Also called IPng IP next generation Next Generation

  • Slides: 37
Download presentation
Also called , IPng – “IP next generation” Next Generation: IPv 6 and ICMPv

Also called , IPng – “IP next generation” Next Generation: IPv 6 and ICMPv 6 Recall IPv 4 provides host-to-host or hop-to -hop communication Recall UDP/TCP provide end-to-end or process-to-process communication Dr. Clincy 1

Why IPv 6 ? 3 major reasons Recall that (1) subnetting, (2) classless addressing,

Why IPv 6 ? 3 major reasons Recall that (1) subnetting, (2) classless addressing, (3) DHCP (dynamic address allocation) and (4) NAT all contributed to better utilization of the 32 -bit address space - despite these solutions, address depletion is still an issue There are numerous applications on the rise that require streaming real-time audio and video – and real-time transmission requires minimum delay and reservation-of-resources strategies – and IPv 4 isn’t designed for these strategies Over the last few years, there has been a much greater demand for security and for the Internet to accommodate encryption and authentication of data for some applications – and IPv 4 doesn’t provide encryption or authentication Dr. Clincy 2

Why IPv 6 ? IPv 6 was proposed in overcoming IPv 4’s deficiencies IPv

Why IPv 6 ? IPv 6 was proposed in overcoming IPv 4’s deficiencies IPv 6 has these advantages over IPv 4: 1. larger address space – 128 bits 2. better header format – options can be inserted or not 3. new options – additional functionalities 4. allowance for extension – protocol can be extended for newer technologies 5. support for resource allocation – enables the Tx to request special handling 6. support for more security – provides encryption and authentication Related protocols were either modified or dropped for IPv 6 - ICMP was modified (ICMPv 6) - ARP and IGMP in version 4 were combined in ICMPv 6 - RARP was dropped - RIP and OSPF were slightly modified Dr. Clincy 3

IPv 6 Address Uses hexadecimal colon notation, a 296 address increase over IPv 4

IPv 6 Address Uses hexadecimal colon notation, a 296 address increase over IPv 4 Abbreviated address Leading zeros can be omitted If consecutive sections consist of zeros only, the zeros can be removed altogether and replaced with double semicolon Only allowed once per address – if there were two runs of zero sections, only one can be abbreviated Dr. Clincy 4

IPv 6 Address Like IPv 4, IPv 6 can use CIDR notation 3 Categories

IPv 6 Address Like IPv 4, IPv 6 can use CIDR notation 3 Categories of IPv 6 Addresses Unicast Address – packet sent to a specific computer Anycast Address – group of computers with addresses that have the same prefix (ie. all belong to the same physical network) Multicast Address – packet sent to a group of computers with different address prefixes Dr. Clincy 5

IPv 6 Address structure Means 1/8 of the entire address spaces uses type prefix

IPv 6 Address structure Means 1/8 of the entire address spaces uses type prefix 010 The address space has many purposes Type prefixes for IPv 6 addresses The address space is divided into 2 parts Dr. Clincy The first part, called “type prefix”, is variable length, defines the purpose by using unique codes 6

IPv 6 Address Type prefix 010 or provider-based address is generally used by a

IPv 6 Address Type prefix 010 or provider-based address is generally used by a host as a unicast address Provider-based address structure Variable-length field identifies the provider for Internet access (ie ISP) – recommends this field be 16 bits The provider (ISP) Identifies one of assigns a 24 -bit many subnets subscriber id to under the organization subscriber’s control – recommends using 32 -bits Defines the address as a provider-based address Dr. Clincy Identifies the node connected to the subnet – recommends 48 bits (the same as the 48 -bit physical Ethernet address) Indicates one of the three agencies that has registered the address. INTERNIC – North America RIPNIC – Europe APNIC – Asia & Pacific 7

IPv 6 Address Can think of the provider-based address as a hierarchical identity with

IPv 6 Address Can think of the provider-based address as a hierarchical identity with several prefixes Address hierarchy Dr. Clincy 8

CONNECTING DEVICES Dr. Clincy Lecture 9

CONNECTING DEVICES Dr. Clincy Lecture 9

Repeater Operates at the physical layer – layer 1 Receives the signal and regenerates

Repeater Operates at the physical layer – layer 1 Receives the signal and regenerates the signal in it’s original pattern A repeater forwards every bit; it has no filtering capability Is there a difference between a regen or repeater and an amp ? ? Dr. Clincy Lecture 10

Repeaters d For the architecture above, will a signal ever traverse through more than

Repeaters d For the architecture above, will a signal ever traverse through more than 2 repeaters ? Dr. Clincy Lecture 11

Hubs Hub – multi-port repeater Typically used to create a physical star topology Also

Hubs Hub – multi-port repeater Typically used to create a physical star topology Also used to create multiple levels of hierarchy For bus technology type networks, hubs can be used to increase the collision domain Dr. Clincy Lecture 12

Bridge • Operates at both the physical and data link layers • At layer

Bridge • Operates at both the physical and data link layers • At layer 1, it regenerates the signal. At layer 2, it checks the Tx/Rx physical address (using a bridge table) • Example Below: • If packet arrives to bridge-interface #1 for either of the 71…. . stations, the packet is dropped because the 71…. Stations will see the packet • If packet arrives to bridge-interface #2 for either of the 71…. . stations, the packet is forwarded to bridge-interface #1 With such an approach, the “bridged” network segments will acted as a single larger network What is a “smart” bridge ? ? Dr. Clincy Lecture 13

Routers • • • Is a 3 -layer device: (1) at layer 1, regen

Routers • • • Is a 3 -layer device: (1) at layer 1, regen the signals, (2) at layer 2, check physical address and (3) at layer 3, check network addresses Routers are internetworking devices Routers contain a physical and logical/IP address for it’s interfaces (repeaters/bridges don’t) Routers only act on the packets needing to pass through Routers change the physical address of the packets needing to pass through (repeaters/bridges don’t change physical addresses) Show example where a decision is needed d d Dr. Clincy Lecture 14

Routing example • Routers can change the physical address of a packet • Example:

Routing example • Routers can change the physical address of a packet • Example: as a packet flow from LAN 1 to LAN 2 • In LAN 1, the source address is the Tx’s address and the destination address is the Router’s interface address • In LAN 2, the source address is the Router’s interface address and the destination address is the Rx’s address Dr. Clincy LAN 1 Lecture LAN 2 15

Router components Performs layer 1 and 2 functions: signal to bits, packet decapsulated from

Router components Performs layer 1 and 2 functions: signal to bits, packet decapsulated from frame, error control performed on bits, buffers packets before going to the switching fabric Dr. Clincy This is where delay is incurred Performs layer 1 and 2 functions: bits to signal, packet encapsulated into frame, error control overhead added 16

12. 6 Network Organization • Dynamic routers automatically set up routes and respond to

12. 6 Network Organization • Dynamic routers automatically set up routes and respond to the changes in the network. • They explore their networks through information exchanges with other routers on the network. • The information packets exchanged by the routers reveal their addresses and costs of getting from one point to another. • Using this information, each router assembles a table of values in memory. • Typically, each destination node is listed along with the neighboring, or next-hop, router to which it is connected. 17

12. 6 Network Organization • When creating their tables, dynamic routers consider one of

12. 6 Network Organization • When creating their tables, dynamic routers consider one of two metrics. They can use either the distance to travel between two nodes, or they can use the condition of the network in terms of measured latency. • The algorithms using the first metric are distance vector routing algorithms. Link state routing algorithms use the second metric. • Distance vector routing is easy to implement, but it suffers from high traffic and the count-to-infinity problem where an infinite loop finds its way into the routing tables. 18

12. 6 Network Organization • Computer networks are often classified according to their geographic

12. 6 Network Organization • Computer networks are often classified according to their geographic service areas. • The smallest networks are local area networks (LANs). LANs are typically used in a single building, or a group of buildings that are near each other. • Metropolitan area networks (MANs) are networks that cover a city and its environs. – LANs are becoming faster and more easily integrated with WAN technology, it is conceivable that someday the concept of a MAN may disappear entirely. • Wide area networks (WANs) can cover multiple cities, or span the entire world. 19

12. 6 Network Organization • In this section, we examine the physical network components

12. 6 Network Organization • In this section, we examine the physical network components common to LANs, MANs and WANs. • We start at the lowest level of network organization, the physical medium level, Layer 1. • There are two general types of communications media: Guided transmission media and unguided transmission media. • Unguided media broadcast data over the airwaves using infrared, microwave, satellite, or broadcast radio carrier signals. 20

12. 6 Network Organization • Guided media are physical connectors such as copper wire

12. 6 Network Organization • Guided media are physical connectors such as copper wire or fiber optic cable that directly connect to each network node. • The electrical phenomena that work against the accurate transmission of signals are called noise. • Signal and noise strengths are both measured in decibels (d. B). • Cables are rated according to how well they convey signals at different frequencies in the presence of noise. 21

12. 6 Network Organization • The signal-to-noise rating, measured in decibels, quantifies the quality

12. 6 Network Organization • The signal-to-noise rating, measured in decibels, quantifies the quality of the communications channel. • The bandwidth of a medium is technically the range of frequencies that it can carry, measured in Hertz. • In digital communications, bandwidth is the general term for the information-carrying capacity of a medium, measured in bits per second (bps). • Another important measure is bit error rate (BER), which is the ratio of the number of bits received in error to the total number of bits received. 22

12. 6 Network Organization • Coaxial cable was once the medium of choice for

12. 6 Network Organization • Coaxial cable was once the medium of choice for data communications. • It can carry signals up to trillions of cycles per second with low attenuation. – Today, it is used mostly for broadcast and closed circuit television applications. _ Coaxial cable also carries signals for residential Internet services that piggyback on cable television lines. 23

12. 6 Network Organization • Twisted pair cabling, containing two twisted wire pairs, is

12. 6 Network Organization • Twisted pair cabling, containing two twisted wire pairs, is found in most local area network installations today. • It comes in two varieties: shielded and unshielded. Unshielded twisted pair is the most popular. _ The twists in the cable reduce inductance while the shielding protects the cable from outside interference. . 24

12. 6 Network Organization • Optical fiber network media can carry signals faster and

12. 6 Network Organization • Optical fiber network media can carry signals faster and farther than either or twisted pair or coaxial cable. • Fiber optic cable is theoretically able to support frequencies in the terahertz range, but transmission speeds are more commonly in the range of about two gigahertz, carried over runs of 10 to 100 Km (without repeaters). • Optical cable consists of bundles of thin (1. 5 to 125 m) glass or plastic strands surrounded by a protective plastic sheath. 25

12. 6 Network Organization • Optical fiber supports three different transmission modes depending on

12. 6 Network Organization • Optical fiber supports three different transmission modes depending on the type of fiber used. • Single-mode fiber provides the fastest data rates over the longest distances. It passes light at only one wavelength, typically, 850, 1300 or 1500 nanometers. • Multimode fiber can carry several different light wavelengths simultaneously through a larger fiber core. 26

12. 6 Network Organization • Multimode graded index fiber also supports multiple wavelengths concurrently,

12. 6 Network Organization • Multimode graded index fiber also supports multiple wavelengths concurrently, but it does so in a more controlled manner than regular multimode fiber • Unlike regular multimode fiber, light waves are confined to the area of the optical fiber that is suitable to propagating its particular wavelength. • Thus, different wavelengths concurrently transmitted through the fiber do not interfere with each other. 27

12. 6 Network Organization • Fiber optic media offer many advantages over copper, the

12. 6 Network Organization • Fiber optic media offer many advantages over copper, the most obvious being its enormous signal-carrying capacity. • It is also immune to EMI and RFI, making it ideal for deployment in industrial facilities. • Fiber optic is small and lightweight, one fiber being capable of replacing hundreds of pairs of copper wires. • But optical cable is fragile and costly to purchase and install. Because of this, fiber is most often used as network backbone cable, which bears the traffic of hundreds or thousands of users. 28

12. 6 Network Organization • Unguided data communications media transmit bytes over carrier waves

12. 6 Network Organization • Unguided data communications media transmit bytes over carrier waves such as those provided by cellular telephone networks, Bluetooth, and 802. 11 x. – There are others, including free space optical lasers, microwaves, and satellite communications, to name a few. • Cellular wireless networks use a cellular telephone network to transmit data. • First generation technology allowed a maximum transmission rate of around 1 Mbps. 29

12. 6 Network Organization • Cell network data technology is now in its fourth

12. 6 Network Organization • Cell network data technology is now in its fourth generation (4 G). • Transmission rates up to 2. 048 Mbps are supported for 3 G. • 3 G also supports a wide array of equipment, including the seamless integration of low-Earthorbiting (LEO) satellites. • This technology makes it possible for the entire world to finally have access to the World Wide Web! 30

12. 6 Network Organization • Bluetooth, also known as IEEE 802. 15. 1 -2002

12. 6 Network Organization • Bluetooth, also known as IEEE 802. 15. 1 -2002 was first conceived by Ericsson in 1994. • Bluetooth’s purpose is to connect small peripheral devices with a nearby host. – Examples include mice, keyboards, printers, and cameras. • The collection of these devices forms a personal area network, or piconet. • Transmission at 720 Kbps occurs over an unregulated 2. 45 GHz frequency using power no greater than 100 milliwatts. 31

12. 6 Network Organization • Wireless local area networks (WLANs) are slower than their

12. 6 Network Organization • Wireless local area networks (WLANs) are slower than their wired counterparts, but they make up for this in their versatility. – A WLAN can be set up just about anywhere. • Two WLAN specifications are dominant in the US: – 802. 11: up to 54 Mbps – 802. 11 n: Over 54 Mbps and up to 100 Mbps • The IEEE 802. 11 series of standards also includes provisions for fast roaming, cellular integration, and management. 32

12. 6 Network Organization • WLANs consist of a collection of wireless access points

12. 6 Network Organization • WLANs consist of a collection of wireless access points (WAPs) that broadcast to nearby computer nodes. • Distances are limited by ambient interference and obstructions such as walls. • Connection speeds decrease as distance and obstructions increase. • Security continues to be a concern even when wired equivalent protocol (WEP) is employed. – Some security experts believe that it is impossible to make a WLAN as secure as a wired LAN. 33

12. 6 Network Organization • Transmission media are connected to clients, hosts and other

12. 6 Network Organization • Transmission media are connected to clients, hosts and other network devices through network interfaces. • Because these interfaces are often implemented on removable circuit boards, they are commonly called network interface cards, or simply NICs. • A NIC usually embodies the lowest three layers of the OSI protocol stack. • NICs attach directly to a system’s main bus or dedicated I/O bus. 34

12. 6 Network Organization • Every network card has a unique 6 -byte MAC

12. 6 Network Organization • Every network card has a unique 6 -byte MAC (Media Access Control ) address burned into its circuits. – The first three bytes are the manufacturer's identification number, which is designated by the IEEE. The last three bytes are a unique identifier assigned to the NIC by the manufacturer. • Network protocol layers map this physical MAC address to at least one logical address. • It is possible for one computer (logical address) to have two or more NICs, but each NIC will have a distinct MAC address. 35

12. 7 Internet Fragility • Practically everyone understands that the Internet is crucial to

12. 7 Internet Fragility • Practically everyone understands that the Internet is crucial to global commerce. • What is less clear is the importance of the Internet to the health and safety of the modern world. • SCADA (supervisory control and data acquisition) systems operate vital portions of our physical infrastructure including: – power generation – transportation networks – sewage systems – oil and gas pipelines 36

12. 7 Internet Fragility • Reliance on the Internet as a physical infrastructure is

12. 7 Internet Fragility • Reliance on the Internet as a physical infrastructure is only going to increase with the Internet of Things (Io. T) or Machine-to-Machine (M 2 M) communication. – Cisco estimates 50 billion sensor nodes by 2020 • Can the Internet deal with this traffic? Congestive collapse is a concern. – Congestive collapse: routers become overwhelmed, reroute packets to other routers which then become overwhelmed in cascading fashion. – The ultimate fix is to make the Internet “smarter, ” but this won’t happen quickly. Till then, we worry. 37