1 / 29

William Stallings Data and Computer Communications 7th Edition

2. Protocol Functions. Small set of functions that form basis of all protocolsNot all protocols have all functionsMay have same type of function in protocols at different levelsEncapsulationFragmentation and reassemblyConnection controlOrdered deliveryFlow controlError controlAddressingMultiplexingTransmission services.

Albert_Lan
Download Presentation

William Stallings Data and Computer Communications 7th Edition

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. 1 William Stallings Data and Computer Communications 7th Edition Chapter 18 Internet Protocols

    2. 2

    3. 3 Encapsulation Encapsulation – addition of control information to data (usually in blocks) Data usually transferred in blocks Called protocol data units (PDUs) PDUs contain data and control information (some only contain control info) Three categories of control  Address of sender and/or receiver Error-detecting code – e.g. CRC Protocol control Additional information to implement the specific protocol functions Data accepted or generated by entity and encapsulated into PDU e.g. TFTP, HDLC, frame relay, ATM, AAL5 (Figure 11.15), LLC, IEEE 802.3, IEEE 802.11

    4. 4 Fragmentation and Reassembly Protocols exchange data between two entities This data (message) is often broken down into multiple PDUs Why fragment? Communications network may only accept blocks of up to a certain size ATM 53 octets Ethernet 1526 octets Smaller retransmission if error Fairer – prevents single station from monopolizing medium with large message Reduces need for large buffers Simplifies restart/recovery operations (don’t have to start all over)

    5. 5 Disadvantages of Fragmentation Smaller the block, the larger the overhead PDU arrival generates an interrupt Smaller blocks, more interrupts More time spent processing smaller, more numerous PDUs 

    6. 6 Reassembly Segmented data must be reassembled into messages Done at destination node More complex if PDUs out of order

    7. 7 Connection Control Connectionless data transfer Each PDU treated independently E.g. datagram Connection-oriented data transfer E.g. virtual circuit Logical connection established Connection-oriented preferred (even required) for lengthy exchange of data Three phases occur  Connection establishment Data transfer Connection termination May be interrupt and recovery phases to handle errors

    8. 8 Phases of Connection Oriented Transfer

    9. 9 Connection Establishment Entities agree to exchange data Typically, one station issues connection request In connectionless fashion May involve central authority Receiving entity accepts or rejects (simple) May include negotiation (such as PDU size) Both data and control information exchanged e.g. flow control, error control Both entities must use same protocol

    10. 10 Sequencing Many connection-oriented protocols use sequencing e.g. HDLC, IEEE 802.11 PDUs numbered sequentially Each side keeps track of outgoing and incoming numbers Supports three main functions Ordered delivery Flow control Error control Not found in all connection-oriented protocols E.g.frame relay and ATM All connection-oriented protocols include some way of identifying connection Unique connection identifier Combination of source and destination addresses

    11. 11 Ordered Delivery PDUs may arrive out of order Different paths through network Number PDUs sequentially Not always easy to reorder received PDUs

    12. 12 Flow Control Performed by receiving entity to limit amount or rate of data sent Stop-and-wait Each PDU must be acknowledged before next sent Credit (sliding window) Amount of data that can be sent without acknowledgment Must be implemented in several protocols

    13. 13 Error Control Guard against loss or damage Error detection and retransmission Sender inserts error-detecting code in PDU Function of other bits in PDU Receiver checks code on incoming PDU If error, discard If transmitter doesn’t get acknowledgment in reasonable time, retransmit Error-correction code Enables receiver to detect and possibly correct errors Error control is performed at various layers of protocol Between station and network Inside network

    14. 14 Addressing Addressing level Addressing scope Connection identifiers Addressing mode

    15. 15 TCP/IP Concepts

    16. 16 Addressing Level Level in communications architecture at which entity is named Unique address for each end and intermediate system Network-level address IP address or internet address Used to route PDU through network At destination data must be routed to some process Each process assigned an identifier Port addresses

    17. 17 Addressing Scope Global address Global nonambiguity - identifies unique system Synonyms permitted System may have more than one global address Global applicability Possible at any global address to identify any other global address, in any system, by means of global address of other system Enables internet to route data between any two systems Need unique address for each device interface on network MAC address on IEEE 802 network and ATM host address Enables network to route data units through network and deliver to intended system Addressing scope only relevant for network-level addresses Port above network level is unique within system Need not be globally unique E.g port 80 web server listening port in TCP/IP

    18. 18 Connection Identifiers Connection identifier used by both entities for future transmissions (e.g. make initial connection connectionless, then data follows virtual connection) Reduced overhead Generally shorter than global identifiers Routing Fixed route may be defined (may not) Connection identifier identifies route to intermediate systems Multiplexing Entity may wish more than one connection simultaneously PDUs must be identified by connection identifier Use of state information Once connection established, end systems can maintain state information about connection Flow and error control using sequence numbers

    19. 19 Addressing Mode Usually address refers to single system or port Individual or unicast address Address can refer to more than one entity or port Multiple simultaneous recipients for data Broadcast for all entities within domain Multicast for specific subset of entities

    20. 20 Multiplexing Multiple connections into single system E.g. frame relay, can have multiple data link connections terminating in single end system Connections multiplexed over single physical interface Can also be accomplished via port names Also permit multiple simultaneous connections E.g. multiple TCP connections to given system Each connection on different pair of ports

    21. 21 Transmission Services Protocol may provide additional services to entities Priority Connection basis On message basis Quality of service E.g. minimum throughput or maximum delay threshold Security Security mechanisms, restricting access These services depend on underlying transmission system and lower-level entities

    22. 22 Internetworking Terms (1) Communications Network - facility that provides data transfer service among devices attached to the network An internet - collection of communications networks The Internet -the global collection of thousands of individual machines and networks Intranet - Corporate internal internet. Uses Internet (TCP/IP and http) technology to deliver documents and resources End System (ES) Device attached to one of the networks of an internet Supports end-user applications or services Intermediate System (IS) Device used to connect two networks Permits communication between end systems attached to different networks

    23. 23 Internetworking Terms (2) Bridge Intermediate system used to connect two LANs using similar LAN protocols Operate at OSI layer 2 (Data Link) Router Connects two (possibly dissimilar) networks Uses internet protocol present in each router and end system OSI Layer 3 (Network)

    24. 24 Requirements of Internetworking Provide link between networks At minimum physical and data link layer control connection Routing and delivery of data between processes on different networks Accounting services and status info Do this independent of network architectures

    25. 25 Potential Differences in Network Architecture Features Addressing schemes Packet size Access mechanism Timeouts Error recovery Status reporting Routing User access control (authorization) Connection based or connectionless

    26. 26 Architectural Approaches Connection oriented Connectionless

    27. 27 Connection Oriented Intermediate system (IS) connects two or more networks Each IS appears as an end system (ES) to each network to which it is attached Logical connection set up between ESs Individual network virtual circuits joined by IS May have a virtual connection, but lower level protocol (IP), may transmit the data in a connectionless fashion

    28. 28 Connectionless Operation Corresponds to datagram mechanism in packet switched network Each NPDU treated separately Internet Protocol One such internet protocol developed for ARPANET

    29. 29 Connectionless Internetworking Advantages Flexibility Robust No unnecessary overhead Unreliable Not guaranteed delivery Not guaranteed order of delivery Packets can take different routes Reliability is responsibility of next layer up (e.g. TCP)

    30. 30 IP Operation

    31. 31 Design Issues Routing Datagram lifetime Fragmentation and re-assembly Error control Flow control

    32. 32 Routing End systems and routers maintain routing tables Indicate next router to which datagram should be sent Static May contain alternative routes Dynamic Flexible response to congestion and errors Source routing Source specifies route as sequential list of routers to be followed Security Priority Route recording – each router appends its internet address to a list of addresses in the datagram (useful for testing and debugging).

    33. 33 Datagram Lifetime Datagrams could loop indefinitely Consumes resources Transport protocol may need upper bound on datagram life Datagram marked with lifetime Time To Live field in IP (TTL) Once lifetime expires, datagram discarded (not forwarded) Hop count Decrement time to live on passing through a each router Time count Need to know how long since last router (Aside: compare with Logan’s Run)

    34. 34 Fragmentation and Re-assembly Different packet sizes When to re-assemble At destination Results in packets getting smaller as data traverses internet Intermediate re-assembly Need large buffers at routers Buffers may fill with fragments All fragments must go through same router Inhibits dynamic routing IP reassembles at destination only

    35. 35 Dealing with Failure Re-assembly may fail if some fragments get lost Need to detect failure Re-assembly time out Assigned to first fragment to arrive If timeout expires before all fragments arrive, discard partial data Use packet lifetime (time to live in IP) If time to live runs out, kill partial data

    36. 36 Error Control Not guaranteed delivery Router should attempt to inform source if packet discarded e.g. for time to live expiring Source may modify transmission strategy May inform high layer protocol Datagram identification needed

    37. 37 Flow Control Allows routers and/or stations to limit rate of incoming data Limited in connectionless systems Send flow control packets Requesting reduced flow e.g. ICMP

    38. 38 Internet Protocol (IP) Version 4 Part of TCP/IP Used by the Internet (network layer protocol) Specifies interface with higher layer e.g. TCP or UDP Specifies protocol format and mechanisms Active at all nodes Will (eventually) be replaced by IPv6 (see later)

    39. 39 IP Parameters (1) Source address Destination address Protocol Recipient e.g. TCP or UDP Type of Service Specify treatment of data unit during transmission through networks Identification Source, destination address and user protocol Uniquely identifies PDU Needed for re-assembly and error reporting Send only

    40. 40 Parameters (2) Don’t fragment indicator Can IP fragment data If not, may not be possible to deliver Time to live Measured in seconds Data length Option data User data

    41. 41 Options Security Source routing Route recording Stream identification Timestamping

    42. 42 IPv4 Header

    43. 43 Header Fields (1) Version Currently 4 IP v6 - see later Internet header length In 32 bit words Including options Type of service Total length Of datagram, in octets

    44. 44 Header Fields (2) Identification Sequence number Used with addresses and user protocol to identify datagram uniquely Flags More bit Don’t fragment Fragmentation offset Time to live Protocol Next higher layer to receive data field at destination

    45. 45 Header Fields (3) Header checksum Reverified and recomputed at each router 16 bit ones complement sum of all 16 bit words in header Set to zero during calculation Source address Destination address Options Padding To fill to multiple of 32 bits long

    46. 46 Data Field Carries user data from next layer up Integer multiple of 8 bits long (octet) Max length of datagram (header plus data) 65,535 octets

    47. 47 IP Addresses Class A – few networks, each with many hosts Class B – medium number of networks, medium number of host Class C – many networks, each with few hosts

    48. 48 Subnets and Subnet Masks Allow arbitrary complexity of internetworked LANs within organization Insulate overall internet from growth of network numbers and routing complexity Site looks to rest of internet like single network Each LAN within the network assigned a subnet number Host portion of address partitioned into subnet number and host number Local routers route within subnetted network Subnet mask indicates which bits are subnet number and which are host number

    49. 49 Routing Using Subnets

    50. 50 ICMP Internet Control Message Protocol Transfer of (control) messages from routers and hosts to hosts Provides feedback about problems e.g. time to live expired Usually sent in response to a datagram

    51. 51 IPv6 Enhancements (1) Expanded address space 128 bit instead of 32 bit Improved option mechanism Separate optional headers between IPv6 header and transport layer header Most are not examined by intermediate routes Improved speed and simplified router processing Easier to extend options Address autoconfiguration Dynamic assignment of addresses

    52. 52 IPv6 Enhancements (2) Increased addressing flexibility Anycast - delivered to one of a set of nodes Improved scalability of multicast addresses Support for resource allocation Replaces type of service Labeling of packets to particular traffic flow Allows special handling e.g. real time video

    53. 53 Required Reading Stallings chapter 18 Comer, S. Internetworking with TCP/IP, volume 1, Prentice-Hall All RFCs mentioned plus any others connected with these topics www.rfc-editor.org Loads of Web sites on TCP/IP and IP version 6

    54. 54 Chapter 18 – Review Questions Discuss the purpose and general characteristics of the following protocol functions: Encapsulation, Fragmentation and reassembly, Connection control, Ordered delivery, Flow control, Error control, Addressing, Multiplexing, and Transmission services What are the disadvantages of fragmentation? Explain why the disadvantages do not apply to ATM. Discuss how a connection is established between two entities. Describe the following: global address, MAC address, and port address. Why do we need so many addresses? Define the internetworking terms on slides 22 and 23.

    55. 55 Chapter 18 – Review Questions (cont.) Discuss the requirements for internetworking Discuss the potential differences in network architecture features. How can these differences be resolved? Compare and contrast connection oriented with connectionless internetworking. Compare and contrast static, dynamic, and source routing Discuss the significance of datagram lifetime. How does it impact system overhead? Discuss the significance of IPv4 vs IPv6 Define and discuss the significance of subnets and subnet masks. Discuss the significance of ICMP

More Related