IP technology
-
Upload
ronan-munoz -
Category
Documents
-
view
25 -
download
0
description
Transcript of IP technology
![Page 1: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/1.jpg)
IP technology
1) IP technology basic concepts
2) The IP protocol stack
3) Transport layer protocols (UDP, TCP, SCTP)
4) The IP datagram header (IPv4 and IPv6)
5) Addressing and routing
6) GPRS
![Page 2: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/2.jpg)
IP network architecture
HostHost
LAN or intranet LAN or intranet
Router
Computer
HostHost
HostHost
HostHost Host can be behind modem or ADSL connection
ARP
Public Internet
![Page 3: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/3.jpg)
Client-server concept
HostHost
ServerClient
Transactions are always started by client
Network does not have to know IP address of client before transaction (dynamic IP address allocation is possible)
Web (www) applications are based on this concept
HostHost
Request
Response
:
•
•
•
![Page 4: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/4.jpg)
Role of routers in an IP network
HostHost
ServerClient
Routers perform switching of IP packets (task of the OSI network layer)
IP packets are routed independently through the IP network(s) towards the destination indicated by the destination IP address in the IP datagram header
Independent routing => connectionless service (IP packets belonging to a certain transaction can travel along different paths, experience different delays, and arrive out of sequence at the destination…)
HostHost
Router
•
•
•
![Page 5: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/5.jpg)
IP protocol suite
LAN-protocols, ATM, PSTN/ISDN, PLMN …LAN-protocols, ATM, PSTN/ISDN, PLMN …
ARPARP
UDPUDPTCPTCP
ICMPICMPIPIP
SMTP POP, IMAP
SMTP POP, IMAP HTTPHTTPFTPFTP DNSDNS
Signalling Protocols
(e.g. ISUP)
Signalling Protocols
(e.g. ISUP)
SLIPSLIP PPPPPP
RIPRIP OSPFOSPF BGPBGP
SCTPSCTP
RTPRTP
RT DataRT DataHTMLHTML
![Page 6: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/6.jpg)
Lower protocol layers
ARP (Address Resolution Protocol) takes care of mapping between logical IP addresses and physical MAC addresses in a Local Area Network (LAN).
PPP (Point-to-Point Protocol) or SLIP (Serial Line IP) is used for transport of IP traffic over modem connections between terminal and ISP’s Point of Presence (PoP).
LAN-protocols, ATM, PSTN/ISDN, PLMN …LAN-protocols, ATM, PSTN/ISDN, PLMN …
ARPARP
ICMPICMPIPIP
SLIPSLIP PPPPPP
RIPRIP OSPFOSPF BGPBGP
Bearer Technology
![Page 7: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/7.jpg)
Assisting protocols in the IP layer (1)
ICMP (Internet Control Message Protocol) is a mandatory protocol (i.e. must be supported by all routers) and is used for informing hosts about problems in the network.
UDPUDPTCPTCP
ICMPICMPIPIP RIPRIP OSPFOSPF BGPBGP
SCTPSCTP
ARPARPSLIPSLIP PPPPPP
Some ICMP messages: destination network/host/port unreachable/unknown, echo request, echo reply, TTL expired, IP header bad.
![Page 8: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/8.jpg)
Assisting protocols in the IP layer (2)
Various routing protocols are employed for exchanging information between routers in the IP network
UDPUDPTCPTCP
ICMPICMPIPIP RIPRIP OSPFOSPF BGPBGP
SCTPSCTP
ARPARPSLIPSLIP PPPPPP
RIP (Routing Information Protocol) OSPF (Open Shortest Path First)
BGP (Border Gateway Protocol)
for routing within autonomous systems
for “international” routing
![Page 9: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/9.jpg)
Transport layer protocols (1)
TCP (Transmission Control Protocol) takes care of end-to-end flow & error control + segmentation & reassembly of larger blocks of information.
UDP (User Datagram Protocol) is used for ”unreliable but fast” transport of independent blocks of information.
UDPUDPTCPTCP
ICMPICMPIPIP
SMTP POP, IMAP
SMTP POP, IMAP HTTPHTTPFTPFTP DNSDNS
Signalling Protocols
(e.g. ISUP)
Signalling Protocols
(e.g. ISUP)
RIPRIP OSPFOSPF BGPBGP
SCTPSCTP
RTPRTP
RT DataRT DataHTMLHTML
![Page 10: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/10.jpg)
Transport layer protocols (2)
SCTP (Stream Control Transmission Protocol) is an alternative to TCP (=> too slow) or UDP (=> not reliable), primarily for carrying signalling information. SCTP may become popular also more generally in the future.
UDPUDPTCPTCP
ICMPICMPIPIP
SMTP POP, IMAP
SMTP POP, IMAP HTTPHTTPFTPFTP DNSDNS
Signalling Protocols
(e.g. ISUP)
Signalling Protocols
(e.g. ISUP)
RIPRIP OSPFOSPF BGPBGP
RTPRTP
RT DataRT DataHTMLHTML
Adapt. pr.Adapt. pr.
SCTPSCTP
See: http://www.isoc.org/briefings/017/index.shtmlSee: http://www.isoc.org/briefings/017/index.shtml
![Page 11: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/11.jpg)
SCTP is used for signalling transport
Signalling Protocol (e.g. ISUP)Signalling Protocol (e.g. ISUP)
MTPMTP
Transport of SS7 application protocols (e.g. ISUP) over conventional SS7 network using MTP.
Transport of SS7 application protocols over IP using Sigtran protocol stack (which includes SCTP).
Protocol conversion in
signalling gateway (SGW)
Adapt. pr.Adapt. pr.
SCTPSCTP
IPIP
Phys.Phys.
Sigtran protocols
![Page 12: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/12.jpg)
Four advantages of SCTP over TCP
SCTP TCP
Preservation of message boundaries (SCTP carries blocks of information)
Multistreaming property (several streams in parallel)
Multihoming property (the host has several points of attachment to the Internet)
Protection against SYN flooding attacks
TCP carries a continuous stream of information (bad for message transport)
One continuous stream only (head-of-line blocking possible)
One point of attachment only (makes TCP less reliable)
SYN flooding attacks are a problem in TCP
![Page 13: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/13.jpg)
Preservation of message boundaries
TCP
SCTP
... ...
Information is carried as a continuous stream of bytes. The higher protocol layers must find the message boundaries at the receiving end, TCP cannot do this.
SCTP can find the message boundaries at the receiving end of the SCTP connection. Higher protocol layers do not have to do this.
... ...
![Page 14: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/14.jpg)
Multisreaming
TCP
SCTP
... ...
... ...
A message is delayed or lost (1). All other messages of all other users (2) are delayed (=> head-of-line blocking).
If a message is delayed or lost (1), only messages belonging to this stream are delayed (2). Other messages are part of other SCTP streams and are carried without delay over the SCTP connection (also called SCTP association).
1
2
12
2 2
![Page 15: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/15.jpg)
Multihoming
ClientClient ServerServer
In a TCP connection, only one IP address is available at each endpoint.
123.456.7.89 123.987.6.54
ClientClient ServerServer
In an SCTP connection, several IP addresses are available at each endpoint.
123.456.7.89123.456.6.78123.456.5.67
123.987.6.54123.987.5.43123.987.4.32
use insteadIf not available
![Page 16: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/16.jpg)
Protection against SYN flooding attacks
TCP uses a three-way handshake to set up a connection. This method is prone to SYN flooding attacks.
SCTP uses a 4-way handshake with a signed cookie, in this way preventing DoS (Denial-of-Service) attacks like SYN flooding.
ClientClient ServerServerSYN
SYN/ACK
ACK
If client first sends SYN, but does not then send ACK, this TCP connection is left hanging...
![Page 17: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/17.jpg)
Applications (1)
FTP (File Transfer Protocol) for sending larger files (offers flow and error control).
SMTP (Simple Mail Transfer Protocol) for outgoing e-mail.
POP (Post Office Protocol) or IMAP (Internet Message Access Protocol) for fetching e-mail from mailbox.
UDPUDPTCPTCP
SMTP POP, IMAP
SMTP POP, IMAP HTTPHTTPFTPFTP DNSDNS
Signalling Protocols
(e.g. ISUP)
Signalling Protocols
(e.g. ISUP)
SCTPSCTP
RTPRTP
RT DataRT DataHTMLHTML
![Page 18: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/18.jpg)
Applications (2)
HTTP (HyperText Transfer Protocol) is used for client-server type of communication, and is the most popular protocol for transport of WWW content (e.g. HTML pages).
http://www.hut.fi/overview.html Uniform Resource Locator (URL)
protocol host computer content page written in HTML
UDPUDPTCPTCP
SMTP POP, IMAP
SMTP POP, IMAP HTTPHTTPFTPFTP DNSDNS
Signalling Protocols
(e.g. ISUP)
Signalling Protocols
(e.g. ISUP)
SCTPSCTP
RTPRTP
RT DataRT DataHTMLHTML
network &
![Page 19: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/19.jpg)
Applications (3)
DNS (Domain Name System) performs translation between IP addresses and domain names:
122.233.121.123 thisnetwork.thishost.com
IP address must be used for routing through IP networks
However, domain names are more user friendly
UDPUDPTCPTCP
SMTP POP, IMAP
SMTP POP, IMAP HTTPHTTPFTPFTP DNSDNS
Signalling Protocols
(e.g. ISUP)
Signalling Protocols
(e.g. ISUP)
SCTPSCTP
RTPRTP
RT DataRT DataHTMLHTML
![Page 20: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/20.jpg)
Applications (4)
RTP (Real Time Protocol) provides important functions (e.g. sequence numbering, time stamp) for transport of real time data. RTP runs on top of UDP.
UDPUDPTCPTCP
SMTP POP, IMAP
SMTP POP, IMAP HTTPHTTPFTPFTP DNSDNS
Signalling Protocols
(e.g. ISUP)
Signalling Protocols
(e.g. ISUP)
SCTPSCTP
RTPRTP
RT DataRT DataHTMLHTML
RTP can carry e.g. • Digitized speech (PCM)• Encoded speech (EFR, AMR)• Multimedia traffic (compressed audio, video)
![Page 21: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/21.jpg)
Real Time Protocol (RTP)
RTP is used for carrying real-time data (e.g. coded voice) over IP networks. RTP offers two features:
The correct RTP packet order is maintained at the destination
RTP packets include a time stamp that records the exact time of transmission.
Voice stream
Voice stream
RTPRTP
UDPUDP
IPIP
:
Time stamps can be used at the destination to ensure synchronised play-out of (e.g.) the voice samples. TCP cannot be used below RTP, since TCP causes too large delays. Unfortunately, unlike TCP, UDP cannot guarantee correct packet order at the destination.
![Page 22: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/22.jpg)
RTP avoids delay variation
It is worth noting that RTP cannot reduce the total transmission delay in the network.
However, the usage of time stamps helps to reduce the time variation or jitter at the destination.
RTP in itself cannot reduce the time variation. This is the task of the application (which utilises the time stamps provided by RTP) at the destination.
RTP is able to carry a large variety of coded information (audio or video) => RTP is the standard solution for VoIP applications (“Voice over RTP over UDP over IP”).
![Page 23: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/23.jpg)
IPv4 header structure (1)
VersionVersion IHLIHL Type of ServiceType of Service Total length of IP datagramTotal length of IP datagram
IdentificationIdentification FlagsFlags Fragment offsetFragment offset
Time-to-liveTime-to-live ProtocolProtocol Header checksum (for error control)Header checksum (for error control)
Source IP address Source IP address
Destination IP addressDestination IP address
OptionsOptions PaddingPadding
Payload of IP datagramPayload of IP datagram
Version (4 bits): tells that this is IP Version 4 (IPv4)
(In case of IPv6, the bits following the 4-bit Version field should be interpreted totally differently)
32 bits (= 4 bytes or octets)
![Page 24: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/24.jpg)
IPv4 header structure (2)
VersionVersion IHLIHL Type of ServiceType of Service Total length of IP datagramTotal length of IP datagram
IdentificationIdentification FlagsFlags Fragment offsetFragment offset
Time-to-liveTime-to-live ProtocolProtocol Header checksum (for error control)Header checksum (for error control)
Source IP address Source IP address
Destination IP addressDestination IP address
OptionsOptions PaddingPadding
Payload of IP datagramPayload of IP datagram
IP header length (4 bits) is needed since Options + Padding can vary in length. Usually IP header length = 20 bytes.
(The Options field is rarely used. This is why such a field is not included in the IPv6 header)
![Page 25: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/25.jpg)
IPv4 header structure (3)
VersionVersion IHLIHL Type of ServiceType of Service Total length of IP datagramTotal length of IP datagram
IdentificationIdentification FlagsFlags Fragment offsetFragment offset
Time-to-liveTime-to-live ProtocolProtocol Header checksum (for error control)Header checksum (for error control)
Source IP address Source IP address
Destination IP addressDestination IP address
OptionsOptions PaddingPadding
Payload of IP datagramPayload of IP datagram
ToS = Type of Service (8 bits) is used for QoS management purposes (=> DiffServ).
(In the IPv6 header there is an 8 bit Traffic class field for the same purpose)
![Page 26: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/26.jpg)
IPv4 header structure (4)
VersionVersion IHLIHL Type of ServiceType of Service Total length of IP datagramTotal length of IP datagram
IdentificationIdentification FlagsFlags Fragment offsetFragment offset
Time-to-liveTime-to-live ProtocolProtocol Header checksum (for error control)Header checksum (for error control)
Source IP address Source IP address
Destination IP addressDestination IP address
OptionsOptions PaddingPadding
Payload of IP datagramPayload of IP datagram
Datagram length (16 bits): since this field is 16 bits long, the IP datagram can contain up to 216 = 65535 bytes (in theory).
Most routers, however, cannot handle such large datagrams.
![Page 27: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/27.jpg)
IPv4 header structure (5)
VersionVersion IHLIHL Type of ServiceType of Service Total length of IP datagramTotal length of IP datagram
IdentificationIdentification FlagsFlags Fragment offsetFragment offset
Time-to-liveTime-to-live ProtocolProtocol Header checksum (for error control)Header checksum (for error control)
Source IP address Source IP address
Destination IP addressDestination IP address
OptionsOptions PaddingPadding
Payload of IP datagramPayload of IP datagram
IP fragmentation: a large IP datagram may be fragmented (in any router along the path) and will be reassembled at the destination.
IPv6 does not offer fragmentation (it is rarely used anyway).
All fragments contain the same
number
Has value zero in last
fragment
Position of fragment in
original datagram
![Page 28: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/28.jpg)
IPv4 header structure (6)
VersionVersion IHLIHL Type of ServiceType of Service Total length of IP datagramTotal length of IP datagram
IdentificationIdentification FlagsFlags Fragment offsetFragment offset
Time-to-liveTime-to-live ProtocolProtocol Header checksum (for error control)Header checksum (for error control)
Source IP address Source IP address
Destination IP addressDestination IP address
OptionsOptions PaddingPadding
Payload of IP datagramPayload of IP datagram
Time-to-live (8 bits): this number is decreased by one in each router along the path. If number zero is reached in a router, the IP datagram is discarded and the router sends an ICMP message (TTL expired) to the source of the datagram.
Used also in IPv6 (called “hop limit”)
![Page 29: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/29.jpg)
IPv4 header structure (7)
VersionVersion IHLIHL Type of ServiceType of Service Total length of IP datagramTotal length of IP datagram
IdentificationIdentification FlagsFlags Fragment offsetFragment offset
Time-to-liveTime-to-live ProtocolProtocol Header checksum (for error control)Header checksum (for error control)
Source IP address Source IP address
Destination IP addressDestination IP address
OptionsOptions PaddingPadding
Payload of IP datagramPayload of IP datagram
Protocol field (8 bits): describes which higher layer protocol is used (TCP, UDP, or SCTP). The header of the higher-layer datagram is located at the beginning of the IP datagram payload.
Used also in IPv6 (called “next header”)
Starts here ...
![Page 30: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/30.jpg)
IP packet structure
Bearer protocol frame/packet/cellBearer protocol frame/packet/cell
IP datagramIP datagram
TCP/UDP datagramTCP/UDP datagram
User/application dataUser/application data
IP header
TCP/UDP header
Direction of transport
![Page 31: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/31.jpg)
IPv4 header structure (8)
VersionVersion IHLIHL Type of ServiceType of Service Total length of IP datagramTotal length of IP datagram
IdentificationIdentification FlagsFlags Fragment offsetFragment offset
Time-to-liveTime-to-live ProtocolProtocol Header checksum (for error control)Header checksum (for error control)
Source IP address Source IP address
Destination IP addressDestination IP address
OptionsOptions PaddingPadding
Payload of IP datagramPayload of IP datagram
Header checksum (16 bits): used for error control. Routers along the path have to recalculate the checksum.
This kind of error control is not used in IPv6 (since the same error control function is offered by TCP - and even UDP).
Why?Why?
![Page 32: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/32.jpg)
IPv4 header structure (9)
VersionVersion IHLIHL Type of ServiceType of Service Total length of IP datagramTotal length of IP datagram
IdentificationIdentification FlagsFlags Fragment offsetFragment offset
Time-to-liveTime-to-live ProtocolProtocol Header checksum (for error control)Header checksum (for error control)
Source IP address Source IP address
Destination IP addressDestination IP address
OptionsOptions PaddingPadding
Payload of IP datagramPayload of IP datagram
Source and destination IP address (32 bits each): note that these addresses are not changed in routers along the route.
In IPv6 the addresses are 4 x 32 = 128 bits long!
![Page 33: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/33.jpg)
IPv6 header structure
VersionVersion Traffic classTraffic class Flow label (identifies datagram ”flows”)Flow label (identifies datagram ”flows”)
Payload lengthPayload length Next headerNext header Hop limitHop limit
Payload of IP datagramPayload of IP datagram
Source IP address
Destination IP address
Can point to an “options” field in the
payload (instead of
TCP, UDP …)
32 bits (= 4 bytes or octets)
![Page 34: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/34.jpg)
IPv4 and IPv6 address structure
IPv4 address (32 bits or 4 bytes):
123.45.67.89
IPv6 address (128 bits or 16 bytes):
One byte (number between 0 and 255)
2001:0db8:85a3:0000:1319:8a2e:0370:7344
Four hexadecimal numbers (between 0 and f), each occupying four bits.
![Page 35: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/35.jpg)
Strong points of IPv6
Larger IP address space (3.4 1038 IP addresses available)
Fixed IP datagram header length (no variable length options field …) and better way to handle options
More simple (and therefore faster) header processing; no checksum checking or fragmentation
Real-time service or QoS support (using ”flow label” and ”traffic class” fields)
.
![Page 36: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/36.jpg)
UDP header structure
Source port numberSource port number Destination port numberDestination port number
Length of UDP content (incl.header)Length of UDP content (incl.header) ChecksumChecksum
UDP payload (application data)UDP payload (application data)
Two functions of UDP:
• application multiplexing (using port numbers)
• error control (using checksum)
![Page 37: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/37.jpg)
TCP header structure
Source port numberSource port number Destination port numberDestination port number
Sequence numberSequence number
Acknowledgement numberAcknowledgement number
Data offsetData offset FlagsFlags Receiver window sizeReceiver window size
ChecksumChecksum Urgent pointerUrgent pointer
Options Options PaddingPadding
TCP payload (application data) TCP payload (application data)Starts here ...
Flow control
Flags are one-bit indicators (SYN, ACK, FIN ...) used for simple signalling (TCP connection setup and teardown)
![Page 38: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/38.jpg)
IP address – points to host Port – points to application
Difference between IP address and port
TCP/UDPTCP/UDP
IPIP
TCP/UDPTCP/UDP
IPIP
Host A Host B
Port Y Port Z
IP address N IP address M
IP datagram contains:
(in IP header)source IP address Ndestination IP address M
(in TCP/UDP header)source port Ydestination port Z
![Page 39: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/39.jpg)
Some important port numbers
http (web applications) 80 TCP onlyhttps (http over SSL) 443 TCP onlyDNS 53 UDP mainlySMTP (outgoing mail)25 TCP/UDPPOP3 (from mail server) 110 TCP onlyIMAP (from mail server) 220 TCP/UDP
(Just to give an example, not necessary to remember.)
IP address + port number is given as 123.456.7.89:80
(Within the server only. The client can usually freely choose its port number.)
![Page 40: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/40.jpg)
IPv4 address structure
0 Network HostHost
HostHost110 Network
Class A
Class B
Class C
10 Network
27 = 128 224 = 16.8 106
214 = 16384 216 = 65536
28 = 256221 = 2.1 106
Hierarchical structure:
Flat structure would provide 232 = 4.3 109 IP addresses
IPv6 provides 2128 = 3.4 1038 IP addresses !
unnecessary capacity
running out of class B networks !
HostHost
![Page 41: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/41.jpg)
Insufficient IPv4 address space
There are basically four ways to avoid running out of IP addresses, either by making more efficient usage of the available address space (point 1) or by “expanding” the address space (points 2 – 4):
Classless interdomain routing (CIDR)
Dynamic IP address allocation
Network address translation (NAT)
Move to IPv6 (=> virtually unlimited address space).
1.
2.
3.
4.
![Page 42: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/42.jpg)
Classless interdomain routing (CIDR)
In comparison with the original class-oriented address structure, CIDR makes more efficient usage of the available address space. The size of the network part of the address is included in the IP address after the slash:
10110110 00101110 01011100 01101110
Network part = 21 bits Host part = 32 – 21 = 11 bits
182.46.92.110/21
In this example, eight class C networks are effectively grouped into one larger network.
![Page 43: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/43.jpg)
Dynamic IP address allocation
IP address is allocated temporarily. Address is taken from an address pool (stored in a DHCP server) and after usage is returned to the address pool.
Applications: Dial-up (modem) Internet accessADSLGPRSWLAN
Protocol used: DHCP (Dynamic Host Configuration Protocol, RFC 2131).
• • • •
![Page 44: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/44.jpg)
Network address translation (NAT)
NAT is a method of connecting a number of hosts (in a private network) to the Internet using a single external IP address.
NAT gateway
NAT gateway
Private network Internet
10.123.4.12
10.123.4.11
10.123.4.13
Reusable IP addresses (for instance of form 10.x.x.x or 192.168.x.x) are used for routing "behind" the NAT gateway.
Port no. 1
Port no. 2
Port no. 3
A single (globally unique) IP address is used for routing through the Internet. Hosts are identified by TCP/UDP port numbers.
123
.456.7
.89
![Page 45: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/45.jpg)
IP address and port usage in NAT
In outgoing packets (from client to server), NAT affects the source IP address and port number:
S port nr. D port nr.S IP addr. D IP addr.… … …
IP header TCP/UDP header
In incoming packets, the destination IP address and port number are affected:
S port nr. D port nr.S IP addr. D IP addr.… … …
10.123.4.11 => 123.456.7.89For example:
1123 => 12515For example:
![Page 46: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/46.jpg)
AS 1
Hierarchical structure of Internet
AS 2AS 3
IGP
IGP
AS = Autonomous
System
IGP = Interior
Gateway Protocol
EGP = Exterior Gateway Protocol
EGP
![Page 47: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/47.jpg)
Routing protocols in Internet
In practice, there is worldwide only one very complex EGP, namely BGP (Border Gateway Protocol)
The two most well-known IGP’s are RIP and OSPF
OSPF (Open Shortest Path
First)
RIP (Routing Information
Protocol)
![Page 48: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/48.jpg)
RIP vs. OSPF
RIP is a distance vector routing protocol, where neighbouring routers exchange routing information.
RIP is one of the oldest IGPs and is still widely used today.
OSPF is a link-state routing protocol, where routers construct a complete topological map of the entire autonomous system.
Autonomous system can be hierarchically structured into smaller “networks”.
Open => publicly available (not like Cisco’s EIGRP)
RFC 1723
RFC 2178
![Page 49: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/49.jpg)
Example: downloading HTML page (1)
User terminal
(Client)
HTML page source
(Server)
Send me HTML page
HTTPHTTP
TCPTCP
IPIP
PPPPPP
IPIP
PPPPPP
HTTPHTTP
TCPTCP
IPIP
ATMATMATMATM
Internet service provider’s PoP
Modem connection and PPP link between user terminal and ISP’s Point of Presence (PoP) is established. User terminal is given IP address (dynamic allocation).
![Page 50: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/50.jpg)
UDPUDP
Example: downloading HTML page (2)
User terminal
(Client)
HTML page source
(Server)
UDPUDP
IPIP
PPPPPP
DNS performs translation between URL and IP address of server (only the latter can be used for routing IP packets to the server).
UDPUDP
IPIP
Contact DNS ...
IP
DNS replies ...
IPIP
PPPPPP
![Page 51: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/51.jpg)
Example: downloading HTML page (3)
User terminal
(Client)
HTML page source
(Server)
HTTPHTTP
TCPTCP
IPIP
PPPPPP
IPIP
PPPPPP
HTTPHTTP
TCPTCP
IPIP
ATMATMATMATM
TCP connection is set up. Note that IP packets can be routed over different bearer networks (like ATM as above) and do not necessarily follow the same path.
Three-way handshaking
![Page 52: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/52.jpg)
Example: downloading HTML page (4)
User terminal
(Client)
HTML page source
(Server)
HTTPHTTP
TCPTCP
IPIP
PPPPPP
IPIP
PPPPPP
HTTPHTTP
TCPTCP
IPIP
ATMATMATMATM
HTTP request (get HTML page) is sent to server. HTTP reply (including HTML page) is returned in a “200 ok” message.
RequestReply
![Page 53: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/53.jpg)
Example: downloading HTML page (5)
User terminal
(Client)
HTML page source
(Server)
HTTPHTTP
TCPTCP
IPIP
PPPPPP
IPIP
PPPPPP
HTTPHTTP
TCPTCP
IPIP
ATMATMATMATM
If the client has no more requests, the TCP connection is cleared.
Two-way handshaking
![Page 54: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/54.jpg)
Example: downloading HTML page (6)
User terminal
(Client)
HTML page source
(Server)
HTTPHTTP
TCPTCP
IPIP
PPPPPP
IPIP
PPPPPP
HTTPHTTP
TCPTCP
IPIP
ATMATMATMATM
When requested by the client, the PPP and modem connections are cleared. (Bearer connections within the Internet backbone are naturally not cleared.)
![Page 55: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/55.jpg)
GPRS (General Packet Radio Service)
GSM BSS
3G RAN
PS core network
CS core network
GGSNGGSNSGSNSGSN
HLRHLR
AuCAuC
EIREIR
PSTN
Inte
rnet
MS
Handles packet (IP) traffic in a mobile network
![Page 56: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/56.jpg)
SGSN
GSM BSS
3G RAN
PS core network
CS core network
GGSNGGSN
HLRHLR
AuCAuC
EIREIR
PSTN
Inte
rnet
MS
SGSNSGSN
The serving GPRS support node in the packet-switched core network is the equivalent of the serving MSC/VLR in the CS core network.
![Page 57: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/57.jpg)
GGSN
GSM BSS
3G RAN
PS core network
CS core network
SGSNSGSN
HLRHLR
AuCAuC
EIREIR
PSTN
Inte
rnet
MS
The gateway GPRS support node is the equivalent of the GMSC in the CS core network. IP traffic from external IP networks (e.g. the Internet) is always first routed to the GGSN.
GGSNGGSN
![Page 58: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/58.jpg)
GPRS attach / PDP session
GPRS attach
MS is assigned PDP (IP) addressPacket transmission can take place
Separate or combined GSM/GPRS attachMS registers with an SGSN (authentication...)Location updates are now possible
PDP context is created
GPRS detach
PDP context is terminatedAllocated IP address is released
In case of dynamic address
allocation
DHCP(Dynamic Host Configuration
Protocol)
![Page 59: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/59.jpg)
PDP context
Packet data protocol context describes characteristics of GPRS session (session = "always on" connection)
PDP context information is stored in MS, SGSN and GGSN
MSMS
GGSNGGSNSGSNSGSN
::::::::::::
::::::::::::
::::::::::::
PDP type (e.g. IPv4)
PDP address = IP address of MS (e.g. 123.12.223.9)
Requested QoS (priority, delay …)
Access Point Name = IP address of GGSN (e.g. 123.12.223.0)
PDP type (e.g. IPv4)
PDP address = IP address of MS (e.g. 123.12.223.9)
Requested QoS (priority, delay …)
Access Point Name = IP address of GGSN (e.g. 123.12.223.0)
One user may have several PDP context sessions active 123.12.223.9
123.12.223.0
![Page 60: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/60.jpg)
PDP context activation
MSMS GGSNGGSNSGSNSGSN
::::::::::::
Activate PDP context request
Create PDP context request
Create PDP context response
Activate PDP context accept ::::::::::::
::::::::::::
IP address allocated to MS
Security functions
![Page 61: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/61.jpg)
Packet transmission (1)
MS (client)
MS (client)
GGSNGGSN
SGSNSGSN Server Server
Dynamic IP address allocation has one problem:It is difficult to handle a mobile terminated transaction(external source does not know IP address of MS)
Fortunately, packet services are usually of client-server type => MS (not server) initiates packet transmission
GGSN knows temporary IP adress of user
GGSN knows temporary IP adress of user
Server has to find correct GGSN
Server has to find correct GGSN
![Page 62: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/62.jpg)
Packet transmission (2)
MS (client)
MS (client)
GGSNGGSN
SGSNSGSN
Packet is sent to SGSN. SGSN sends packet to GGSN through GTP (GPRS Tunneling Protocol) tunnel.
Packet is tunneled through IP backbone of PS core network
Outer IP header Outer IP header IP headerIP header IP payloadIP payload
Tunneling = encapsulation of IP packet in GTP packet
Server Server
![Page 63: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/63.jpg)
Packet transmission (3)
MS (client)
MS (client)
GGSNGGSN
SGSNSGSN
Outer IP header Outer IP header IP headerIP header IP payloadIP payload
Dest. IP address: GGSN
Dest. IP address: Server
Server Server
Note the different destination IP addresses
![Page 64: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/64.jpg)
Packet transmission (4)
MS (client)
MS (client)
GGSNGGSN
SGSNSGSN
GGSN sends packet through the Internet to the server.
IP headerIP header IP payloadIP payload
Source IP address: GGSN, not MS
Dest. IP address: Server
Server Server
![Page 65: IP technology](https://reader036.fdocuments.in/reader036/viewer/2022062721/56813715550346895d9e9fcb/html5/thumbnails/65.jpg)
Packet transmission (5)
MS (client)
MS (client)
GGSNGGSN
SGSNSGSN
Server sends return packet via GGSN to MS. Note the different destination IP addresses along the way.
Packets from server to MS are always routed via GGSN (since this node has PDP context information, including the dynamically allocated IP address of MS).
Dest. IP address:
GGSN
Dest. IP address: MS
Server Server
Dest. IP address (in outer IP header): SGSN