DOC PREVIEW
Berkeley ELENG 122 - Designing IP

This preview shows page 1-2-17-18-19-35-36 out of 36 pages.

Save
View full document
Premium Document
Do you want full access? Go Premium and unlock all 36 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

EE 122 Designing IP Ion Stoica TAs Junda Liu DK Moon David Zats http inst eecs berkeley edu ee122 Materials with thanks to Vern Paxson Jennifer Rexford and colleagues at UC Berkeley 1 Goal of Today s Lecture Work through process of designing IP the Internet s sole network layer protocol 2 Our Story So Far Context The Internet uses packet switching rather than circuitswitching in order to Achieve higher levels of utilization we can use statistical multiplexing to more aggressively share network links Avoid state inside the network robust fail over Make interconnection between different parties easy minimal service promises The Internet architecture uses layering to partition functionality into modules The internetworking layer or just network layer forms the waist of the layering hourglass 3 The Internet Hourglass SMTP HTTP DNS TCP Applications NTP UDP IP Transport Waist Data Link Ethernet Copper SONET Fiber 802 11 Radio Physical The Hourglass Model There is just one network layer protocol IP The narrow waist facilitates interoperability 4 Our Story So Far Context Con t The End to End Principle guides us in where to place functionality If hosts can implement functionality correctly implement it in a lower layer only as a performance enhancement But do so only if it does not impose burden on applications that do not require that functionality The principle of Fate Sharing guides us to keep state with the elements that rely on it when possible 5 IP Service Best Effort Packet Delivery Packet switching Divide messages into a sequence of packets Each packet datagram is dealt with individually Best effort delivery Packets may be lost Packets may be corrupted Packets may be delivered out of order source destination IP network 6 IP Service Model Why Best Effort IP means never having to say you re sorry Easier to survive failures Don t need to reserve bandwidth and memory Don t need to do error detection correction Don t need to remember from one packet to next Transient disruptions are okay during failover but applications do want efficient accurate transfer of data in order in a timely fashion 7 IP Service Best Effort Suffices No error detection or correction Successive packets may not follow the same path Receiver can put packets back in order if necessary Packets may be lost or arbitrarily delayed Not a problem as long as packets reach the destination Packets can be delivered out of order Higher level protocol can provide error checking Sender can send the packets again if desired No network congestion control beyond drop Sender can slow down in response to loss or delay 8 Let s Design IP What does it mean to design a protocol Answer specify the syntax of its messages and their meaning semantics Syntax elements in packet header their types layout Semantics interpretation of elements representation information For IP what fields do we need why 9 Information to Capture in IP Header Addresses datagram destination source Framing datagram length Priority any special forwarding Extensibility what if we need to tweak change IP Dealing with problems Integrity is the header what it s supposed to be Loop avoidance make sure packets don t endlessly circulate Fragmentation what if the datagram is too large 10 5 Minute Break Questions Before We Proceed 11 IP Packet Structure 4 bit 8 bit 4 bit Version Header Type of Service Length TOS 3 bit Flags IP Header 16 bit Identification 8 bit Time to Live TTL 16 bit Total Length Bytes 8 bit Protocol 13 bit Fragment Offset 16 bit Header Checksum 32 bit Source IP Address 32 bit Destination IP Address Options if any Payload IP Packet Structure 4 bit 8 bit 4 bit Version Header Type of Service Length TOS 3 bit Flags 16 bit Identification 8 bit Time to Live TTL 16 bit Total Length Bytes 8 bit Protocol 13 bit Fragment Offset 16 bit Header Checksum 32 bit Source IP Address 32 bit Destination IP Address Options if any Payload IP Packet Header Fields Version number 4 bits Header length 4 bits Indicates the version of the IP protocol Necessary to know what other fields to expect Typically 4 for IPv4 and sometimes 6 for IPv6 Number of 32 bit words in the header Typically 5 for a 20 byte IPv4 header Can be more when IP options are used Type of Service 8 bits Allow packets to be treated differently based on needs E g low delay for audio high bandwidth for bulk transfer 14 IP Packet Structure 4 bit 8 bit 4 bit Version Header Type of Service Length TOS 3 bit Flags 16 bit Identification 8 bit Time to Live TTL 16 bit Total Length Bytes 8 bit Protocol 13 bit Fragment Offset 16 bit Header Checksum 32 bit Source IP Address 32 bit Destination IP Address Options if any Payload IP Packet Header Fields Continued Total length 16 bits Number of bytes in the packet Maximum size is 65 535 bytes 216 1 though underlying links may impose smaller limits Fragmentation when forwarding a packet an Internet router can split it into multiple pieces fragments if too big for next hop link Fragmentation information 32 bits Packet identifier flags and fragment offset 16 Where does Reassemble Happen Host A MTU 1000B MTU 1000B MTU 500B Host B R1 1000 500 500 R2 1000 MTU Maximum Transfer Unit Maximum packet size handled by network A1 router R2 17 Where does Reassemble Happen Host A MTU 1000B MTU 1000B MTU 500B Host B R1 500 500 R2 1000 MTU Maximum Transfer Unit Maximum packet size handled by network A2 end host B receiver 18 Where does Reassemble Happen Host A MTU 1000B MTU 500B R3 MTU 1000B Host B R1 500 500 R2 1000 MTU Maximum Transfer Unit Maximum packet size handled by network A2 correct answer Fragments can travel across different paths 19 IP Packet Structure 4 bit 8 bit 4 bit Version Header Type of Service Length TOS RF DF MF 16 bit Identification 8 bit Time to Live TTL 16 bit Total Length Bytes 8 bit Protocol 13 bit Fragment Offset 16 bit Header Checksum 32 bit Source IP Address 32 bit Destination IP Address Options if any Payload Fragmentation con t Identifier 16 bits used to tell which fragments belong together Flags 3 bits Reserved RF unused bit why reserved Don t Fragment DF instruct routers to not fragment the packet even if it won t fit Instead they drop the packet and send back a Too Large ICMP control message Forms the basis for Path MTU Discovery covered later More MF this fragment is not the last one Offset 13 bits what part of datagram this fragment covers in 8 byte units Thus a fragment has either MF set or Offset 0 21 Example of Fragmentation Suppose we have a 4 000 byte datagram


View Full Document

Berkeley ELENG 122 - Designing IP

Documents in this Course
Lecture 6

Lecture 6

22 pages

Wireless

Wireless

16 pages

Links

Links

21 pages

Ethernet

Ethernet

10 pages

routing

routing

11 pages

Links

Links

7 pages

Switches

Switches

30 pages

Multicast

Multicast

36 pages

Switches

Switches

18 pages

Security

Security

16 pages

Switches

Switches

18 pages

Lecture 1

Lecture 1

56 pages

OPNET

OPNET

5 pages

Lecture 4

Lecture 4

16 pages

Ethernet

Ethernet

65 pages

Models

Models

30 pages

TCP

TCP

16 pages

Wireless

Wireless

48 pages

Load more
Download Designing IP
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Designing IP and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Designing IP and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?