network layer - university of washington

42
Network Layer

Upload: others

Post on 02-May-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Layer - University of Washington

Network Layer

Page 2: Network Layer - University of Washington

Where we are in the Course

•Moving on up to the Network Layer!

CSE 461 University of Washington 2

Physical

Link

Network

Transport

Application

Page 3: Network Layer - University of Washington

Topics

• Network service models• Datagrams (packets), virtual circuits

• IP (Internet Protocol)• Internetworking• Forwarding (Longest Matching Prefix)• Helpers: ARP and DHCP• Fragmentation and MTU discovery• Errors: ICMP (traceroute!)• IPv6, scaling IP to the world• NAT, and “middleboxs”

• Routing Algorithms

CSE 461 University of Washington 3

Page 4: Network Layer - University of Washington

Dynamic Host Configuration Protocol (DHCP)

Page 5: Network Layer - University of Washington

Bootstrapping

•Problem:• A node wakes up for the first time …• What is its IP address? What’s the IP address of its router? • At least Ethernet address is on NIC

CSE 461 University of Washington 5

What’s my IP?

Page 6: Network Layer - University of Washington

Bootstrapping (2)

1. Manual configuration (old days)• Can’t be factory set, depends on use

2. DHCP: Automatically configure addresses • Shifts burden from users to IT folk

CSE 461 University of Washington 6

Use A.B.C.DWhat’s my IP?

Page 7: Network Layer - University of Washington

DHCP

•DHCP (Dynamic Host Configuration Protocol), from 1993, widely used• It leases IP address to nodes•Provides other parameters too

• Network prefix• Address of local router• DNS server, time server, etc.

CSE 461 University of Washington 7

Page 8: Network Layer - University of Washington

DHCP Protocol Stack

•DHCP is a client-server application• Uses UDP ports 67, 68

CSE 461 University of Washington 8

Ethernet

IP

UDP

DHCP

Page 9: Network Layer - University of Washington

DHCP Addressing

•Bootstrap issue:• How does node send a message to DHCP server before it

is configured?

•Answer:• Node sends broadcast messages that delivered to all

nodes on the network• Broadcast address is all 1s• IP (32 bit): 255.255.255.255• Ethernet (48 bit): ff:ff:ff:ff:ff:ff

CSE 461 University of Washington 9

Page 10: Network Layer - University of Washington

DHCP Messages

CSE 461 University of Washington 10

Client Server

One link

Page 11: Network Layer - University of Washington

DHCP Messages (2)

CSE 461 University of Washington 11

Client Server

DISCOVER

REQUEST

OFFER

ACK

All Broadcast (255.255.255.255)

Page 12: Network Layer - University of Washington

DHCP Messages (3)

•To renew an existing lease, an abbreviated sequence is used:• REQUEST, followed by ACK

•Protocol also supports replicated servers for reliability

CSE 461 University of Washington 12

Page 13: Network Layer - University of Washington

Address Resolution Protocol (ARP)

Page 14: Network Layer - University of Washington

Sending an IP Packet

•Problem:• A node needs Link layer addresses to send a frame over

the local link• How does it get the destination link address from a

destination IP address?

CSE 461 University of Washington 14

Uh oh … My IP is 1.2.3.4

Page 15: Network Layer - University of Washington

ARP (Address Resolution Protocol)

•Node uses to map a local IP address to its Link layer addresses

CSE 461 University of Washington 15

SourceEthernet

Dest.Ethernet

Source IP

Dest.IP Payload …

Link layer

FromDHCP

FromNIC

From ARP

Page 16: Network Layer - University of Washington

ARP Protocol Stack

•ARP sits right on top of link layer• No servers, just asks node with target IP to identify itself• Uses broadcast to reach all nodes

CSE 461 University of Washington 16

Ethernet

ARP

Page 17: Network Layer - University of Washington

ARP Messages

CSE 461 University of Washington 17

Node Target

One link

Page 18: Network Layer - University of Washington

ARP Messages (2)

[root@host ~]# tcpdump -lni any arp & ( sleep 1; arp -d 10.0.0.254; ping -c1 -n 10.0.0.254 )

listening on any, link-type LINUX_SLL (Linux cooked), capture size 96 bytes

17:58:02.155495 arp who-has 10.2.1.224 tell 10.2.1.253

17:58:02.317444 arp who-has 10.0.0.96 tell 10.0.0.253

17:58:02.370446 arp who-has 10.3.1.12 tell 10.3.1.61

CSE 461 University of Washington 18

Node Target

REQUEST Broadcast

Who has IP 1.2.3.4?

REPLY

I do at 1:2:3:4:5:6

Page 19: Network Layer - University of Washington

ARP Table

# arp -an | grep 10

? (10.241.1.114) at 00:25:90:3e:dc:fc [ether] on vlan241

? (10.252.1.8) at 00:c0:b7:76:ac:19 [ether] on vlan244

? (10.252.1.9) at 00:c0:b7:76:ae:56 [ether] on vlan244

? (10.241.1.111) at 00:30:48:f2:23:fd [ether] on vlan241

? (10.252.1.6) at 00:c0:b7:74:fb:9a [ether] on vlan244

? (10.241.1.121) at 00:25:90:2c:d4:f7 [ether] on vlan241

[...]

Page 20: Network Layer - University of Washington

Discovery Protocols

•Help nodes find each other• There are more of them!

• E.g., eroconf, Bonjour

•Often involve broadcast• Since nodes aren’t introduced• Very handy glue

CSE 461 University of Washington 20

Page 21: Network Layer - University of Washington

Fragmentation

Page 22: Network Layer - University of Washington

Big packet

Fragmentation

•Problem: How do we connect networks with different maximum packet sizes?• Need to split up packets, or discover the largest size to use

CSE 461 University of Washington 22

It’s too big!Take that

Page 23: Network Layer - University of Washington

Packet Size Problem

•Different networks have different max packet sizes• Or MTU (Maximum Transmission Unit)• E.g., Ethernet 1.5K, WiFi 2.3K

•Prefer large packets for efficiency• But what size is too large?• Difficult as node doesn’t know complete network path

CSE 461 University of Washington 23

Page 24: Network Layer - University of Washington

Packet Size Solutions

•Fragmentation (now)• Split up large packets in if they are too big to send• Classic method, dated

•Discovery (next)• Find the largest packet that fits on the network path• IP uses today instead of fragmentation

CSE 461 University of Washington 24

Page 25: Network Layer - University of Washington

IPv4 Fragmentation

•Routers fragment packets too large to forward

•Receiving host reassembles to reduce load on routers

CSE 461 University of Washington 25

Fragment! Reassemble!

Fits on first link

Page 26: Network Layer - University of Washington

IPv4 Fragmentation Fields

•Header fields used to handle packet size differences• Identification, Fragment offset, MF/DF control bits

CSE 461 University of Washington 26Payload (e.g., TCP segment)

Page 27: Network Layer - University of Washington

IPv4 Fragmentation Procedure

•Routers split a packet that is too large:• Typically break into large pieces• Copy IP header to pieces• Adjust length on pieces• Set offset to indicate position• Set MF (More Fragments) on all pieces except last

•Receiving hosts reassembles the pieces:• Identification field links pieces together, MF tells receiver

when complete

CSE 461 University of Washington 27

Page 28: Network Layer - University of Washington

IPv4 Fragmentation (2)

CSE 461 University of Washington 28

ID = 0x12efData Len = 2300Offset = 0MF = 0

ID =Data Len = Offset =MF =

ID = Data Len =Offset = MF =

BeforeMTU = 2300

AfterMTU = 1500

(Ignore length of headers)

Page 29: Network Layer - University of Washington

IPv4 Fragmentation (3)

CSE 461 University of Washington 29

ID = 0x12efData Len = 2300Offset = 0MF = 0

ID = 0x12efData Len = 1500Offset = 0MF = 1

ID = 0x12efData Len = 800Offset = 1500MF = 0

BeforeMTU = 2300

AfterMTU = 1500

Page 30: Network Layer - University of Washington

IPv4 Fragmentation (4)

• It works!• Allows repeated fragmentation

•But fragmentation is undesirable• More work for routers, hosts• Tends to magnify loss rate• Security vulnerabilities too

CSE 461 University of Washington 30

Page 31: Network Layer - University of Washington

Path MTU Discovery

•Discover the MTU that will fit• So we can avoid fragmentation• The method in use today

•Host tests path with large packet• Routers provide feedback if too large; they tell host what

size would have fit

CSE 461 University of Washington 31

Page 32: Network Layer - University of Washington

Path MTU Discovery (2)

CSE 461 University of Washington 32

Try 1200 Try 900

MTU=1200 bytes MTU=900MTU=1400

Page 33: Network Layer - University of Washington

Path MTU Discovery (3)

CSE 461 University of Washington 33

Try 1200 Try 900

Test #2 Test #3Test #1

MTU=1200 bytes MTU=900MTU=1400

Page 34: Network Layer - University of Washington

Path MTU Discovery (4)

•Process may seem involved• But usually quick to find right size• MTUs smaller on edges of network

•Path MTU depends on the path and can change• Search is ongoing

• Implemented with ICMP (next)• Set DF (Don’t Fragment) bit in IP header to get feedback

CSE 461 University of Washington 34

Page 35: Network Layer - University of Washington

Internet Control Message Protocol (ICMP)

Page 36: Network Layer - University of Washington

Topic

•Problem: What happens when something goes wrong during forwarding?• Need to be able to find the problem

CSE 461 University of Washington 36

Yikes!What happened?XXXXXXX

Page 37: Network Layer - University of Washington

Internet Control Message Protocol

• ICMP is a companion protocol to IP• They are implemented together• Sits on top of IP (IP Protocol=1)

•Provides error report and testing• Error is at router while forwarding• Also testing that hosts can use

CSE 461 University of Washington 37

Page 38: Network Layer - University of Washington

ICMP Errors

•When router encounters an error while forwarding:• It sends an ICMP error report back to the IP source• It discards the problematic packet; host needs to rectify

CSE 461 University of Washington 38

Report then toss it!Oh, now I see …

XXXXXXX

ICMP report

Page 39: Network Layer - University of Washington

ICMP Message Format (2)

• Each ICMP message has a Type, Code, and Checksum

• Often carry the start of the offending packet as payload

• Each message is carried in an IP packet

CSE 461 University of Washington 39

Src=router, Dst=AProtocol = 1

Type=X, Code=YSrc=A, Dst=B

XXXXXXXXXXXXXXX

Portion of offending packet,starting with its IP header

ICMP headerIP header ICMP data

Page 40: Network Layer - University of Washington

Example ICMP Messages

CSE 461 University of Washington 40

Name Type / Code Usage

Dest. Unreachable (Net or Host) 3 / 0 or 1 Lack of connectivity

Dest. Unreachable (Fragment) 3 / 4 Path MTU Discovery

Time Exceeded (Transit) 11 / 0 Traceroute

Echo Request or Reply 8 or 0 / 0 Ping

Testing, not a forwarding error: Host sends Echo Request, and destination responds with an Echo Reply

Page 41: Network Layer - University of Washington

Traceroute

• IP header contains TTL (Time to live) field• Decremented every router hop, with ICMP error at zero• Protects against forwarding loops

CSE 461 University of Washington 41

Page 42: Network Layer - University of Washington

Traceroute (2)

•Traceroute repurposes TTL and ICMP functionality• Sends probe packets increasing TTL starting from 1• ICMP errors identify routers on the path

CSE 461 University of Washington 42

. . . LocalHost

RemoteHost1 hop 2 hops

3 hops N-1 hopsN hops