Baltimore Freehold Kansas Indianapolis Bohemia City Arlington R Cincinnati R NYC- Bdwy Oakland Florissant Norfolk San Jose Colorado Camden, St Louis NJ R Springs Louisville Richmond Redwood R City Raleigh Sherman OakLs os Angeles Albuquerque Oklahom Nashville Greensboro a Tulsa Charlotte Honolulu San City Bernardino LA-Airport Blvd Little Rock Anaheim Memphis Garden Birmingham Columbia a Phoenix Norcross Dunwoody San Diego Gateway Node Atlanta Ft. Worth Dallas Backbone Node Jacksonville Remote GSR Access Router New Orleans R Austin Orlando Remote Access Router Houston San Antonio R N X DS3 Tampa W. Palm Beach Note: Connectivity and N X OC3 nodes shown are R Ft. Lauderdale Ft. Ojus targeted for deployment; Lauderdale N X OC12 actual deployment Miami N X OC48 San Juan PR may vary. Maps should NX OC192 not be used to predict service availability. Rev. 6-4-01 8 Architecture of Dynamic Routing IGP BGP AS 1 IGP = Interior Gateway Protocol. Metric based. IGP OSPF, IS-IS, RIP, EIGRP (cisco) AS 2 EGP = Exterior Gateway Protocol. Policy Based. Only one: BGP The Routing Domain of BGP is the entire Internet How many ASN are used today? http://bgp.potaroo.net Jan 28. 2008 9 Routers Talking to Routers (The “control plane”) Routing info Routing info • Routing computation is distributed among routers within a routing domain • Computation of best next hop based on routing information is the most CPU/memory intensive task on a router • Routing messages are usually not routed, but exchanged via layer 2 between physically adjacent routers (internal BGP and multi-hop external BGP are exceptions) Technology of Distributed Routing Link State Vectoring • Topology information is • Each router knows little about flooded within the routing network topology domain • Only best next-hops are chosen • Best end-to-end paths are by each router for each destination network. computed locally at each router. • Best end-to-end paths result • Best end-to-end paths from composition of all next- determine next-hops. hop choices • Based on minimizing some • Does not require any notion of notion of distance distance • Works only if policy is shared • Does not require uniform and uniform policies at all routers • Examples: OSPF, IS-IS • Examples: RIP, BGP 10 The Gang of Four Link State Vectoring OSPF IGP RIP IS-IS EGP BGP The standard model data received data sent Application Application Presentation Presentation Session Session Transport Transport Network Network DataLink DataLink Physical Physical 22 11 All Hail the IP Datagram! 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ H |Version| IHL | Service Type | Total Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ E | Identification |Flags| Fragment Offset | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ A | Time to Live | Protocol | Header Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ D | Source Address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ E | Destination Address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ R | Options | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : : D : : | | A + ... up to 65,515 octets of data ... + | | T + + | | A +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 23 shaded fields little-used today 1981, RFC 791 IP Hour Glass Networking Applications Remote Access Voice e-stuff email file transfer Multimedia Web TCP VPN IP Minimalist network layer Frame ATM Ethernet SONET DWDM X.25 FDDI Networking Technologies 24 12 Best Effort, Connectionless, Connectivity IP traffic 135.207.49.8 192.0.2.153 The is the fundamental service provided by Internet Service Providers (ISPs) All other IP services depend on connectivity: DNS, email, VPNs, Web Hosting, … IP is a Network Layer Protocol Separate physical networks glued together into one Application logical network Application Presentation Router Presentation Session Session Transport Transport Network Network Network DataLink 1 DataLink 1 DataLink 2 DataLink 2 Physical 1 Physical 1 Physical 2 Physical 2 Medium 1 Medium 2 26 13 Hosts, Networks, and Routers Host 7 Host 1 Network A Host 2 Host 1 Router Network C Network B Unique IP Address = Network Number + Host Number Host 12 Host 2 27 Actually, IP addresses Identify Interfaces Host 7 Host 1 Network A Network C, Host 3 Network A, Host 2 Host 1 Host 3 Network B, Network C Network B Host 77 Machines can have more than one IP address. Host 12 Host 2 All routers do! 28 14 IP Forwarding Table Destination Next Hop Interface Net A Router 1 INT 7 Net B Direct INT 4 Net C, Host 3 Router 2 INT 3 Net C Router 1 INT 7 A destination is usually The next hop is A physical interface a network. May also be either a directly a host, or a “gateway connected network or a of last resort” (default) router on a directly 29 connected network IP Forwarding Process 1. Remove a packet 2. Check for sanity, 4. Place packet on from an input decrement TTL correct output queue field queue Forwarding Process 3. Match packet’s If queues If queues destination to get full, just get full, just a table entry drop packets! drop packets! IP Forwarding Table Router 30 15 IPv4 Addresses are 32 Bit Values 11111111 00010001 10000111 00000000 255 17 134 0 255.17.134.0 Dotted quad notation IPv6 addresses have 128 bits 31 IP Addresses come in two parts 11111111 00010001 10000111 00000000 Network Number Host Number Where is this dividing line? Well, that depends .... 32 16 Classful Addresses Class A 0nnnnnnn hhhhhhhh hhhhhhhh hhhhhhhh Class B 10nnnnnn nnnnnnnn hhhhhhhh hhhhhhhh Class C 110nnnnn nnnnnnnn nnnnnnnn hhhhhhhh n = network address bit h = host identifier bit Leads to a rigid, flat, inefficient use of address space … 33 RFC 1519: Classless Inter-Domain Routing (CIDR) Use two 32 bit numbers to represent a network. Network number = IP address + Mask IP Address : 12.4.0.0 IP Mask: 255.254.0.0 Address 00001100 00000100 00000000 00000000 Mask 11111111 11111110 00000000 00000000 Network Prefix for hosts Usually written as 12.4.0.0/15 34 17 Which IP Addresses are Covered by a Prefix? 12.5.9.16 is covered by prefix 12.4.0.0/15 12.5.9.16 00001100 00000101 00001001 00010000 00001100 00000100 00000000 00000000 12.4.0.0/15 11111111 11111110 00000000 00000000 12.7.9.16 00001100 00000111 00001001 00010000 12.7.9.16 is not covered by prefix 12.4.0.0/15 CIDR allows Hierarchy in Addressing 12.0.0.0/16 : 12.1.0.0/16 12.3.0.0/24 12.2.0.0/16 12.3.1.0/24 : 12.3.0.0/16 : : : 12.0.0.0/8 : 12.3.254.0/24 : 12.253.0.0/19 : 12.253.32.0/19 12.253.64.0/19 12.253.0.0/16 12.253.96.0/19 12.254.0.0/16 12.253.128.0/19 12.253.160.0/19 12.253.192.0/19 36 18 Classless Forwarding Destination =12.5.9.16 ------------------------------- payload Prefix Next Hop Interface OK 0.0.0.0/0 10.14.11.33 ATM 5/0/9 better 12.0.0.0/8 10.14.22.19 ATM 5/0/8 even better 12.4.0.0/15 10.1.3.77 Ethernet 0/1/3 best! 12.5.8.0/23 attached Serial 1/0/7 IP Forwarding Table How Are Forwarding Tables Populated to implement Routing? Statically Dynamically Administrator Routers exchange network reachability manually configures information using ROUTING PROTOCOLS. forwarding table entries Routers use this to compute best routes + More control + Can rapidly adapt to changes + Not restricted to in network topology destination-based + Can be made to scale well forwarding - Complex distributed algorithms - Doesn’t scale - Consume CPU, Bandwidth, Memory - Slow to adapt to - Debugging can be difficult network failures - Current protocols are destination-based In practice : a mix of these.
Recommended publications
  • Chapter 6: Chapter 6: Implementing a Border Gateway Protocol Solution Y
    Chapter 6: Implementing a Border Gateway Protocol Solution for ISP Connectivity CCNP ROUTE: Implementing IP Routing ROUTE v6 Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 6 Objectives . Describe basic BGP terminology and operation, including EBGP and IBGP. ( 3) . Configure basic BGP. (87) . Typical Issues with IBGP and EBGP (104) . Verify and troubleshoot basic BGP. (131) . Describe and configure various methods for manipulating path selection. (145) . Describe and configure various methods of filtering BGP routing updates. (191) Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 2 BGP Terminology, Concepts, and Operation Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 3 IGP versus EGP . Interior gateway protocol (IGP) • A routing protocol operating within an Autonomous System (AS). • RIP, OSPF, and EIGRP are IGPs. Exterior gateway protocol (EGP) • A routing protocol operating between different AS. • BGP is an interdomain routing protocol (IDRP) and is an EGP. Chapter 6 © 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 4 Autonomous Systems (AS) . An AS is a group of routers that share similar routing policies and operate within a single administrative domain. An AS typically belongs to one organization. • A singgpgyp()yle or multiple interior gateway protocols (IGP) may be used within the AS. • In either case, the outside world views the entire AS as a single entity. If an AS connects to the public Internet using an exterior gateway protocol such as BGP, then it must be assigned a unique AS number which is managed by the Internet Assigned Numbers Authority (IANA).
    [Show full text]
  • Understanding Linux Internetworking
    White Paper by David Davis, ActualTech Media Understanding Linux Internetworking In this Paper Introduction Layer 2 vs. Layer 3 Internetworking................ 2 The Internet: the largest internetwork ever created. In fact, the Layer 2 Internetworking on term Internet (with a capital I) is just a shortened version of the Linux Systems ............................................... 3 term internetwork, which means multiple networks connected Bridging ......................................................... 3 together. Most companies create some form of internetwork when they connect their local-area network (LAN) to a wide area Spanning Tree ............................................... 4 network (WAN). For IP packets to be delivered from one Layer 3 Internetworking View on network to another network, IP routing is used — typically in Linux Systems ............................................... 5 conjunction with dynamic routing protocols such as OSPF or BGP. You c an e as i l y use Linux as an internetworking device and Neighbor Table .............................................. 5 connect hosts together on local networks and connect local IP Routing ..................................................... 6 networks together and to the Internet. Virtual LANs (VLANs) ..................................... 7 Here’s what you’ll learn in this paper: Overlay Networks with VXLAN ....................... 9 • The differences between layer 2 and layer 3 internetworking In Summary ................................................. 10 • How to configure IP routing and bridging in Linux Appendix A: The Basics of TCP/IP Addresses ....................................... 11 • How to configure advanced Linux internetworking, such as VLANs, VXLAN, and network packet filtering Appendix B: The OSI Model......................... 12 To create an internetwork, you need to understand layer 2 and layer 3 internetworking, MAC addresses, bridging, routing, ACLs, VLANs, and VXLAN. We’ve got a lot to cover, so let’s get started! Understanding Linux Internetworking 1 Layer 2 vs.
    [Show full text]
  • Overview of Routing Security Landscape for the Quilt Member Meeting, Winter 2019 Mark Beadles, CISO, Oarnet [email protected] BGP IDLE
    Overview of Routing Security Landscape for the Quilt Member Meeting, Winter 2019 Mark Beadles, CISO, OARnet [email protected] BGP IDLE CONNECT ACTIVE OPEN OPEN SENT CONFIRM ESTAB- LISHED 2/13/2019 Routing Security Landscape - The Quilt 2 Overview of Routing Security Landscape • Background • Threat environment • Current best practices • Gaps 2/13/2019 Routing Security Landscape - The Quilt 3 Background - Definitions • BGP • Border Gateway Protocol, an exterior path-vector gateway routing protocol • Autonomous System & Autonomous System Numbers • Collection of IP routing prefixes under control of a network operator on behalf of a single administrative domain that presents a defined routing policy to the Internet • Assigned number for each AS e.g. AS600 2/13/2019 Routing Security Landscape - The Quilt 4 Background - The BGP Security Problem By design, routers running BGP accept advertised routes from other BGP routers by default. (BGP was written under the assumption that no one would lie about the routes, so there’s no process for verifying the published announcements.) This allows for automatic and decentralized routing of traffic across the Internet, but it also leaves the Internet potentially vulnerable to accidental or malicious disruption, known as BGP hijacking. Due to the extent to which BGP is embedded in the core systems of the Internet, and the number of different networks operated by many different organizations which collectively make up the Internet, correcting this vulnerabilityis a technically and economically challenging problem. 2/13/2019 Routing Security Landscape - The Quilt 5 Background – BGP Terminology • Bogons • Objects (addresses/prefixes/ASNs) that don't belong on the internet • Spoofing • Lying about your address.
    [Show full text]
  • Chapter 12, “Configuring Layer 3 Interfaces”
    CHAPTER 12 Configuring Layer 3 Interfaces This chapter contains information about how to configure Layer 3 interfaces on the Catalyst 6500 series switches, which supplements the information and procedures in the Release 12.1 publications at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/index.htm This chapter consists of these sections: • Configuring IP Routing and Addresses, page 12-2 • Configuring IPX Routing and Network Numbers, page 12-6 • Configuring AppleTalk Routing, Cable Ranges, and Zones, page 12-7 • Configuring Other Protocols on Layer 3 Interfaces, page 12-8 Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E 78-14099-04 12-1 Chapter 12 Configuring Layer 3 Interfaces Configuring IP Routing and Addresses Note • For complete syntax and usage information for the commands used in this chapter, refer to the Catalyst 6500 Series Switch Cisco IOS Command Reference publication and the Release 12.1 publications at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/index.htm • Release 12.1(13)E and later releases support configuration of 4,096 Layer 3 VLAN interfaces. – We recommend that you configure a combined total of no more than 2,000 Layer 3 VLAN interfaces and Layer 3 ports on an MSFC2 with either Supervisor Engine 1 or Supervisor Engine 2. – We recommend that you configure a combined total of no more than 1,000 Layer 3 VLAN interfaces and Layer 3 ports on an MSFC. • With releases earlier than Release 12.1(13)E, an MSFC2 with either Supervisor Engine 1 or Supervisor Engine 2 supports a combined maximum of 1,000 Layer 3 VLAN interfaces and Layer 3 ports.
    [Show full text]
  • TCP/IP Protocol Suite
    TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets of user commands. So if I was talking online with someone at S.D.C. and I wanted to talk to someone I knew at Berkeley or M.I.T. about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them. I said, oh, man, it's obvious what to do: If you have these three terminals, there ought to be one terminal that goes anywhere you want to go where you have interactive computing. That idea is the ARPANET." – New York Times Interview: December 20, 1999 Overview • Terminology • History • Technical Details: – TCP – IP – Related Protocols • Physical Media • Social Implications • Economic Impact 3 Terminology • Protocol – A set of rules outlining the format to be used for communication between systems • Domain Name System (DNS) – Converts an Internet domain into an IP address • Router – A computer or software package used in packet switched networks to look at the source and destination addresses, and decide where to send the packets • Uniform Resource Indicators – Uniform Resource Location (URL) • How to find the resource: HTTP, FTP, Telnet – Uniform Resource Names (URN) • What the resource is: Not as common as URL 4 History: Pre-TCP/IP • Networks existed and information could be transferred within • Because of differences in network implementation communication between networks different for each application • Need for unification in protocols connecting networks 5 History: TCP/IP Development • 1968: Plans develop for using Interface Message Processors (IMPs) • Dec.
    [Show full text]
  • Introduction to the Border Gateway Protocol – Case Study Using GNS3
    Introduction to The Border Gateway Protocol – Case Study using GNS3 Sreenivasan Narasimhan1, Haniph Latchman2 Department of Electrical and Computer Engineering University of Florida, Gainesville, USA [email protected], [email protected] Abstract – As the internet evolves to become a vital resource for many organizations, configuring The Border Gateway protocol (BGP) as an exterior gateway protocol in order to connect to the Internet Service Providers (ISP) is crucial. The BGP system exchanges network reachability information with other BGP peers from which Autonomous System-level policy decisions can be made. Hence, BGP can also be described as Inter-Domain Routing (Inter-Autonomous System) Protocol. It guarantees loop-free exchange of information between BGP peers. Enterprises need to connect to two or more ISPs in order to provide redundancy as well as to improve efficiency. This is called Multihoming and is an important feature provided by BGP. In this way, organizations do not have to be constrained by the routing policy decisions of a particular ISP. BGP, unlike many of the other routing protocols is not used to learn about routes but to provide greater flow control between competitive Autonomous Systems. In this paper, we present a study on BGP, use a network simulator to configure BGP and implement its route-manipulation techniques. Index Terms – Border Gateway Protocol (BGP), Internet Service Provider (ISP), Autonomous System, Multihoming, GNS3. 1. INTRODUCTION Figure 1. Internet using BGP [2]. Routing protocols are broadly classified into two types – Link State In the figure, AS 65500 learns about the route 172.18.0.0/16 through routing (LSR) protocol and Distance Vector (DV) routing protocol.
    [Show full text]
  • Lab 2.8.1: Basic Static Route Configuration
    Lab 2.8.1: Basic Static Route Configuration Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 172.16.3.1 255.255.255.0 N/A R1 S0/0/0 172.16.2.1 255.255.255.0 N/A Fa0/0 172.16.1.1 255.255.255.0 N/A R2 S0/0/0 172.16.2.2 255.255.255.0 N/A S0/0/1 192.168.1.2 255.255.255.0 N/A FA0/0 192.168.2.1 255.255.255.0 N/A R3 S0/0/1 192.168.1.1 255.255.255.0 N/A PC1 NIC 172.16.3.10 255.255.255.0 172.16.3.1 PC2 NIC 172.16.1.10 255.255.255.0 172.16.1.1 PC3 NIC 192.168.2.10 255.255.255.0 192.168.2.1 Learning Objectives Upon completion of this lab, you will be able to: • Cable a network according to the Topology Diagram. • Erase the startup configuration and reload a router to the default state. • Perform basic configuration tasks on a router. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 20 CCNA Exploration Routing Protocols and Concepts: Static Routing Lab 2.8.1: Basic Static Route Configuration • Interpret debug ip routing output. • Configure and activate Serial and Ethernet interfaces. • Test connectivity. • Gather information to discover causes for lack of connectivity between devices. • Configure a static route using an intermediate address.
    [Show full text]
  • IP Routing & Protocols
    Lecture 11: IP routing, IP protocols Contents n Routing principles n Local datagram delivery n ICMP Protocol n UDP Protocol n TCP/IP Protocol n Assuring requirements for streaming TPC n Building and terminating TCP connection n API for network services (brief info on sockets) AE4B33OSS Lecture 11 / Page 2 Silberschatz, Galvin and Gagne ©2005 Datagram routing (1) n Routing is a decision making process on where to forward the datagram (or its fragment). l Any device making such decision is called router l Routing can be direct or indirect Direct routing occurs when the destination host is a part of the LAN directly connected to the router so that the datagram can be delivered directly to the destination. All other cases represent indirect routing l Routers in the Internet form a cooperative interconnected structure. Datagrams pass from router to router until they reach a router capable to deliver directly (locally) to the destination l Table driven routing Every router maintains a routing table with entries in the form of pairs (N, G), where N is netid of the destination network and G is the IP address of the ªnext routerº along the path to the destination network N. The ªnext routerº must be reachable directly so that the datagram can be forwarded there without further routing AE4B33OSS Lecture 11 / Page 3 Silberschatz, Galvin and Gagne ©2005 Datagram routing (2) 20.0.0.5 30.0.0.6 40.0.0.7 Network Network Network Network 10.0.0.0 F 20.0.0.0 G 30.0.0.0 H 40.0.0.0 10.0.0.5 20.0.0.6 30.0.0.7 Destination is on the net Forward datagram to 20.0.0.0 Deliver directly 30.0.0.0 Deliver directly 10.0.0.0 20.0.0.5 40.0.0.0 30.0.0.7 Routing table of G n Default routes l Often LAN's are connected to the ªrest of worldº through a single router.
    [Show full text]
  • REDDIG II – Computer Networking Training
    REDDIG II – Computer Networking Training JM SANCHEZ / PH RASSAT - 20/06/2012 IP Addressing and Subnetting Invierno 2011 | Capacitacion en fabrica - CORPAC IP Addressing and Subnetting IP Addresses An IP address is an address used to uniquely identify a device on an IP network. The address is made up of 32 binary bits which can be divisible into a network portion and host portion with the help of a subnet mask. 32 binary bits are broken into four octets (1 octet = 8 bits) Dotted decimal format (for example, 172.16.254.1) REDDIG II | Network Course | Module 2 | 3 IP Addressing and Subnetting Binary and Decimal Conversion REDDIG II | Network Course | Module 2 | 4 IP Addressing and Subnetting IP Address Classes • IP classes are used to assist in assigning IP addresses to networks with different size requirements. • Classful addressing: REDDIG II | Network Course | Module 2 | 5 IP Addressing and Subnetting Private Address Range • Private IP addresses provide an entirely separate set of addresses that still allow access on a network but without taking up a public IP address space. • Private addresses are not allowed to be routed out to the Internet, so devices using private addresses cannot communicate directly with devices on the Internet. REDDIG II | Network Course | Module 2 | 6 IP Addressing and Subnetting Network Masks • Distinguishes which portion of the address identifies the network and which portion of the address identifies the node. • Default masks: Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0 • Once you have the address and the mask represented in binary, then identification of the network and host ID is easier.
    [Show full text]
  • IP Routing and Mobility
    IP Routing and Mobility Cristina Hristea and Fouad Tobagi Stanford University {christea,tobagi}@Stanford.edu Abstract. The original design of the Internet and its underlying protocols did not anticipate users to be mobile. With the growing interest in supporting mobile users and mobile computing, a great deal of work is taking place to solve this problem. For a solution to be practical, it has to integrate easily with existing Internet infrastructure and protocols, and offer an adequate migration path toward what might represent the ultimate solution. In that respect, the solution has to be incrementally scalable to handle a large number of mobile users and wide geographical scopes, and well performing so as to support all application requirements including voice and video communications and a wide range of mobility speeds. In this paper, we present a survey of the state-of-the- art and propose a multi-layer architecture for mobility in IP networks. In particular, we propose the use of extended local area networks and protocols for efficient and scalable mobility support in the Internet. 1 Introduction In the broadest sense, the term mobile networking refers to a system that allows users to maintain network connectivity while moving from one location to another. Mobility is often associated with wireless technologies that require mobile networks to support continuous movement, at high speeds and for long periods of time. Recently, there has been an explosive growth in wireless devices with built in access to the Internet. In the near future, large numbers of mobile users will access the Internet for a variety of high-speed multimedia services.
    [Show full text]
  • BGP: Border Gateway Protocol an Interdomain Routing Protocol
    LAB 8 BGP: Border Gateway Protocol An Interdomain Routing Protocol OBJECTIVES The objective of this lab is to simulate and study the basic features of an interdomain routing protocol called Border Gateway Protocol (BGP). OVERVIEW The Internet is organized as a set of routing domains. Each routing domain is called an autonomous system (AS). Each AS is controlled by a single administrative entity (e.g., an AS of 75 a single service provider). Each AS has a unique 16-bit identifi cation number. This number is assigned by a central authority. An AS uses its own intradomain routing protocol (e.g., RIP or OSPF). An AS establishes routes with other ASs through interdomain routing protocols. The Border Gateway Protocol (BGP) is one of the well-known interdomain routing protocols. The main goal of BGP is to fi nd any path to the destination that is loop-free. This is different from the common goal of intradomain routing protocols, which is to fi nd an optimal route to the destination based on a specifi c link metric. The routers that connect different ASs are called border gateways . The task of the border gateways is to forward packets between ASs. Each AS has at least one BGP speaker. BGP speakers exchange reachability information among ASs. BGP advertises the complete path to the destination AS as an enumerated list. In this way, routing loops can be avoided. A BGP speaker can also apply some policies such as balancing the load over the neighboring ASs. If a BGP speaker has a choice of several different routes to a destination, it will advertise the best one according to its own local policies.
    [Show full text]
  • Network Layer/Internet Protocols Ip
    04 2080 CH03 8/16/01 1:34 PM Page 61 CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: • IP operation, fields and functions • ICMP messages and meanings • Fragmentation and reassembly of datagrams IP IP (Internet Protocol) does most of the work in the TCP/IP protocol suite. All protocols and applications within the TCP/IP suite run on top of IP and utilize it for logical Network layer addressing and transmission of datagrams between internet hosts. IP maps to the Internet layer of the DoD and to the Network layer of the OSI models. ICMP (Internet Control Message Protocol) is considered an integral part of IP and uses IP for its datagram delivery; we will dis- cuss ICMP later in this chapter. Figure 3.1 shows how IP maps to the DoD and OSI models. How Do I Buy a Ticket on the IP Train? The phrase ”runs on top of” might sound as if an application or protocol is buying a ticket to ride on an IP train. This term is not restricted to IP. In reality, it is industry jargon used to describe any upper- layer protocol or application coming down the OSI model and utilizes another lower-layer protocol’s features (in this case IP at the Network layer). IP provides an unreliable, connectionless datagram delivery service, which means that IP does not guarantee that an IP datagram successfully reaches its destination; rather it provides best effort of delivery, which means it sends it out and hopes it gets there.
    [Show full text]