Beruflich Dokumente
Kultur Dokumente
MODULE III
COMPUTER SCIENCE AND ENGINEERING
MEA ENGINEERING COLLEGE
1.
2.
3.
4.
5.
6.
Internetworking IP V4 and V6
Multicast Addresses and Multicast Routing
DVMRP, PIM, MSDP, MPLS
Destination based forwarding
Explicit Routing
VPN and Tunnels
1. INTERNETWORKING:
IPV6
The network layer that is present in use in commonly referred to as IPv4. Although IPv4
is well designed and has helped the internet to grow rapidly, it has some deficiencies (Shortage in
Address Space), these deficiencies has made it unsuitable for the fast growing internet. To
overcome these deficiencies, Internet Protocol, Version 6 protocol has been proposed and it has
evolved into a standard. Important features of IPv6 are highlighted below:
IPv6 uses 128-bit address instead of 32-bit address to provide larger address space
Uses more flexible header format, which simplifies and speeds up the routing process
Basic header followed by extended header
Resource Allocation options, which was not present in IPv4
Provision of new/future protocol options
Support for security with the help of encryption and authentication
Support for fragmentation at source
Abbreviation:
Although the IP address even in hexadecimal format is very long, many of the digits are
zeros, hence we can abbreviate the address by omitting only the leading zeros of a section (four
digits between two colons) as shown in the diagram. Further abbreviation is possible if there are
consecutive sections consisting of zeros only. They can be removed altogether and replaced with
a double semicolon.
Categories of Addresses:
Unicastdefines a single computer
Anycastdefines a group of computer with addresses that have the same prefix
Multicastdefines a group of computers that may or may not share the same prefix
and may or may not be connected to the same physical network.
Base Header:
Version (4 bits) It indicates the IP version number.
Priority (4 bits) It specifies the priority of the packet with respect to traffic congestion.
Extension Headers:
Extension headers are supplied to provide extra information, but encoded in an efficient
way. Six kinds of extension headers are defined at present. Each one is optional. But in case of
more than one header is present, they must appear directly after the fixed base header, and
preferably in the order listed.
The hop-by-hop header is used to send information that all routers along the path must
examine. Datagrams using this header are called Jumbograms.
The routing header enlists one or more routers that have to be visited on the way to the
destination. Both strict routing (full path specified) and loose routing (selected routers are
supplied) are available.
The fragment header deals with fragmentation in a way similar to IPv4. it holds the
datagram identifier, fragment number, and a bit telling whether more fragments are
coming. Unlike IPv4, only source host, and not the routers along the way, can fragment a
packet. If an intermediate router receives a packet that is too long, it simply discards it
and sends an ICMP message back.
The destination option header is intended for fields that need only be interpreted at the
destination host.
Dual Stack
It is recommended that all hosts, before migrating completely to version 6, have a dual
stack of protocols. In other words, a station must run IPv4 and IPv6 simultaneously until all the
Internet uses IPv6
Tunneling
Tunneling is a strategy used when two computers using IPv6 want to communicate with
each ther and the packet must pass through a region that uses IPv4. To pass through this region,
the packet must have an IPv4 address. So the IPv6 packet is encapsulated in an IPv4 packet when
it enters the region, and it leaves its capsule when it exits the region. It seems as if the IPv6
packet goes through a tunnel at one end and emerges at the other end. To make it clear that the
IPv4 packet is carrying an IPv6 packet as data, the protocol value is set to 41.
Header Translation
Header translation is necessary when the majority of the Internet has moved to IPv6 but
some systems still use IPv4. The sender wants to use IPv6, but the receiver does not understand
IPv6. Tunneling does not work in this situation because the packet must be in the IPv4 format to
be understood by the receiver. In this case, the header format must be totally changed through
header translation. The header of the IPv6 packet is converted to an IPv4 header
2. MULTICASTING
Applications:
Broadcast audio/video
Push-based systems (e.g., BGP updates)
Software distribution
Web-cache updates
Teleconferencing (audio, video, shared whiteboard, text editor)
Multi-player games and Other distributed applications
IP Multicast Architecture:
Multicasting:
Terminology
Spanning Tree: Source is the root, group members are the leaves.
Shortest Path Spanning Tree: Each path from root to a leaf is the shortest according
to some metric.
Multicast tree:
Source-Based Tree:
o For each combination of (source , group), there is a shortest path spanning tree.
o Approach 1: DVMRP; an extension of unicast distance vector routing (e.g. RIP)
o Approach 2: MOSPF; an extension of unicast link state routing (e.g. OSPF)
Group-Share Tree
o One tree for the entire group
o Rendezvous-Point Tree: one router is the center of the group and therefore the
root of the tree.
CBT and PIM-SP protocols
RPB creates a shortest path broadcast tree from the source to each destination.
It guarantees that each destination receives one and only one copy of the packet.
To convert broadcasting to multicasting, the protocol uses two procedures, pruning and grafting.
DVMRP: distance vector multicast routing protocol, RFC1075 flood and prune:
Reverse path forwarding, source-based tree RPF tree based on DVMRPs own routing tables
constructed by communicating DVMRP routers no assumptions about underlying unicast initial
datagram to mcast group flooded everywhere via RPF routers
*Not wanting group: send upstream prune msgs
Reverse Path Forwarding: example
Sparse:
routed initially from the sender to those receivers via whatever domain has the RP for that
multicast group.
Consequently, the PIM-SM protocol is typically not used across domains, only within a
domain. To extend multicast across domains using PIM-SM, Multicast Source Discovery
Protocol (MSDP) was devised. MSDP is used to connect different domainseach running
PIM-SM internally, with its own RPsby connecting the RPs of the different domains.
Each RP has one or more MSDP peer RPs in other domains. Each pair of MSDP peers is
connected by a TCP connection over which the MSDP protocol runs.
Together, all the MSDP peers for a given multicast group form a loose mesh that is used
as a broadcast network. MSDP messages are broadcast through the mesh of peer RPs using the
Reverse Path Broadcast Algorithm.
MPLS is
A forwarding scheme designed to speed up IP packet forwarding (RFC 3031)
Idea: use a fixed length label in the packet header to decide packet forwarding
Label carried in an MPLS header between the link layer header and network layer
header
Support any network layer protocol and link layer protocol
MPLS Header Format:
Label: 20-bit label value
Exp: experimental use
Can indicate class of service
S: bottom of stack indicator
1 for the bottom label, 0 otherwise
TTL: time to live
8
Need for MPLS:
Rapid growth of Internet
New latency dependent applications
Quality of Service (QoS)
Less time at the routers
Traffic Engineering
Flexibility in routing packets
Connection-oriented forwarding techniques with connectionless IP
Utilizes the IP header information to maintain interoperability with IP based
networks
Decides on the path of a packet before sending it
Integration of layer 2 and layer 3
Simplified connection-oriented forwarding of layer 2
Flexibility and scalability of layer 3 routing
MPLS does not replace IP; it supplements IP
Traffic can be marked, classified and explicitly routed
QoS can be achieved through MPLS
MPLS Architecture:
Internet
LER LER IP
LSR
LSR
MPLS
LSR
IP
LSR
LER
143.67.25.77
143.67.84.22
FEC 2 (label y)
124.48.45.20
124.48.66.90
4. Destination-Based Forwarding:
Consider the network in Figure 4.42. Each of the two routers on the far right (R3 and R4)
has one connected network, with prefixes 18.1.1/24 and 18.3.3/24. The remaining routers (R1
and R2) have routing tables that indicate which outgoing interface each router would use when
forwarding packets to one of those two networks.
When MPLS is enabled on a router, the router allocates a label for each prefix in its
routing table, and advertises both the label and the prefix that it represents to its neighboring
routers. This advertisement is carried in the (LDP) Label Distribution Protocol. This is
illustrated in Figure 4.43.
Router R2 has allocated the label value 15 for the prefix 18.1.1 and the label value 16 for
the prefix 18.3.3. These labels can be chosen at the convenience of the allocating router, and can
be thought of as indices into the routing table. After allocating the labels, R2 advertises the label
bindings to its neighbors; in this case, we see R2 advertising a binding between the label 15 and
the prefix 18.1.1 to R1. The meaning of such an advertisement is that R2 has said, in effect,
please attach the label 15 to all packets sent to me that are destined to prefix 18.1.1. R1 stores
the label in a table alongside the prefix that it represents as the remote or outgoing label for
any packets that it sends to that prefix.
In Figure 4.43(c), we see another label advertisement from router R3 to R2 for the prefix
18.1.1, and R2 places the remote label that it learned from R3 in the appropriate place in its
table. At this point, we can look at what happens when a packet is forwarded in this network.
Suppose a packet destined to the IP address 18.1.1.5 arrives from the left to router R1. R1 in this
case is referred to as a label edge router (LER); an LER performs a complete IP lookup on
arriving IP packets, and then applies labels to them as a result of the lookup. In this case, R1
would see that 18.1.1.5 matches the prefix 18.1.1 in its forwarding table, and that this entry
contains both an outgoing interface and a remote label value. R1 therefore attaches the remote
label 15 to the packet before sending it. When the packet arrives at R2, R2 looks only at the label
in the packet, not the IP address. The forwarding table at R2 indicates that packets arriving with a
label value of 15 should be sent out interface 1, and that it should carry the label value 24, as
advertised by router R3. R2 therefore rewrites, or swaps, the label, and forwards it on to R3.
What has been accomplished by all this application and swapping of labels? Observe that
when R2 forwarded the packet in this example, it never actually needed to examine the IP
address. Instead, R2 looked only at the incoming label. Thus, we have replaced the normal IP
destination address lookup with a label lookup.
To understand why this is significant, it helps to recall that although IP addresses are
always the same length, IP prefixes are of variable length, and the IP destination address lookup
algorithm needs to find the longest match; the longest prefix that matches the high-order bits in
the IP address of the packet being forwarded. By contrast, the label forwarding mechanism just
described is an exact match algorithm. It is possible to implement a very simple exact match
algorithm, for example, by using the label as an index into an array, where each element in the
array is one line in the forwarding table.
MPLS Applications:
Traffic Engineering
5. EXPLICIT ROUTING:
Advantages:
Greater scalability
Easy to add/remove users
Reduced long-distance telecommunications costs
Mobility
Security
Disadvantages
Lack of standards
Understanding of security issues
Unpredictable Internet traffic
Difficult to accommodate products from different vendors
Remote access VPN:
Working:
Two connections one is made to the Internet and the second is made to the VPN.
Datagrams contains data, destination and source information.
Firewalls VPNs allow authorized users to pass through the firewalls.
Protocols protocols create the VPN tunnels.
Encryption:
Encryption -- is a method of scrambling data before transmitting it onto the Internet.
Public Key Encryption Technique
Digital signature for authentication
Tunneling:
A virtual point-to-point connection made through a public network. It transports
encapsulated datagrams.
The portion of the network where the data is encapsulated
L2TP:
IPSEC:
packet with its own address in the header, strips the tunnel header, and finds the data that was
tunneled, which it then processes. Exactly what it does with that data depends on what it is.
For example, if it were another IP packet, it would then be forwarded on like a normal IP
packet. However, it need not be an IP packet, as long as the receiving router knows what to do
with non-IP packets. Well return to the issue of how to handle non-IP data in a moment.