resumen-cap4b

Upload: atilio2

Post on 04-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 resumen-Cap4b

    1/7

    OSI does define a unique Layer 3 protocol called Connectionless Network Services

    (CLNS), but, as usual with OSI protocols, you rarely see it in networks today

    other network layer protocols, such as Internet Protocol (IP), Novell Internetwork Packet

    Exchange (IPX), or AppleTalk Datagram Delivery Protocol (DDP)

    IP does not require any overhead agreements or messages before sending a packet, makingIP a connectionlessprotocol. IP tries to deliver each packet, but if a router or hosts IP

    process cannot deliver the packet, it is discardedwith no error recovery

    Rounting (forwarding)

    Because PC2 is not on the same Ethernet as PC1, PC1 needs to send the packet to a r outer

    that is attached to the same Ethernet as PC1. The sender sends a data-link frame across themedium to the nearby router; this frame includes the packet in the data portion of theframe. That frame uses data link layer (Layer 2) addressing in the data -link header to

    ensure that the nearby router receives the frame.

    The routing table for any particular network layer protocol contains a list of network layeraddress groupings. Instead of a single entry in the routing table per individual destination

    network layer address, there is one routing table entry per group. The router compares the

    destination network layer address in the packet to the entries in the routing table and makesa match. This matching entry in the routing table tells this router where to forward thepacket next.

  • 7/29/2019 resumen-Cap4b

    2/7

    When the network layer protocol is processing the packet, it decides to send the packet out

    the appropriate network interface. Before the actual bits can be placed onto that physicalinterface, the network layer must hand off the packet to the data link layer protocols,which,

    in turn, ask the physical layer to actually send the data.

    the data link layer adds the appropriate header and trailer to the packet, creating a frame,before sending the frames over each physical network. The routing process forwards the

    packet, and only the packet, end-to-end through the network,discarding data-link headers

    and trailers along the way.

    The network layer processes deliver the packet end-to-end, using successive data-link

    headers and trailers just to get the packet to the next router or host in the path. Each

    successive data link layer just gets the packet from one device to the next.

    how the routerdetermines which data-link address to use is the IP Address Resolution

    Protocol (ARP).ARP is used to dynamically learn the data-link address of an IP host

    connected to a LAN.

    Routing as covered so far has two main concepts:

    The process of routing forwards Layer 3 packets, also calledLayer 3 protocol data units(L3 PDU), based on the destination Layer 3 address in the packet.

    The routing process uses the data link layer to encapsulate the Layer 3 packets intoLayer 2 frames for transmission across each successive data link.

    Each computer that needs to communicate will have (at least) one network layer address sothat other computers can send data packets to that address, expecting the network to deliver

    the data packet to the correct computer.

    something about the numeric value of an address implies a group or set of addresses, all ofwhich are considered to be in the same grouping. With IP addresses, this group is called a

    networkor a subnet.

    Routing relies on the fact that Layer 3 addresses are grouped. The routing tables for eachnetwork layer protocol can have one entry for the group, not one entry for each individual

    address

    In most cases, routers build their routing table entries dynamically using a routing protocol.Routing protocols learn about all the locations of the network layer groups in a network

    and advertise the groups locations. As a result, each router can build a good routing table

    dynamically. Routing protocols define message formats and procedures, just like any otherprotocol. The end goal of each routing protocol is to fill the routing table with all known

    destination groups and with the best route to reach each group.

  • 7/29/2019 resumen-Cap4b

    3/7

    A routing protocol learns routes and puts those routes in a routing table. A routed protocoldefines the type of packet forwarded, or routed, through a network. In Figures 5 -1 and 5-2,the figures represent how IP packets are routed, so IP would be therouted protocol. If the

    routers used Routing Information Protocol (RIP) to learn the routes, RIP would be the

    routing protocol.

    the following two rules summarize the facts about which IP addresses need to be in the

    same grouping:

    All IP addresses in the same group must not be separated by a router.IP addresses separated by a router must be in different groups.Classes of networks

    RFC 791 defines the IP protocol, including several different classes of networks. IP definesthree different network classes for addresses used by individual hostsaddresses called

    unicast IP addresses. These three network classes are called A, B, and C. TCP/IP definesClass D (multicast) addresses and Class E (experimental) addresses as well.

    By definition, all addresses in the same Class A, B, or C network have the same numericvalue networkportion of the addresses. The rest of the address is called thehostportion ofthe address.

    Even though the network numbers look like addresses because of their dotted-decimal

    format, network numbers cannot be assigned to an interface to be used as an IP address.

    Note that the first reserved value, the network number, has all binary 0s in the host part ofthe number (see Table 5-4). The other reserved value is the one with all binary 1s in thehost part of the number. This number is called the network broadcastor directed broadcastaddress. This reserved number cannot be assigned to a host for use as an IP address.

    However, packets sent to a network broadcast address are forwarded to all devices in thenetwork

    Also, because the network number is the lowest numeric value inside that network and the

    broadcast address is the highest numeric value, all the numbers between the network

    number and the broadcast address are the valid, useful IP addresses that can be used to

    address interfaces in the network.

    Each computer connected to the Internet needs a unique, nonduplicated IP address.Administratively, a central authority assigned Class A, B, or C networks to companies,governments, school systems, and ISPs based on the size of their IP network (Class A forlarge networks, Class B for medium networks, and Class C for small networks).The central authority assigned each network number to only one organization, helpingensure unique address assignment worldwide.Each organization with an assigned Class A, B, or C network then assigned individual IPaddresses inside its own network.

    Table 5-5 summarizes the possible network numbers that ICANN and other agencies couldhave assigned over time. Note the total number for each network class and the number of

    hosts in each Class A, B, and C network.

    When subnetting, a third part of an IP address appears between the network and host partsof the addressnamely, the subnet partof the address. This field is created by stealingor borrowing bits from the host part of the address. The size of the network part of theaddress never shrinks. In other words, Class A, B, and C rules still apply when defining the

    size of the network part of an address. The host part of the address shrinks to make roomfor the subnet part of the address. Figure 5-7 shows the format of addresses when

    subnetting, representing the number of bits in each of the three parts of an IP address.

  • 7/29/2019 resumen-Cap4b

    4/7

    Note that the concepts shown in Figure 5-7, with three parts of an IP address (network,subnet, and host), are called classful addressing. The term classful addressing refers to how

    you can think about IP addressesspecifically, that they have three parts. In particular,

    classful addressing means that you view the address as having a network part that isdetermined based on the rules about Class A, B, and C addressinghence the wordclassful in the term.

    Because the routing process considers the network and subnet parts of the address together,

    you can take an alternative view of IP addresses called classless addressing. Instead ofthree parts, each address has two parts:

    The part on which routing is basedThe host part

    This first partthe part on which routing is basedis the combination of the network andsubnet parts from the classful addressing view. This first part is often simply called the

    subnet part, or sometimes theprefix.

    Hosts actually use some simple routing logic when choosing where to send a packet. This

    two-step logic is as follows:

    Step 1 If the destination IP address is in the same subnet as I am, send the packet directly

    to that destination host.

    Step 2 If the destination IP address is not in the same subnet as I am, send the packet to my

    default gateway (a routers Ethernet interface on the subnet).

    A router uses the following logic when receiving a data-link framea frame that has an

    IP packet encapsulated in it:

    Step 1 Use the data-link FCS field to ensure that the frame had no errors; if errorsoccurred, discard the frame.

    Step 2 Assuming the frame was not discarded at step 1, discard the old data-link header

    and trailer, leaving the IP packet.

    Step 3 Compare the IP packets destination IP address to the routing table, and find the

    route that matches the destination address. This route identifies the outgoing interface ofthe router, and possibly the next-hop router.

    Step 4 Encapsulate the IP packet inside a new data-link header and trailer,

    To match a routing table entry, the router thinks like this:

    Network numbers and subnet numbers represent a group of addresses that begin with thesame prefix. In which of the groups in my routing table does this packets destination

    address reside?

    Step A PC1 sends the packet to its default gateway. PC1 first builds the IP packet, with

    a destination address of PC2s IP address (150.150.4.10). PC1 needs to send the packet toR1 (PC1s default gateway) because the destination address is on a different subnet. PC1places the IP packet into an Ethernet frame, with a destination Ethernet address of R1s

    Ethernet address. PC1 sends the frame onto the Ethernet.

    Step B R1 processes the incoming frame and forwards the packet to R2.

    Because the incoming Ethernet frame has a destination MAC of R1s Ethernet MAC, R1copies the frame off the Ethernet for processing. R1 checks the frames FCS, and no errorshave occurred (Step 1). R1 then discards the Ethernet header and trailer (Step 2). Next, R1

    compares thepackets destination address (150.150.4.10) to the routing table and finds the

    entry for subnet 150.150.4.0which includes addresses 150.150.4.0 through

    150.150.4.255 (Step 3). Because the destination address is in this group, R2 forwards thepacket outgoing interface Serial0 to next-hop router R2 (150.150.2.7) after encapsulating

    the packet in an HDLC frame (step 4).

    Step C R2 processes the incoming frame and forwards the packet to R3.

    R2 repeats the same general process as R1 when R2 receives the HDLC frame.

  • 7/29/2019 resumen-Cap4b

    5/7

    Step D R3 processes the incoming frame and forwards the packet to PC2.

    Like R1 and R2, R3 checks the FCS, discards the old data-link header and trailer, and

    matches its own route for subnet 150.150.4.0. R3s routing table entry for 150.150.4.0

    shows that the outgoing interface is R3s Ethernet interface, but there is no next-hop router,because R3 is connected directly to subnet 150.150.4.0. All R3 has to do is encapsulate

    the packet inside an Ethernet header and trailer, with a destination Ethernet address ofPC2s MAC address, and forward the frame.

    The goals described in the following list are common for any IP routing protocol,

    regardless of its underlying logic type:

    To dynamically learn and fill the routing table with a route to all subnets in the network.

    If more than one route to a subnet is available, to place the best route in the routing table.To notice when routes in the table are no longer valid, and to remove them from therouting table.

    If a route is removed from the routing table and another route through anotherneighboring router is available, to add the route to the routing table. (Many people viewthis goal and the preceding one as a single goal.)

    To add new routes, or to replace lost routes, with the best currently available route asquickly as possible. The time between losing the route and finding a working replacementroute is called convergence time.

    To prevent routing loops.Routing protocols follow these general steps for advertising routes in a network:

    Step 1 Each router adds a route to its routing table for each subnet directly connected to the

    router.

    Step 2 Each router tells its neighbors about all the routes in its routing table, including the

    directly connected routes and routes learned from other routers.

    Step 3 After learning a new route from a neighbor, the router adds a route to its routing

    table, with the next-hop router typically being the neighbor from which the route waslearned.

    Step A R3 learns a route that refers to its own E0 interface because subnet 150.150.4.0 is

    directly connected (Step 1).

    Step B R3 sends a routing protocol message, called a routing update, to R2, causing R2 tolearn about subnet 150.150.4.0 (Step 2).

    Step C R2 sends a similar routing update to R1, causing R1 to learn about subnet

    150.150.4.0 (Step 2).

    Step D R1s route to 150.150.4.0 lists 150.150.2.7 (R2s IP address) as the nexthop address

    because R1 learned about the route from R2. The route also lists R1s outgoing interface as

    Serial0, because R1 learned about the route from the update that came in serial0 (at Step C

    in the figure).

  • 7/29/2019 resumen-Cap4b

    6/7

    Dns

    Hannah knows the IP address of a DNS server because the address was either

    preconfigured on Hannahs machine or was learned with DHCP, as covered later in this

    chapter. As soon as Hannah somehow identifies the name of the other computer (forexample, jessie.example.com), she sends aDNS requestto the DNS, asking for Jessies IP

    address. The DNS replies with the address, 10.1.1.2.

    Hannah simply sends a DNS request to the server, supplying the name jessie, or

    jessie.example.com, and the DNS replies with the IP address (10.1.1.2 in this case).

    ARP

    As soon as a host knows the IP address of the other host, the sending host may need toknow the MAC address used by the other computer. For example, Hannah still needs toknow the Ethernet MAC address used by 10.1.1.2, so Hannah issues something called an

    ARP broadcast. An ARP broadcast is sent to a broadcast Ethernet address, so everyone on

    the LAN receives it. Because Jessie is on the same LAN, she receives the ARP broadcast.Because Jessies IP address is 10.1.1.2 and the ARP broadcast is looking for the MAC

    address associated with 10.1.1.2, Jessie replies with her own MAC address

  • 7/29/2019 resumen-Cap4b

    7/7

    Hosts may or may not need to ARP to find the destination hosts MAC address based on

    the two-step routing logic used by a host. If the destination host is on the same subnet, thesending host sends an ARP looking for the destination hosts MAC address, as shown in Figure 5-14. However, if the sending host is on a different subnet than the destination host,

    the sending hosts routing logic results in the sending host needing to forward the packet to

    its default Gateway.

    Additionally, hosts need to use ARP to find MAC addresses only once in a while. Any

    device that uses IP should retain, or cache, the information learned with ARP, placing the

    information in itsARP cache. Each time a host needs to send a packet encapsulated in anEthernet frame, it first checks its ARP cache and uses the MAC address found there. If thecorrect information is not listed in the ARP cache, the host then can use ARP to discover

    the MAC address used by a particular IP address. Also, a host learns ARP information

    when receiving an ARP as well.

    DHCP

    DHCP supplies IP addresses to clients, and it also supplies other information. For example,

    hosts need to know their IP address, plus the subnet mask to use, plus what default gateway

    to use, as well as the IP address(es) of any DNS servers.

    Ping

    The primary tool for testing basic network connectivity is the ping command. ping (PacketInternet Groper) uses theInternet Control Message Protocol (ICMP), sending a message

    called anICMP echo requestto another IP address. The computer with that IP address

    should reply with anICMP echo reply.

    you know that the network can deliver a packet from one host to the other, and back. ICMP

    does not rely on any application, so it really just tests basic IP connectivityLayers 1, 2,and 3 of the OSI model