Documente Academic
Documente Profesional
Documente Cultură
1.
2.
3.
4.
5.
6.
7.
IP principle
IP Protocols
Interconnecting Networks
Routing problems and MPLS solution
Miscellaneous: AAA, NAT, ATM
IP TRANSMISSION PRINCIPLES
Basic principles
Internet
Host
IP SA
Network
Network
Host
Host
IP ROUTING
2G
Network
Network
Network
IP DA
Host
Host
IP = Internet Protocol
SA = Source Address
DA = Destination Address
TCP/IP 4 layers
stack
2G
is connectionless
is connection
oriented
(transmission is
sequenced, with
acknowledgeme
nt and error
check)
TCP/IP Transmission
IP PROTOCOLS
IP (Internet Protocol)
Connectionless (every packet contains SA/DA)
Routing based on IP address
Not guaranteed (Best effort)
Interconnecting Networks
Interfacing Networks
2G
Networks
Interconnecti
ons
Repeater
A repeater acts at the physical level (amplify and reshape)
Allows to increase the distance between nodes
Not aware of packets or frames
NO traffic reduction
End node
End node
L7
L7
L6
L6
L5
L5
L4
Router
L4
L3
L3 L3
L3
IP address
L2
L2 L2
L2
MAC address
L1
L1 L1
L1
2.
MAC@ is sufficient to interconnect physical nodes. It allows to filter the data forwarded on a node port and
thus reduce traffic by carrying only the relevant data to a direction.
3.
Nodes have to be aware of neighbouring nodes. Tables are used for this purpose. They can be filled
manually or automatically
When a host wants to reach another he has to find the MAC@ of the destination host in its ARP cache
2.
If targeted address is not in ARP cache, then, station send a request (broadcast mode) on the
network:
Request Frame = [MAC broadcast][MAC SA1][ARP Request][DATA: IP SA1, MAC SA1,
IP DA2,.....]
3.
2G update their "ARP cache" with IP SA1, MAC SA1. Only one recognize IP DA2 and will answer
All stations
(unicast mode) Answer Frame = [MAC DA1][MAC SA2][ARP Request][DATA: IP SA2, MAC SA2, IP DA1, MAC
DA1]
4.
"ARP cache" of the requesting station only is updated with MAC SA2 (unicast frame for the answer)
1.
Station S1" send frame towards station S2" with SA1 and DA2 IP&MAC@.
2.
1st node met will analyze S1"MAC@ and store with ingress port N. Then it will
broadcast frame on egress ports towards other network nodes.
3.
Each of them will store S1" MAC@ with relevant ingress port, then will broadcast it
again forward.
Legend:
Finally the station S2" will be reached from one of the routes. The station S2" will
answer to S1" with a frame including SA2 and DA1 IP& MAC@.
4.
5.
All switches met on the way back will learn on their relevant ingress port, the S2"
@: Address
DA: Destination
Address
The ROUTING TABLE indicates the outgoing links for all possible
hosts/nets/subnets
2G
Routing Process
ROUTER
ROUTING
PROTOCOLS
Create
ROUTING TABLE
ROUTING
PROCESS
2G
IP Net 1
IP Subnet 2
IP Host
Default
=
=
=
=
ITF 1
ITF 2
ITF 3
ITF 3
IP
IP
EN/DECAP
EN/DECAP
EN/DECAP
ETHERNET
ETHERNET
ATM
IP
ETHERNET
ATM
IP
IP
IP
A=1
To A via B = 2
A=2
D
A=1
To A via C = 3
To A via E = 2
2G
AUTONOMOUS SYSTEM
D
Topology
E
30
30
10
20
2G
10
20
10
AUTONOMOUS SYSTEM
10
10
20
10
20
Smallest Cost
E
Border routers
Backbone routers
AS 2
AS 1
2G
AS 3
Routing Problems
and Solution
Routing problems:
ATM overlay networks (drastic PVCs growth in large networks)
Backbone routing tables are increasing continuously
Level 3 prefix (interdomain routing) analysis request high processing capacity
MPLS Principle
Path
56
La
b
el
2
1
el
Lab
FEC is a subset of packets that are all treated the same way
by a router
It is assigned once at the ingress port
It is defined for one or more, among numerous parameters (e.g.:
source or destination IP@ or port numbers, IP protocol ID,
differentiated services code point,)
Miscellaneous: AAA
2G
Authentication
Who are you ? Username and password
Authorisation
What service ?
Are you allowed to the service now ?
Are there enough resources ?
Accounting
How much will you pay ?
IPd Port d
IPP
NAT
Communication using
private IP addresses
Single public
IP address
IPx Port y
Allows multiple hosts to go to the Internet with only one global unique IP address
Solves the shortage of IP addresses
Allows more hosts on the web at the same time (This is not the case for Dynamic
IP addresses)
Limited added security
Transparent
(5 bytes
overhead)
(48 bytes
payload)