slides of the course was made by tas of this and previous semesters 1 internet networking spring...
Post on 21-Dec-2015
214 views
TRANSCRIPT
Slides of the course was made by TAs of this and previous semesters
1
Internet Networking Spring 2002
Tutorial 1
Subnets, Proxy ARP
2
Administrative Information
• Course site: webcourse.technion.ac.il/236341
• Assistants: Getselevich Vladimir, Taub 327, (829)4309
email: [email protected] Kapchits Boris, Taub 325, (829)4307
email: [email protected]
3
Reminding - TCP/IP Layers
Application (HTTP)
Transport (TCP,UDP)
Network (IP)
Link
Physical Electronic Engineering
Introduction to Networking
We study in this course
4
Reminding – IP Addressing (Original Classful Scheme)
• IP Address – 32-bit integer globally unique address
• Dotted Notation: 132.68.37.54
• IP Classes – dividing an address to net id and host id prefix of an IP address (net id) identifies a network and a suffix (host id) identifies a host on this network
5
Reminding – IP Addressing (Original Classful Scheme)
• Class A – 7 bits to net id, 24 bits to host id 1.0.0.0 – 126.0.0.0
• Class B – 14 bits to net id, 16 bits to host id 128.1.0.0 – 191.255.0.0
• Class C – 21 bits to net id, 8 bits to host id 192.0.1.0 – 223.255.255.0
• Class D – for multicasting
• Class E – reserved for future use
6
Weaknesses of Classful Scheme
Growth!!! Tens of thousands small networks.
• Extremely large routing tables• Address space will be eventually exhausted• Complex administration
How can one minimize the number of assigned network addresses, especially class B, without abandoning 32-bit addressing scheme?
7
Subnet Addressing
• A site has a single IP network address assigned to it, but has two or more physical networks
• From outside it looks like a single network• Only local routers know about multiple physical
networks inside and how to route traffic among them
• Host ID is divided into a subnet ID and host ID
Accepted as a standard by RFC 950, 1985
8
How a Router Perform Routing
Usual Routing• When a router get a packet, it isolates by Net
mask the packet net id address - if the packet is destined to other network then the router sends it to another router; otherwise according to host id, the router sends the packet to the appropriate host on its network.
9
How a Router Perform Routing
Routing with subnetting• When a router get a packet, it isolates by Net
mask the packet net id address - if the packet is destined to other network then the router sends it to another router; otherwise the router isolates by Subnet mask at subnet id address of the packet – if it destined to another sub network then it sent to another internal router; otherwise according to host id, the router sends the packet to the appropriate host on its network.
10
Subnetting - Example
R
.
Network 128.10.1.0
H1 H2
Network 128.10.2.0
H3 H4
128.10.1.1
Rest of the Internet
128.10.1.2
128.10.2.1 128.10.2.2All traffic to 128.10.0.0
A site with two physical networks using subnet addressing to label them with a single class B network address. Router R accepts all traffic for net 128.10.0.0 and chooses a physical network based on the third octet of the address.
11
Subnet Addressing
• Subnetting is hierarchical addressing scheme and it accommodates large growth because a given router doesn’t need to know as much detail about distant destinations as it does about local ones.
• It’s up to local policy to decide how to partition the local part of the IP address between subnet id and host id. When there is a compromise between large number of subnets with small number of hosts and the opposite.
12
Variable-Length Subnetting
• When we choose the subnet partitioning, we actually define constant number of possible physical subnetworks with maximum number of hosts on them.
• Difficult to keep small and big subnetworks and there could be unnecessary spending of address space.
• Solution is Variable-Length Subnetting – when a subnet partition is selected on a per-network basis.
13
Example – Configuring a Network with Variable-Length Subnetting
• We have a network with IP 202.128.236.0
• We need to support next sub networks:– 6 networks with 26 hosts– 3 networks with 10 hosts– 4 networks with 2 hosts
14
Example – Configuring a Network with Variable-Length Subnetting
• The given network is of Class C• Its Net Mask is: 255.255.255.0 (the network id is
24 bits and local part is 8 bits)• If we take subnet mask of /27 bits then we can
get 8 sub networks of 30 hosts (all 0’s and all 1’s of host addresses are reserved).– 11111111.11111111.11111111.11100000
We need only 6 such sub networks
15
Example – Configuring a Network with Variable-Length Subnetting
• The rest 2 sub networks we will partition by subnet mask of /28 bits.
• We will get 4 sub networks of 14 hosts in each– 11111111.11111111.11111111.11110000
We need only 3 such sub networks
16
Example – Configuring a Network with Variable-Length Subnetting
• The rest we will partition by subnet mask of /30 bits.
• We will get 4 sub networks of 2 hosts in each– 11111111.11111111.11111111.11111100
and that is all what we needed!
17
Example – Configuring a Network with Variable-Length Subnetting
• Subnet mask #1 = 202.128.236.0 /27
– 11001010.10000000.11101100.11100000
• Subnet mask #2 = 202.128.236.0 /28
– 11001010.10000000.11101100.11110000
• Subnet mask #2 = 202.128.236.0 /30
– 11001010.10000000.11101100.11111100
18
Reminding - ARP
• ARP (Address Resolution Protocol) serves for mapping from high-level IP address into low level MAC address.
• Two machines on a given network can communicate only if they know each other’s physical network address
19
Reminding - ARP
• When host A wants to resolve IP address Ib, it broadcasts a special packet that asks the host with IP address Ib to respond with its physical address, Pb. All hosts, including B, receive the request, but only host B recognizes its IP address and sends a reply that contains its physical address. When A receives the reply, it uses the physical address to send the internet packet directly to B.
20
Proxy ARP
• Proxy ARP (also called promiscuous ARP or ARP hack) is a technique used to map a single IP network prefix into two physical addresses.
• Assume that there are 2 networks A and B connected by router R that runs Proxy ARP
• R knows IP addresses from both sides (knows where each host is located)
• R uses ARP to hide one of networks
21
Proxy ARP
.
H1 H2
H4 H5
H3
Network A
Network B
R Router running proxy ARP
Router R answers ARP requests on each network for hosts on other network, giving its hardware address and then routing datagrams correctly when they arrive.
22
Proxy ARP - Example
• Assume that host H1 from network A wants to send a packet to host H4 from network B.
– H1 sends ARP request to get MAC address of H4.– Router R will catch this ARP request– R knows that H4 is on network B answers with its own
MAC address– H1 will store this address in its cash and from now H1
will send to R packets which are destined to H4.– R according to its routing table will send the packets
to H4.
23
ARP Features
• ARP is a trusted protocol – therefore proxy ARP can work
• Weakness of ARP is possibility of IP Spoofing– ARP implementations that warning alerts on possible
security violations will not work good with Proxy ARP
24
Proxy ARP cons/pros
• The advantage of proxy ARP is that it can be added to a single router on a network without disturbing the routing tables in other hosts or router on that network.
• The disadvantage of proxy ARP is that it does not work for networks unless they use ARP for address resolution and it does not generalize to more complex network topology.