cos 420 day 8. agenda assignment 2 due i’ll have assignment 3 ready by next class will be due...
Post on 21-Dec-2015
214 views
TRANSCRIPT
![Page 1: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/1.jpg)
COS 420
Day 8
![Page 2: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/2.jpg)
Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class
Will be due after brake and will cover Chap 11 through Chap 15
Midterm Exam on Feb 27 due Mar 2 Chap 1-12 All short essays
More than 10 and should be less than 20 Entire class period
Today we will look at Supernetting, CIDR and layering
![Page 3: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/3.jpg)
Classless Inter-DomainRouting (CIDR) Problem
Continued exponential Internet growth Subnetting insufficient Limited IP addresses (esp. Class B)
Dire prediction made in 1993: We will exhaust the address space ‘‘in
a few years’’. Note: address space is not near
exhaustion
![Page 4: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/4.jpg)
CIDR Addressing Solution to problem
Temporary fix until next generation of IP Backward compatible with classfull
addressing Extend variable-length subnet technology to
prefixes CIDR was predicted to work ‘‘for a few
years’’ Extremely successful! Will work for at least 25 years!
![Page 5: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/5.jpg)
One Motivation For CIDR: Class C netwroks Fewer than seventeen thousand Class B
numbers (total) More than two million Class C network
numbers No one wants Class C (too small) CIDR allows
Merging 256 (or more) Class C numbers into a single prefix that is equivalent to Class B
Splitting a Class B along power of two boundaries
![Page 6: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/6.jpg)
CIDR Notation Addresses written NUMBER/m
NUMBER is IP prefix m is ‘‘address mask’’ length
255.255.0.0 become /16 255.255.255.0 becomes /24 255.255.255.192 becomes /26
Example 214.5.48.0/20 Prefix occupies 20 bits Suffix occupies 12 bits
Mask values must be converted to dotted decimal when configuring a router (and binary internally)
![Page 7: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/7.jpg)
Route Proliferation
If classfull routing used, CIDR addresses result in more routes
Example: Single CIDR prefix spans 256 Class C
network numbers (supernetting) Classful routing table requires 256
separate entries
![Page 8: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/8.jpg)
Route Condensation
Solution: change routing as well as addressing
Store address mask with each route Send pair of (address, mask)
whenever exchanging routing information
Known as a CIDR block 128.10.128.0/25
![Page 9: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/9.jpg)
Example Of A CIDR Block
![Page 10: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/10.jpg)
Dotted Decimal Equivalents
![Page 11: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/11.jpg)
Example Of /30 CIDR Block
![Page 12: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/12.jpg)
Implementation Of CIDR Route Lookup
Each entry in routing table has address plus mask
Search is organized from most-specific to least-specific (i.e., entry with longest mask is tested first)
Known as longest-prefix lookup or longest-prefix search
![Page 13: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/13.jpg)
Implementing Longest-Prefix Matching
Cannot easily use hashing Data structure of choice is binary
trie Identifies unique prefix needed to
match route
![Page 14: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/14.jpg)
Example Of Unique Prefixes
![Page 15: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/15.jpg)
Example Binary Trie For The Seven Prefixes
![Page 16: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/16.jpg)
Modifications And Extensions Several variations of trie data
structures exist PATRICIA trees Level-Compressed tries (LC-tries)
Motivation Handle longest-prefix match Skip levels that do not distinguish
among routes
![Page 17: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/17.jpg)
Non=routable Addresses CIDR blocks reserved for use within a site Must never appear on the Internet ISPs do not maintain routes Also called private addresses or RFC 1918
addresses
![Page 18: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/18.jpg)
Summary Original IP addressing scheme was classful Two extensions added
Subnet addressing CIDR addressing
Subnetting used only within a site CIDR used throughout the Internet Both use 32-bit address mask
CIDR mask identifies division between network prefix and host suffix
Subnet mask identifies boundary between subnet and individual host
![Page 19: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/19.jpg)
Summary(continued) Single unified routing algorithm handles routes
that are Network-specific Subnet-specific Host-specific Limited broadcast Directed broadcast to network Directed broadcast to subnet Default
Longest-prefix match required Typical implementation: binary trie
![Page 20: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/20.jpg)
PART XI
PROTOCOL LAYERING
![Page 21: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/21.jpg)
Motivation For Layering Communication is difficult to
understand Many subproblems
Hardware failure Network congestion Packet delay or loss Data corruption Data duplication or inverted arrivals
![Page 22: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/22.jpg)
Solving The Problem
Divide the problem into pieces Solve subproblems separately Combine into integrated whole Result is layered protocols
![Page 23: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/23.jpg)
Protocol Layering
Separates protocol functionality Each layer solves one part of the
communication problem Intended primarily for protocol
designers Set of layers is called a protocol
stack
![Page 24: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/24.jpg)
Concept Of Layering
![Page 25: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/25.jpg)
A More Realistic Layer
![Page 26: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/26.jpg)
Layering In An Internet
![Page 27: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/27.jpg)
Examples Of Layering Two models exist ISO 7-layer reference model for Open
System Interconnection (OSI) Predates TCP/IP Does not include an Internet layer Prescriptive (designed before protocols)
Internet 5-layer reference model Designed for TCP/IP Descriptive (designed along with actual
protocols)
![Page 28: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/28.jpg)
ISO (or OSI) 7-Layer Reference Model
![Page 29: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/29.jpg)
TCP/IP 5-Layer Reference Model
![Page 30: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/30.jpg)
Comparison of Models
![Page 31: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/31.jpg)
TCP/IP Layer 1: Physical Hardware
Defines electrical signals used in communication (e.g., voltages on wires between two computers)
Uninteresting except to electrical engineers
![Page 32: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/32.jpg)
TCP/IP Layer 2: Network Interface
Defines communication between computer and network hardware
Isolates details of hardware (MAC) addressing
Example protocol: ARP Code is usually in the operating
system
![Page 33: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/33.jpg)
TCP/IP Layer 3: Internet
Protocol is IP Provides machine to machine
communication Defines best-effort, connectionless
datagram delivery service for the Internet
Code is usually in the operating system
![Page 34: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/34.jpg)
TCP/IP Layer 4: Transport
Provides end-to-end connection from application program to application program
Often handles reliability, flow control
Protocols are TCP and UDP Code is usually in the operating
system
![Page 35: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/35.jpg)
TCP/IP Layer 5: Application
Implemented by application programs
Many application-specific protocols in the Internet
Built on top of transport layer
![Page 36: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/36.jpg)
Two Differences Between TCP/IPAnd Other Layered Protocols
TCP/IP uses end-to-end reliability instead of link-level reliability
TCP/IP places the locus of intelligence and decision making at the edge of the network instead of the core
![Page 37: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/37.jpg)
The Layering Principle
Software implementing layer n at the destination receives exactly the message sent by software implementing layer n at the source.
![Page 38: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/38.jpg)
Illustration Of Layering Principle
![Page 39: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/39.jpg)
When A Datagram Traverses The Internet
All layers involved at Original source Ultimate destination
Only up through IP layer involved at Intermediate routers
![Page 40: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/40.jpg)
Illustration Of Layering In An Internet
![Page 41: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/41.jpg)
A Key Definition A protocol is classified as end-to-end
if the layering principle applies from one end of the Internet to the other
Examples IP is machine-to-machine because
layering principle only applies across one hop
TCP is end-to-end because layering principle from original source to ultimate destination
![Page 42: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/42.jpg)
Practical Aspect Of Layering
Multiple protocols at each layer One protocol used at each layer for
given datagram
![Page 43: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/43.jpg)
Example Of Two Protocols At Network Interface Layer: SLIP And PPP
Both used to send IP across Serial data circuit Dialup connection
Each defines standards for Framing (encapsulation) Addressing
Incompatible
![Page 44: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/44.jpg)
Notion Of Multiple Interfaces And Layering
![Page 45: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/45.jpg)
Boundaries In The TCP/IP Layering Model High-level protocol address
boundary Division between software that uses
hardware addresses and software that uses IP addresses
Operating system boundary Division between application program
running outside the operating system and protocol software running inside the operating system
![Page 46: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/46.jpg)
The Consequence Of An Address Boundary
Application programs as well as all protocol software from the Internet layer upward use only IP addresses; the network interface layer handles physical addresses.
![Page 47: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/47.jpg)
Illustration Of The Two Boundaries
![Page 48: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/48.jpg)
Handling Multiple Protocols Per Layer
Sender places field in header to say which protocol used at each layer
Receiver uses field to determine which protocol at next layer receives the packet
Known as multiplexing and demultiplexing
![Page 49: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/49.jpg)
Example Of Demultiplexing An Incoming Frame
![Page 50: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/50.jpg)
Example Of Demultiplexing Performed By IP
![Page 51: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/51.jpg)
Example Of Demultiplexing Performed By TCP
TCP is part of operating system Transfer to application program must
cross operating system boundary
![Page 52: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/52.jpg)
Discussion
What are the key advantages and disadvantages of multiplexing / demultiplexing?
Can you think of an alternative?
![Page 53: COS 420 Day 8. Agenda Assignment 2 Due I’ll have Assignment 3 ready by next class Will be due after brake and will cover Chap 11 through Chap 15 Midterm](https://reader030.vdocument.in/reader030/viewer/2022032704/56649d545503460f94a30c97/html5/thumbnails/53.jpg)
Summary Layering
Intended for designers Helps control complexity in protocol design
TCP/IP uses 5-layer reference model Conceptually, a router only needs layers
2 and 3, and a host needs all layers IP is machine-to-machine protocol TCP is end-to-end protocol Demultiplexing used to handle multiple
protocols at each layer