tutorial1

advertisement
Internet Networking
Spring 2002
Tutorial 1
Subnets, Proxy ARP
Slides of the course was made by TAs of
this and previous semesters
1
Administrative Information
• Course site:
webcourse.technion.ac.il/236341
• Assistants:
Getselevich Vladimir, Taub 327, (829)4309
email: vladg@tx.tecnion.ac.il
Kapchits Boris, Taub 325, (829)4307
email: boria@tx.tecnion.ac.il
2
Reminding - TCP/IP Layers
Application (HTTP)
Transport (TCP,UDP)
We study in this course
Network (IP)
Link
Physical
Introduction to Networking
Electronic Engineering
3
Reminding – IP Addressing
(Original Classful Scheme)
• IP Address – 32-bit integer globally unique address
• Dotted Notation: 132.68.37.54
• IP Classes – dividing an address to net id and host id
prefix of an IP address (net id) identifies a network and a
suffix (host id) identifies a host on this network
4
Reminding – IP Addressing
(Original Classful Scheme)
• Class A – 7 bits to net id, 24 bits to host id
1.0.0.0 – 126.0.0.0
• Class B – 14 bits to net id, 16 bits to host id
128.1.0.0 – 191.255.0.0
• Class C – 21 bits to net id, 8 bits to host id
192.0.1.0 – 223.255.255.0
• Class D – for multicasting
• Class E – reserved for future use
5
Weaknesses of Classful Scheme
Growth!!! Tens of thousands small networks.
• Extremely large routing tables
• Address space will be eventually exhausted
• Complex administration
How can one minimize the number of assigned
network addresses, especially class B, without
abandoning 32-bit addressing scheme?
6
Subnet Addressing
• A site has a single IP network address assigned
to it, but has two or more physical networks
• From outside it looks like a single network
• Only local routers know about multiple physical
networks inside and how to route traffic among
them
• Host ID is divided into a subnet ID and host ID
 Accepted as a standard by RFC 950, 1985
7
How a Router Perform Routing
Usual Routing
• When a router get a packet, it isolates by Net
mask the packet net id address - if the packet is
destined to other network then the router sends
it to another router; otherwise according to host
id, the router sends the packet to the appropriate
host on its network.
8
How a Router Perform Routing
Routing with subnetting
• When a router get a packet, it isolates by Net
mask the packet net id address - if the packet is
destined to other network then the router sends
it to another router; otherwise the router isolates
by Subnet mask at subnet id address of the
packet – if it destined to another sub network
then it sent to another internal router; otherwise
according to host id, the router sends the packet
to the appropriate host on its network.
9
Subnetting - Example
Network 128.10.1.0
128.10.1.1
H1
Rest of the
Internet
128.10.1.2
H2
R
.
Network 128.10.2.0
All traffic to
128.10.0.0
H3
128.10.2.1
H4
128.10.2.2
A site with two physical networks using subnet addressing to label them with a
single class B network address. Router R accepts all traffic for net 128.10.0.0 and
chooses a physical network based on the third octet of the address.
10
Subnet Addressing
• Subnetting is hierarchical addressing scheme
and it accommodates large growth because a
given router doesn’t need to know as much
detail about distant destinations as it does about
local ones.
• It’s up to local policy to decide how to partition
the local part of the IP address between subnet
id and host id. When there is a compromise
between large number of subnets with small
number of hosts and the opposite.
11
Variable-Length Subnetting
• When we choose the subnet partitioning, we
actually define constant number of possible
physical subnetworks with maximum number of
hosts on them.
• Difficult to keep small and big subnetworks and
there could be unnecessary spending of address
space.
• Solution is Variable-Length Subnetting – when a
subnet partition is selected on a per-network
basis.
12
Example – Configuring a Network
with Variable-Length Subnetting
• We have a network with IP 202.128.236.0
• We need to support next sub networks:
– 6 networks with 26 hosts
– 3 networks with 10 hosts
– 4 networks with 2 hosts
13
Example – Configuring a Network
with Variable-Length Subnetting
• The given network is of Class C
• Its Net Mask is: 255.255.255.0 (the network id is
24 bits and local part is 8 bits)
• If we take subnet mask of /27 bits then we can
get 8 sub networks of 30 hosts (all 0’s and all
1’s of host addresses are reserved).
– 11111111.11111111.11111111.11100000

We need only 6 such sub networks
14
Example – Configuring a Network
with Variable-Length Subnetting
• The rest 2 sub networks we will partition by
subnet mask of /28 bits.
• We will get 4 sub networks of 14 hosts in each
– 11111111.11111111.11111111.11110000

We need only 3 such sub networks
15
Example – Configuring a Network
with Variable-Length Subnetting
• The rest we will partition by subnet mask of /30
bits.
• We will get 4 sub networks of 2 hosts in each
– 11111111.11111111.11111111.11111100

and that is all what we needed!
16
Example – Configuring a Network
with Variable-Length Subnetting
• Subnet mask #1 = 202.128.236.0 /27
– 11001010.10000000.11101100.11100000
• Subnet mask #2 = 202.128.236.0 /28
– 11001010.10000000.11101100.11110000
• Subnet mask #2 = 202.128.236.0 /30
– 11001010.10000000.11101100.11111100
17
Reminding - ARP
• ARP (Address Resolution Protocol) serves for
mapping from high-level IP address into low
level MAC address.
• Two machines on a given network can
communicate only if they know each other’s
physical network address
18
Reminding - ARP
• When host A wants to resolve IP address Ib, it
broadcasts a special packet that asks the host
with IP address Ib to respond with its physical
address, Pb. All hosts, including B, receive the
request, but only host B recognizes its IP
address and sends a reply that contains its
physical address. When A receives the reply, it
uses the physical address to send the internet
packet directly to B.
19
Proxy ARP
• Proxy ARP (also called promiscuous ARP or
ARP hack) is a technique used to map a single
IP network prefix into two physical addresses.
• Assume that there are 2 networks A and B
connected by router R that runs Proxy ARP
• R knows IP addresses from both sides (knows
where each host is located)
• R uses ARP to hide one of networks
20
Proxy ARP
Network A
H1
H2
H3
R
Router running proxy ARP
.
H4
H5
Network B
Router R answers ARP requests on each network for hosts on other network,
giving its hardware address and then routing datagrams correctly when they
arrive.
21
Proxy ARP - Example
• Assume that host H1 from network A wants to
send a packet to host H4 from network B.
– H1 sends ARP request to get MAC address of H4.
– Router R will catch this ARP request
– R knows that H4 is on network B answers with its own
MAC address
– H1 will store this address in its cash and from now H1
will send to R packets which are destined to H4.
– R according to its routing table will send the packets
to H4.
22
ARP Features
• ARP is a trusted protocol
– therefore proxy ARP can work
• Weakness of ARP is possibility of IP Spoofing
– ARP implementations that warning alerts on possible
security violations will not work good with Proxy ARP
23
Proxy ARP cons/pros
• The advantage of proxy ARP is that it can be
added to a single router on a network without
disturbing the routing tables in other hosts or
router on that network.
• The disadvantage of proxy ARP is that it does
not work for networks unless they use ARP for
address resolution and it does not generalize to
more complex network topology.
24
Download