chapter 5 : the internet: addressing & services

65
Chapter 5 : The Internet: Addressing & Services Business Data Communications, 4e

Upload: beau

Post on 19-Jan-2016

101 views

Category:

Documents


2 download

DESCRIPTION

Chapter 5 : The Internet: Addressing & Services. Business Data Communications, 4e. Internet History. Evolved from ARPANet (Defense Department ’ s Advanced Research Projects Agency Network) ARPANet was developed in 1969, and was the first packet-switching network - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Chapter 5 :  The Internet:  Addressing & Services

Chapter 5 : The Internet: Addressing & Services

Business Data Communications, 4e

Page 2: Chapter 5 :  The Internet:  Addressing & Services

Internet History

Evolved from ARPANet (Defense Department’s Advanced Research Projects Agency Network)ARPANet was developed in 1969, and was the first packet-switching networkInitially, included only four nodes: UCLA, UCSB, Utah, and SRI

Page 3: Chapter 5 :  The Internet:  Addressing & Services
Page 4: Chapter 5 :  The Internet:  Addressing & Services
Page 5: Chapter 5 :  The Internet:  Addressing & Services
Page 6: Chapter 5 :  The Internet:  Addressing & Services
Page 7: Chapter 5 :  The Internet:  Addressing & Services
Page 8: Chapter 5 :  The Internet:  Addressing & Services
Page 9: Chapter 5 :  The Internet:  Addressing & Services
Page 10: Chapter 5 :  The Internet:  Addressing & Services
Page 11: Chapter 5 :  The Internet:  Addressing & Services
Page 12: Chapter 5 :  The Internet:  Addressing & Services
Page 13: Chapter 5 :  The Internet:  Addressing & Services
Page 14: Chapter 5 :  The Internet:  Addressing & Services
Page 15: Chapter 5 :  The Internet:  Addressing & Services
Page 16: Chapter 5 :  The Internet:  Addressing & Services
Page 17: Chapter 5 :  The Internet:  Addressing & Services
Page 18: Chapter 5 :  The Internet:  Addressing & Services

Internet Domain Survey147,344,723 / Jan 02

http://www.isc.org/

Page 19: Chapter 5 :  The Internet:  Addressing & Services

Switching Methods

Circuit SwitchingCircuit Switching: Requires a dedicated communication path for duration of transmission; wastes bandwidth, but minimizes delaysMessageMessage SwitchingSwitching: Entire path is not dedicated, but long delays result from intermediate storage and repetition of messagePacket SwitchingPacket Switching: Specialized message switching, with very little delay

Page 20: Chapter 5 :  The Internet:  Addressing & Services
Page 21: Chapter 5 :  The Internet:  Addressing & Services
Page 22: Chapter 5 :  The Internet:  Addressing & Services

NSF and the Internet

In the 1980s, NSFNet extended packet-switched networking to non-ARPA organization; eventually replaced ARPANetInstituted Acceptable Use Policies to control useCIX (Commercial Internet eXchange) was developed to provide commercial internetworking

Page 23: Chapter 5 :  The Internet:  Addressing & Services

The World Wide Web

Concept proposed by Tim Berners-Lee in 1989, prototype WWW developed at CERN in 1991First graphical browser (Mosaic) developed by Mark Andreessen at NCSAClient-server system with browsers as clients, and a variety of media types stored on serversUses HTTP (hyper text transfer protocol) for retrieving files

Page 24: Chapter 5 :  The Internet:  Addressing & Services

Connecting to the Internet

End users get connectivity from an ISP (internet service provider) Home users use dial-up, ADSL, cable

modems, satellite Businesses use dedicated circuits

connected to LANs

ISPs use “wholesalers” called network service providers and high speed (T-3 or higher) connections

Page 25: Chapter 5 :  The Internet:  Addressing & Services

Internet Addressing

32-bit global internet addressIncludes network and host identifiersDotted decimal notation 11000000 11100100 00010001

00111001 (binary) 192.228.17.57 (decimal)

Page 26: Chapter 5 :  The Internet:  Addressing & Services

IP Address長度: 4 Bytes (32-Bit)每一 IP 位址包括兩個部份 網路位址 (Network Address) 主機位址 (Host Address)

有時一網路會再分割為多個子網路,此時主機位址又再細分為子網路 (Subnet)及主機 (Host) 兩個部份。

Network Host

Network HostSubnet

Page 27: Chapter 5 :  The Internet:  Addressing & Services

Network Classes

Class A: Few networks, each with many hostsAll addresses begin with binary 0Class B: Medium networks, medium hostsAll addresses begin with binary 10Class C: Many networks, each with few hosts All addresses begin with binary 11

Page 28: Chapter 5 :  The Internet:  Addressing & Services

IP Address Formats

0 ~ 127

128 ~ 191

192 ~ 223

224 ~ 239

240 ~

Page 29: Chapter 5 :  The Internet:  Addressing & Services
Page 30: Chapter 5 :  The Internet:  Addressing & Services
Page 31: Chapter 5 :  The Internet:  Addressing & Services
Page 32: Chapter 5 :  The Internet:  Addressing & Services

Subnets & Subnet Masks

Allows for subdivision of internets within an organizationEach LAN can have a subnet number, allowing routing among networksHost portion is partitioned into subnet and host numbersSee Table 5.2 for method of calculating subnet masks

Page 33: Chapter 5 :  The Internet:  Addressing & Services

網路遮罩 (Netmask)

網路遮罩,將一 IP 位址中之代表網路及子網路位址之位元設為 1 ,其餘設為 0即為網路遮罩。 Class A 255.0.0.0 Class B 255.255.0.0 Class C 255.255.255.0

網路遮罩與 IP 位址利用邏輯 AND 便可得到網路位址。

Page 34: Chapter 5 :  The Internet:  Addressing & Services
Page 35: Chapter 5 :  The Internet:  Addressing & Services

Routers and the IP Addressing Principle

• Routers have two or more addresses. One for each interface.

Page 36: Chapter 5 :  The Internet:  Addressing & Services

Routing Table

IF ((Mask[i] & Destination Addr) = = Destination[i])

Forward to NextHop[i]

Page 37: Chapter 5 :  The Internet:  Addressing & Services

IP Forwarding Process

Page 38: Chapter 5 :  The Internet:  Addressing & Services

Routing Protocols

Routing Each router must exchange information with its neighbors to construct the whole network topology.

Two types of routing scheme-distance-vector routing (e.g. RIP)-link-state routing (e.g. OSPF)

Page 39: Chapter 5 :  The Internet:  Addressing & Services

Domain Name System

32-bit IP addresses have two drawbacks Routers can’t keep track of every network path Users can’t remember dotted decimals easily

Domain names address these problems by providing a name for each network domain (hosts under the control of a given entity)See Figure 5.6 for example of a domain name tree

Page 40: Chapter 5 :  The Internet:  Addressing & Services
Page 41: Chapter 5 :  The Internet:  Addressing & Services

TLD (Top-Level Domains)

Country Code Domains .uk, .de, .jp, .us, .tw., etc.)

Generic Domains .aero, .biz, .com, .coop, .edu, .gov, .info, .int, .mil

, .museum, .name, .net, and .org

http://www.internic.net/

IANA / ICANN

IRs (Internet Registry)INTERNIC.NET

http://www.twnic.net/

Page 42: Chapter 5 :  The Internet:  Addressing & Services

DNS Database

Hierarchical database containing name, IP address, and related information for hostsProvides name-to-address directory services

Page 43: Chapter 5 :  The Internet:  Addressing & Services

Key Features of DNS Database Variable-depth hierarchy Allow unlimited levels. Use “.” as level delimiter.

Distributed Database The database resides in DNS servers scattered

throughout the Internet.

Distribution controlled by the database The DNS database is divided into separately

managed zones, which are managed by separate administrators.

Distribution and update of records is controlled by the database software.

Page 44: Chapter 5 :  The Internet:  Addressing & Services

DNS Operations1. A user program requests for an IP address for a

domain name.2. A resolver module in the local host or local ISP

formulates a query for the local name server.3. A local name server checks to see if the name is in

its local database or cache, and if so, returns the IP address to the requester. Otherwise, the name server queries other available name servers, staring down from the root or as high up the tree as possible.

4. The user program is given the IP address or an error message.

Page 45: Chapter 5 :  The Internet:  Addressing & Services
Page 46: Chapter 5 :  The Internet:  Addressing & Services

Quality of Service (QoS)

Real-time voice and video don’t work well under the Internet’s “best effort” delivery serviceQoS provides for varying application needs in Internet transmission

Page 47: Chapter 5 :  The Internet:  Addressing & Services

Categories of Traffic

Elastic Can adjust to changes in delay and

throughput access Examples: File transfer, e-mail, web

access

Inelastic Does not adapt well, if at all, to changes Examples: Real-time voice, audio and

video

Page 48: Chapter 5 :  The Internet:  Addressing & Services

Requirements for Inelastic traffic

Throughput Delay Delay Variation Packet Loss

Page 49: Chapter 5 :  The Internet:  Addressing & Services
Page 50: Chapter 5 :  The Internet:  Addressing & Services

IPv4 Type of Service Field

Allows user to provide guidance on individual datagrams3-bit precedence subfield Indicates degree of urgency or priority Queue Service & Congestion Control

4-bit TOS subfield Provides guidance on selecting next hop Route selection, Network Service, &

Queuing Discipline

Page 51: Chapter 5 :  The Internet:  Addressing & Services

RFC 1349RFC 1349

Page 52: Chapter 5 :  The Internet:  Addressing & Services

Integrated Services

Routers require additional functionality to handle QoS-based serviceIETF is developing suite of standards to support thisTwo standards have received widespread support Integrated Services Architecture (ISA) Resource ReSerVation Protocol (RSVP)

RFC 1633

RFC 2205

Page 53: Chapter 5 :  The Internet:  Addressing & Services

Integrated Services Architecture

Enables provision of QoS over IP-networksFeatures include Admission Control Routing Algorithm Queuing Discipline Discard Policy

ISA Background Functions

Reservation ProtocolReservation Protocol Admission ControlAdmission Control Management Agent Routing Protocol

Forwarding Functions Packet ClassifierPacket Classifier and

Route Selection Packet SchedulerPacket Scheduler

Page 54: Chapter 5 :  The Internet:  Addressing & Services

ISA Implemented in a Router

Page 55: Chapter 5 :  The Internet:  Addressing & Services

Resource Reservation Protocol - RSVP

A signaling protocol for applications to reserve resources. A tool for prevention of congestion through reservation of network resourcesCan be used in unicast or multicast transmissionsReceivers (not senders) initiate resource reservations

Page 56: Chapter 5 :  The Internet:  Addressing & Services

RSVP Data Flows

Session Data flow identified by its destination

Flow Descriptor (reservation request) Flowspec

Specify a desired QoS and is used to set parameters of packet scheduler.

Filter Spec Define the set of packets for which a

reservation is requested.

Page 57: Chapter 5 :  The Internet:  Addressing & Services

RSVP Message Types

Resv Originate at multicast group receivers Create “soft states” within routers to

define resources Propagate upstream

Path Provides upstream routing

information

Page 58: Chapter 5 :  The Internet:  Addressing & Services

RSVP Operations

Page 59: Chapter 5 :  The Internet:  Addressing & Services

Differentiated Services (DS)

Provides QoS based on user group needs rather than traffic flowsCan use current IPv4 octetsService-Level Agreements (SLA) govern DS, eliminating need for application-based assignment

RFC 2474RFC 2474

Page 60: Chapter 5 :  The Internet:  Addressing & Services

DS Field

DSCP CU

0 5 6 7

DSCP: DS CodePointCU: Currently Unused

X X X X X 0

X X X X 1 1

X X X X 0 1

standards

experimentallocal use

experimentallocal useFuture standards

000000 : Default (best-effort)xxx000 : IPv4 Precedence

Page 61: Chapter 5 :  The Internet:  Addressing & Services

DS Operation

Routers are either boundary nodes or interior nodesInterior nodes use per-hop behavior (PHB) rulesBoundary nodes have PHB & traffic conditioning Classifier Meter Marker Shaper Dropper

Page 62: Chapter 5 :  The Internet:  Addressing & Services

DS Domains

Page 63: Chapter 5 :  The Internet:  Addressing & Services

DS Traffic Conditioner

Page 64: Chapter 5 :  The Internet:  Addressing & Services

Traffic Conditioning Function Classifier Separates submitted packets into classes

Meter Measures submitted traffic for conformance to a profile

Marker Re-mark packets with different codepoint as needed.

Shaper Delay packets as necessary to conform to traffic profile

Dropper Drop packets when the rates of packets exceeds that

specified in the traffic profile

Page 65: Chapter 5 :  The Internet:  Addressing & Services

Token Bucket Scheme