Professional Documents
Culture Documents
New Microsoft Word Document
New Microsoft Word Document
New Microsoft Word Document
If a router has more than one interface to the same link, it need
perform the router part of MLD over only one of those interfaces.
Listeners, on the other hand, must perform the listener part of MLD
on all interfaces from which an application or upper-layer protocol
has requested reception of multicast packets.
3. Message Format
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Code | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Maximum Response Delay | Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Multicast Address +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
3.1. Type
In the rest of this document, the above messages types are referred
to simply as "Query", "Report", and "Done".
VPI
Stands for "Virtual Path Identifier." The VPI is an 8-bit header inside each ATM cell that
indicates where the cell should be routed. ATM, or asynchronous transfer mode, is a method
of sending data in small packets of fixed sizes. It is used by many ISPs (Internet Service
Providers) for transferring data to client computers.
As an ATM cell moves across a network, it typically passes through several ATM switches.
The VPI tells the switches where to route the packet of information, or what path to take.
Hence the name, "virtual path identifier." The VPI is used in conjunction with the VCI, or
virtual channel identifier.
VCI
Stands for "Virtual Channel Identifier." The VCI, used in conjunction with the VPI (virtual
path indicator), indicates where an ATM cell is to travel over a network. ATM, or
asynchronous transfer mode, is a method that many ISPs (Internet Service Providers) use to
transfer data to client computers. Because ATM sends packets over fixed channels, the data is
easier to track than information sent over the standard TCP/IP protocol.
The VCI within each ATM cell defines the fixed channel on which the packet of information
should be sent. It is a 16-bit field, compared to the VPI, which is only 8 bits. Since this
numerical tag specifies the virtual channel that each packet belongs to, it prevents
interference with other data being sent across the network.
1.3.1 Architecture
In an ATM network, information such as data, voice, or video that is transported through the
network is broken into small, fixed-sized pieces called cells. Each cell is 53 bytes long, with
48 bytes of user data (payload), and 5 bytes of header information (see Fig. 1).
Sign in to download full-size image
The Generic Flow Control (GFC) field in an ATM cell is intended to police traffic
across the user–network interface.
The Virtual Path Identifier (VPI)/Virtual Circuit Identifier (VCI) fields identify the
virtual path and virtual channel along which a cell should pass. The size of this field
may vary depending on the location of the cell relative to network boundaries (i.e.,
whether it is at the user–network interface or the network-node interface—this is
described in more detail later).
The Payload Type Identifier (PTI) identifies the information carried by the cell. The
cell may contain user information or connection layer management information. It is
also used to indicate a network congestion state or for network resource management.
The Cell Loss Priority (CLP) field indicates if a cell may be discarded should it
encounter congestion. This is typically used for noncritical data or network policing
functions.
•
The Header Error Check (HEC) field contains an 8-bit Cyclical Redundancy Check
(CRC) that protects the cell’s header.
There are several layers in the ATM architecture. The first layer is the physical layer that
describes the physical transmission of information through the network. The second layer is
the ATM layer. This layer defines the cell structure and how the ATM cells flow through the
logical connections in an ATM network. The third layer is the ATM Adaptation Layer or
AAL. The AAL is responsible for accommodating the multiple types of communication
traffic that are to be sent over the ATM network. The final layer is the user layer, where
various service-specific functions are available to end-user applications (see Fig. 2).
Types of Messages: ICMP messages are divided into two broad categories: error-reporting
messages and query messages. The error-reporting messages report problems that a router or
a host (destination) may encounter when it processes an IP packet. The query messages,
which occur in pairs, help a host or a network manager get specific information from a router
or another host.
I) Error Reporting:
One of the main responsibilities of ICMP is to report errors. Although technology has
produced increasingly reliable transmission media, errors still exist and must be
handled.
IP is an unreliable protocol. This means that error checking and error control are not a
concern of IP.
ICMP was designed, in part, to compensate for this shortcoming. However, ICMP
does not correct errors-it simply reports them. Error correction is left to the higher-
level protocols.
Error messages are always sent to the original source because the only information
available in the datagram about the route is the source and destination IP addresses.
ICMP uses the source IP address to send the error message to the source (originator)
of the datagram.
Five types of errors are handled: destination unreachable, source quench, time
exceeded, parameter problems, and redirection (see figure1).
II) Query:
In addition to error reporting, ICMP can diagnose some network problems. This is
accomplished through the query messages, a group of four different pairs of messages, as
shown in Figure3
Echo Request and Reply: The echo-request and echo-reply messages are designed
for diagnostic purposes. Network managers and users utilize this pair of messages to
identify network problems.
Timestamp Request and Reply: Two machines (hosts or routers) can use the
timestamp request and timestamp reply messages to determine the round-trip time
needed for an IP datagram to travel between them. It can also be used to synchronize
the clocks in two machines.
Address-Mask Request and Reply: If the host knows the address of the router, it
sends the request directly to the router. If it does not know, it broadcasts the message.
The router receiving the address-mask-request message responds with an address-
mask-reply message, providing the necessary mask for the host.
Router Solicitation and Advertisement: A host that wants to send data to a host on
another network needs to know the address of routers connected to its own network.
Also, the host must know if the routers are alive and functioning. The router-
solicitation and router-advertisement messages can help in this situation.
Checksum: In ICMP the checksum is calculated over the entire message (header and
data).
Stateless DHCPv6
Stateless DHCPv6 brings to the picture the DHCPv6 protocol. With this approach, we still
use SLAAC to obtain reachability information, and we use DHCPv6 for extra items.
The client always starts with a Router Solicitation, and the router on the segment responds
with a Router Advertisement. This time, the Router Advertisement has a flag called other-
config set to 1. Once the client receives the message, it will still use SLAAC to craft its own
IPv6 address. However, the flag tells the client to do something more.
After the SLAAC process succeed, the client will craft a DHCPv6 request and send it
through the network. A DHCPv6 server will eventually reply with all the extra information
we needed, such as DNS server or domain name.
We call this approach stateless because the DHCPv6 server does not manage any lease for
the clients. Instead, it just gives extra information as needed.
Stateful DHCPv6
Stateful DHCPv6 is the exact porting of DHCP into IPv6 world. With this approach, a
DHCPv6 server handle leases and extra information, just like traditional IPv4 DHCP.
The client starts again with a Router Solicitation, but this time the Advertisement in reply
contains the managed-config set to 1. This tells the client to not use SLAAC, but DHCPv6
instead. The client will then generate a DHCPv6 request to get both addressing and extra
information. The DHCPv6 server will be the one choosing the IPv6 address, not the client.
In this part of the article, we are going to cover how to configure Stateless DHCPv6, Stateful
DHCPv6 and SLAAC.
Stateless DHCPv6
The interface doing routing for the Right subnet is the GigabitEthernet 0/1.20. To
successfully enable Stateless DHCPv6, we need to define a pool with the extra information
we want to use, and turn on the other-config flag for that interface. Here’s our step-list.
1. Define a pool with the ipv6 dhcp pool global configuration command, calling it “Right”.
This will enter the prompt Router(config-dhcpv6)#, where we can configure extra
settings.
2. In the DHCPv6 prompt, enter the DNS server with dns-server command. This must be an
IPv6 address, and for this lab we are using 2001:db8:acad:10::15.
3. Define the domain name with domain-name command, for this lab use
right.company.local.
4. Go to the interface configuration mode, and associate the interface with the pool using
ipv6 dhcp server command.
5. Turn on the other-config flag for the interface using ipv6 nd other-config-flag
command, with no extra parameter.
For your convenience, we grouped all the commands you need to enter hereafter.
Your Packet Tracer score should increase, but clients still won’t get the IPv6 address. We
need to do something more.
By default, Packet Tracer clients have no IPv6 address. Furthermore, they are set to be static,
which is not what we want for this lab. We need to log into the client and change the setting
to Auto-Config. To do that, we simply click on the client and go to the Desktop Tab. From
there, we select the first icon (“IP Configuration”).
The following window will appear, and we can change the addressing method for IPv6. For
this lab we should set it to Auto-Config on all clients, in order to take advantage of Neighbor
Discovery. However, for a Stateless DHCPv6 network, the setting will automatically switch
from Auto-Config to DHCP when the client tires to contact the DHCP server.
Select Auto Config here.
Apply those settings to all the clients and we are set to go!
Stateful DHCPv6
For this lab, we are not going to configure Stateful DHCPv6. However, its configuration is
extremely easy. The first thing we want to do is to tell the pool which prefix is going to
manage. To do that, we use the address prefix command in the pool configuration prompt.
As a parameter, we need to enter a global unicast prefix, for example
2001:db8:acad:10::/64.
The next step is at the interface level. We need to turn on the managed-config flag in the
Neighbor Discovery. This is easily done with ipv6 nd managed-config-flag. The
remaining configuration is identical to Stateless DHCPv6.
Comparison of Neighbor Discovery to ARP and Related
IPv4 Protocols
The functionality of the IPv6 Neighbor Discovery protocol corresponds to a combination of
the IPv4 protocols: Address Resolution Protocol (ARP), Internet Control Message Protocol
(ICMP) Router Discovery, and ICMP Redirect. IPv4 does not have a generally agreed on
protocol or mechanism for neighbor unreachability detection. However, host requirements do
specify some possible algorithms for dead gateway detection. Dead gateway detection is a
subset of the problems that neighbor unreachability detection solves.
The following list compares the Neighbor Discovery protocol to the related set of IPv4
protocols.
Router discovery is part of the base IPv6 protocol set. IPv6 hosts do not need to
snoop the routing protocols to find a router. IPv4 uses ARP, ICMP router discovery,
and ICMP redirect for router discovery.
Router advertisements carry site prefixes for a link. A separate mechanism is not
needed to configure the netmask, as is the case with IPv4.
Neighbor Discovery enables IPv6 routers to advertise an MTU for hosts to use on the
link. Consequently, all nodes use the same MTU value on links that lack a well-
defined MTU. IPv4 hosts on the same network might have different MTUs.
Unlike IPv4 broadcast addresses, IPv6 address resolution multicasts are spread over 4
billion (2^32) multicast addresses, greatly reducing address resolution-related
interrupts on nodes other than the target. Moreover, non-IPv6 machines should not be
interrupted at all.
IPv6 redirects contain the link-local address of the new first hop. Separate address
resolution is not needed on receiving a redirect.
Multiple site prefixes can be associated with the same IPv6 network. By default, hosts
learn all local site prefixes from router advertisements. However, routers can be
configured to omit some or all prefixes from router advertisements. In such instances,
hosts assume that destinations are on remote networks. Consequently, hosts send the
traffic to routers. A router can then issue redirects, as appropriate.
Unlike IPv4, the recipient of an IPv6 redirect message assumes that the new next-hop
is on the local network. In IPv4, a host ignores redirect messages that specify a next-
hop that is not on the local network, according to the network mask. The IPv6 redirect
mechanism is analogous to the XRedirect facility in IPv4. The redirect mechanism is
useful on non-broadcast and shared media links. On these networks, nodes should not
check for all prefixes for local link destinations.
By using link-local addresses to uniquely identify routers, IPv6 hosts can maintain the
router associations. The ability to identify routers is required for router advertisements
and for redirect messages. Hosts need to maintain router associations if the site uses
new global prefixes. IPv4 does not have a comparable method for identifying routers.
Because Neighbor Discovery messages have a hop limit of 255 upon receipt, the
protocol is immune to spoofing attacks originating from off-link nodes. In contrast,
IPv4 off-link nodes can send ICMP redirect messages. IPv4 off-link nodes can also
send router advertisement messages.
By placing address resolution at the ICMP layer, Neighbor Discovery becomes more
media independent than ARP. Consequently, standard IP authentication and security
mechanisms can be used.