![Page 1: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/1.jpg)
A Review of Evolving Network Technology
Ethernet & IP
With associated infrastructure.
J.J. EkstromIT 529
Thursday, January 15, 2015
![Page 2: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/2.jpg)
Who is winning? Ethernet has won the LAN wars Ethernet is winning the MAN wars
– Utopia, iProvo, Comcast.. Ethernet is contending for part of the WAN… PPOE (Point to
Point over Ethernet) IP has won all best-effort wars wars…
– Most ATM traffic is IP– A large portion of Sonet Traffic is IP
IETF and Vendors making IP transport of choice– Voice over IP – IP Multicast Streaming
Pretty much everything new assumes Ethernet packets with IP in them.
![Page 3: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/3.jpg)
Why?
Simple transports Work faster and cheaper Put the smarts where it can work for more
transports Not as much advantage to smarter
transports
![Page 4: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/4.jpg)
Ethernet Characteristics
Ethernet shared media cable Cable access method (CSMA/CD) Unreliable Packet Delivery Assumes higher layers do most of the work Simple and Relatively fast on whatever
physical transport with any generation of hardware.
![Page 5: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/5.jpg)
Ethernet Shared Media Cable 1
Physics determined the maximum length of the Ethernet cable– signal strength– cable characteristics
![Page 6: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/6.jpg)
Ethernet Shared Media Cable 2
All stations (nodes) hook to, and share a single cable
![Page 7: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/7.jpg)
Ethernet Shared Media Cable 3
Each station “listens” as it transmits
![Page 8: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/8.jpg)
Ethernet Shared Media Cable 4
Each station must transmit a minimum of 64 bytes to “fill” the cable before it stops listening
64 bytes min.
![Page 9: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/9.jpg)
Ethernet Shared Media Cable 5
If a 2nd node transmits before the 1st node finishes, the two transmissions collide and they must retransmit
64 bytes min. 64 bytes min.
![Page 10: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/10.jpg)
Ethernet Cable Access Method (CSMA/CD)
CSMA/CD is a media-access method used by Ethernet and 802.3 networks
CSMA/CD stands for Carrier Sense, Multiple Access / Collision Detection
![Page 11: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/11.jpg)
How CSMA/CD Works - 1
A station wishing to transmit first listens for traffic on the cable indicated by a carrier signal (CSMA/CD-Carrier Sense)
Network Cable Carrier Signal
![Page 12: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/12.jpg)
How CSMA/CD Works - 2
If the carrier signal is detected, the station waits a period of time and tries again
Network Cable Carrier Signal
![Page 13: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/13.jpg)
How CSMA/CD Works - 3
If NO carrier signal is detected, the station starts transmitting its packet (min. of 64 bytes) and simultaneously listening
Network CableM
IN. O
F 6
4 B
YTE
S
![Page 14: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/14.jpg)
How CSMA/CD Works - 4
TWO stations can start transmitting at the same time (CSMA/CD - Multiple Access)
Network Cable
MIN
. O
F 6
4 B
YTE
S
MIN
. O
F 6
4 B
YTE
S
![Page 15: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/15.jpg)
How CSMA/CD Works - 5
If this happens, both stations hear garbage (CSMA/CD - Collision Detection)
Network Cable
MIN
. O
F 6
4 B
YTES
MIN
. O
F 6
4 B
YTES@&*!
![Page 16: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/16.jpg)
How CSMA/CD Works - 6
When collisons are detected, both stations :– cancel transmissions by sending a jam signal– wait a random amount of time before trying to
transmit again
Network Cable
JAM
SIG
NA
L
JAM
SIG
NA
L
![Page 17: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/17.jpg)
PROBLEM #1
Physics doesn’t allow you to have LAN wires as long as you would like.
![Page 18: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/18.jpg)
SOLUTION #1
Repeater extended wire length, broadcast domain, and collision domain
Repeater
![Page 19: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/19.jpg)
PROBLEM #2
Too many collisions. LAN wouldn’t carry enough traffic.
![Page 20: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/20.jpg)
SOLUTION #2
Bridging segments extends broadcast domain without collisions: Bigger LANs
BRIDGE
![Page 21: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/21.jpg)
PROBLEM #3 Broadcast storms - result from multi-port
bridges “flooding” all ports when packet destination is unknown and a loop exists.
BRIDGE 1
BRIDGE 3 BRIDGE 2
64 bytes min.
Packet returningto original bridge
![Page 22: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/22.jpg)
PROBLEM #3– when the original packet returns to a previous
bridge, new packets are generated and a “storm” is generated.
BRIDGE
BRIDGE BRIDGE
Cycle Repeats
![Page 23: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/23.jpg)
SOLUTION #3
3.1 - 802.1D (spanning tree) installed on bridges.
3.2 - Routers
![Page 24: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/24.jpg)
SOLUTION #3.1
802.1D (Spanning Tree) added to bridges. – Spanning Tree is an algorithm that runs on
bridges to eliminate loops dynamically.
802.1DBRIDGE 1
802.1DBRIDGE 3
802.1DBRIDGE 2
64 bytes min.
802.1D (SpanningTree) determines thatthis link is redundant
and shuts it down
![Page 25: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/25.jpg)
SOLUTION #3.2 Routers - make every segment another
network or subnet by refusing to pass through any packet whose address it does not recognize.
BRIDGE 1
BRIDGE 2
64 bytes min.
RouterBRIDGE 3
![Page 26: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/26.jpg)
SOLUTION #3.2 NOTE:
– in XNS a single broadcast domain is called a “network.”
– in TCP a single broadcast domain is called a “subnet.”
– network personnel often call a collision domain a “segment.”
![Page 27: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/27.jpg)
PROBLEM #4 Topology and failure characteristics -
problems with bus-oriented LANs (i.e., when the wire breaks NONE of the stations can communicate).
![Page 28: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/28.jpg)
SOLUTION #4
Twisted pair LANs.– When any one wire segment fails, the whole
LAN does NOT go down.
Concentrator ConcentratorBridge
Concentrator
![Page 29: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/29.jpg)
PROBLEM #5
Not enough Bandwidth– only 10 MBPS available on each collision
domain
BRIDGE
BRIDGE
BRIDGEConcentrator
Concentrator
Concentrator
![Page 30: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/30.jpg)
SOLUTION #5
Switches (multiport Bridges) - allows more segments (bandwidth) at a lower cost per port.
Concentrator
Concentrator
SWITCH
![Page 31: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/31.jpg)
PROBLEM #6
Controlling User Connectivity– keep groups separate– easily share resources between groups– do adds, moves, and changes without rewiring
![Page 32: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/32.jpg)
SOLUTION #6 VLANs of various forms create isolated
broadcast domains (networks) Connection between Virtual LAN networks
requires a router. People do security in their routers and
firewalls at network boundaries anyway
![Page 33: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/33.jpg)
Problem #7
During roughly the same 20-25 year period Token-Ring LANs, FDDI, ATM, and several other LAN and WAN technologies have been undergoing similar evolutionary tracks as ethernet.
It was not clear that there would be a clear winner. How do you hook them together and protect your
technology investments? Users don’t care how their bits get pushed around,
only that things work.
![Page 34: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/34.jpg)
Solution #7
Internetworking…The real reason IP has won the protocol wars.– Works well on P2P links
– Works well on LANs
– Makes very few demands of participant networks
– “Rough consensus and working code” Motto of the IETF The way to get useful things quickly in a world of confusion…
what works best wins.
![Page 35: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/35.jpg)
Internetworking: Internet, intranets
Outline Best Effort Service ModelGlobal Addressing Scheme
![Page 36: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/36.jpg)
IP Internet
Concatenation of Networks
Protocol Stack
R2
R1
H4
H5
H3H2H1
Network 2 (Ethernet)
Network 1 (Ethernet)
H6
Network 3 (FDDI)
Network 4(point-to-point)
H7 R3 H8
R1
ETH FDDI
IPIP
ETH
TCP R2
FDDI PPP
IP
R3
PPP ETH
IP
H1
IP
ETH
TCP
H8
![Page 37: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/37.jpg)
Service Model Connectionless (datagram-based) Best-effort delivery (unreliable service)
– packets are lost– packets are delivered out of order– duplicate copies of a packet are delivered– packets can be delayed for a long time– (Sound like Ethernet?)
Datagram format Version HLen TOS Length
Ident Flags Offset
TTL Protocol Checksum
SourceAddr
DestinationAddr
Options (variable) Pad(variable)
0 4 8 16 19 31
Data
![Page 38: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/38.jpg)
Problem: Different MTU
All LAN Technologies do not have same maximum packet size.
Network layer has no simple way to determine path
Packets dropped if too big to be forwarded
![Page 39: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/39.jpg)
Solution: Fragmentation and Reassembly
Strategy– fragment when necessary (MTU < Datagram)– try to avoid fragmentation at source host– re-fragmentation is possible – fragments are self-contained datagrams– use CS-PDU (not cells) for ATM– delay reassembly until destination host– do not recover from lost fragments
![Page 40: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/40.jpg)
Example
H1 R1 R2 R3 H8
ETH IP (1400) FDDI IP (1400) PPP IP (512)
PPP IP (376)
PPP IP (512)
ETH IP (512)
ETH IP (376)
ETH IP (512)
Ident = x Offset = 0
Start of header
0
Rest of header
1400 data bytes
Ident = x Offset = 0
Start of header
1
Rest of header
512 data bytes
Ident = x Offset = 512
Start of header
1
Rest of header
512 data bytes
Ident = x Offset = 1024
Start of header
0
Rest of header
376 data bytes
![Page 41: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/41.jpg)
Problem: Global Routing
Next hop is always a local decision How do you know which way to send a
packet?
![Page 42: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/42.jpg)
Global Addresses Properties
– globally unique– hierarchical: network + host
Dot Notation– 10.3.2.4– 128.96.33.81– 192.12.69.77
Network Host
7 24
0A:
Network Host
14 16
1 0B:
Network Host
21 8
1 1 0C:
![Page 43: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/43.jpg)
Datagram Forwarding Strategy
– every datagram contains destination’s address– if directly connected to destination network, then forward to host– if not directly connected to destination network, then forward to
some router– forwarding table maps network number into next hop– each host has a default router– each router maintains a forwarding table
Example (R2) Network Number Next Hop 1 R3 2 R1 3 interface 1 4 interface 0
![Page 44: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/44.jpg)
Problem: Network Address binding
Network Layer Address is logical and global MAC addresses are bound to physical network Point-to-Point may have no physical address
![Page 45: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/45.jpg)
Solution: for IPX
Make network address include physical address
16 bit Network number + 48 bit MAC address = 64 bit address
![Page 46: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/46.jpg)
Solution: For IPv4 Map IP addresses into physical addresses
– destination host– next hop router
Techniques– encode physical address in host part of IP address
Assumes fixed host address Doesn’t work with subnets or 48 bit MACs (IP is 32 bits)
– table-based ARP
– table of IP to physical address bindings– broadcast request if IP address not in table– target machine responds with its physical address– table entries are discarded if not refreshed
![Page 47: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/47.jpg)
ARP Details
Request Format– HardwareType: type of physical network (e.g., Ethernet)– ProtocolType: type of higher layer protocol (e.g., IP)– HLEN & PLEN: length of physical and protocol addresses– Operation: request or response – Source/Target-Physical/Protocol addresses
Notes– table entries timeout in about 10 minutes– update table with source when you are the target – update table if already have an entry– do not refresh table entries upon reference
![Page 48: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/48.jpg)
ARP Packet Format
TargetHardwareAddr (bytes 2 – 5)
TargetProtocolAddr (bytes 0 – 3)
SourceProtocolAddr (bytes 2 – 3)
Hardware type = 1 ProtocolType = 0x0800
SourceHardwareAddr (bytes 4 – 5)
TargetHardwareAddr (bytes 0 – 1)
SourceProtocolAddr (bytes 0 – 1)
HLen = 48 PLen = 32 Operation
SourceHardwareAddr (bytes 0 – 3)
0 8 16 31
![Page 49: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/49.jpg)
Solution: IPv6
Make Network Address 128 bits Carry 64 bit IPX addresses Carry 32 bit IP addresses Even carry DEC Net and others But big tables and smart routers!
![Page 50: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/50.jpg)
Internet Control Message Protocol (ICMP)
Echo (ping) Redirect (from router to source host) Destination unreachable (protocol, port, or host) TTL exceeded (so datagrams don’t cycle forever) Checksum failed Reassembly failed Cannot fragment
![Page 51: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/51.jpg)
Problem: Class based
(0)7 bit Class A too few networks, 6 million hosts too many
(10) 15 bit Class B still too few networks, 64,000 hosts still too many.
(110) 23 bit Class C still too few networks 256 hosts too many for many applications.
Address “ownership” companies grow, shrink, die …
![Page 52: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/52.jpg)
Solution: Classless
CIDR – Classless Inter-Domain Routing Block 20 bit network address Class ignored 12 bit host = 4k hosts ISP’s own blocks
![Page 53: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/53.jpg)
Problem: Trust
ISP’s compete for carrier business ISP’s want to give better service to their
own customers Typical routing algorithms require that
routers trust all other routers Rogue routers kill networks
![Page 54: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/54.jpg)
Solution: Different Routing Algorithms
RIP – local routers trust each other OSPF, IGRP, EIGRP– local trust with some
security BGP – Point-to-point manual configuration
Router not obligated to use information.
(How does the Internet ever work?)
![Page 55: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/55.jpg)
Problem: Spanning Tree wastes bandwidth
Blocked links are not used. If they are 10 gig links that is a big deal.
Fail-over times were on the order of 1 minute.
Shutting down the entire spanning tree during recalculation is not acceptable.
![Page 56: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/56.jpg)
Solutions: many small ones
Link aggregation allows redundancy and full use of the bandwidth except during failure.
Rapid Spanning tree allows much faster failover and doesn’t block everything while reconfiguring
Ports connected to end nodes don’t wait at all. (Portfast on cisco)
![Page 57: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/57.jpg)
Problem: Latency in Hierarchy
Datacenters assume that each migration target has similar network performance to other VMs.
Traditional LAN topologies don’t guarantee this.
![Page 58: A Review of Evolving Network Technology Ethernet & IP With associated infrastructure. J.J. Ekstrom IT 529 Thursday, January 15, 2015](https://reader036.vdocument.in/reader036/viewer/2022070409/56649ea05503460f94ba2b23/html5/thumbnails/58.jpg)
Solutions: Stir everything (SDN)