DIGITAL TCP/IP Services for OpenVMS
Concepts and Planning


Previous | Contents

Refer to the following guides for more details:

Application Support

The DIGITAL TCP/IP Services for OpenVMS software includes the PATHWORKS Internet Protocol (PWIP) driver and the PATHWORKS network ancillary control process (ACP) to provide TCP/IP options to PATHWORKS users.


Chapter 2
Internetworking and TCP/IP Concepts

An internet is a set of connected networks that act as a coordinated whole, providing interconnections while allowing individual groups to select the network hardware best suited to their needs. This chapter discusses the following networking and TCP/IP concepts:

2.1 Networks

It is important to remember that the Internet is not a new kind of physical network. It is a method of interconnecting physical networks and includes a set of conventions for using these networks that allow the computers they reach to interact. While network hardware plays only a minor role in the overall design, understanding the internet technology requires you to distinguish between the low-level mechanisms provided by the hardware and the higher-level facilities provided by the DIGITAL TCP/IP Services for OpenVMS (UCX) software.

A network consists of two or more computer systems linked by communications hardware and software. An open network is a network of open systems. An open system is a computer system with communications software that implements formal, international networking standards (for example, the TCP/IP suite of protocols).

A TCP/IP network supports remote system communication, resource sharing, and distributed processing. Network users can access resources on any system in the network and the resources of other vendors' systems.

2.1.1 Local Area Networks

A local area network (LAN) consists of two or more hosts, all connected to one broadcast medium by a high-speed communication medium over short distances. Host computers connect to the communication medium by a hardware interface that often connects to one of the following LANs: Ethernet, FDDI, or Token Ring.

2.1.2 Wide Area Networks

A wide area network (WAN) consists of two or more hosts residing in different locations. Communication transmissions are primarily carried for long distances over telephone lines or a similar medium. Each host connects to the communication medium by a hardware interface connected to the WAN. DIGITAL TCP/IP Services for OpenVMS supports the Serial Line Internet Protocol (SLIP) and the Point-to-Point Protocol (PPP) standards.

SLIP is framing protocol that sends IP packets over dialup phone lines. SLIP treats each serial link as a separate connection.

PPP is also a framing protocol that sends IP packets over dialup phone lines. Like SLIP, PPP also treats each serial link as a separate network. However, PPP's advantage over SLIP is that it can assign a temporary network number that applies during the time the connection is established. This approach allows internet service providers to make access available to more users because these users only occupy the line, and therefore the network number, during the connection.

2.1.3 Subnets

You can divide a network into subnetworks. A subnet is a single network within a group of interconnected networks. Subnets are useful for organizing hosts within a network into logical groups. When you use subnet routing, multiple physical networks can share a single network address. You can use local gateways and subnet addresses for each local physical network and cause the network to appear as one single network to other systems.

For example, your company may have only one assigned network number, even though several physical networks exist. In this scenario, you can use local gateways and assign a subnet address to each physical network to make it appear to outside systems that your company has only one network.

2.2 Internets

An internet is a unified, cooperative collection of two or more networks that support a single, universal communication service. The networks are connected by a host that acts as a gateway. A gateway transfers data from one host to another host on a different network. Underlying communication mechanisms reside on each network. Between these mechanisms and application programs, low-level protocols are hidden to make the collection of networks appear to be a single large network. These interconnected systems agree to conventions, such as procedures for moving data, that enable each computer to communicate with every other computer on the Internet, whether it is locally or remotely connected.

The Internet is a global internet that uses TCP/IP protocols. This entity is accessible to many universities, military installations, government research labs, private companies, and individuals.

2.3 Client/Server Model

Host-to-host communication takes place between two processes. A process is a program that executes on a host. Any process that offers a service to another process over the network is known as a server. Any process that requests a service from another process over the network is known as a client. Clients request a service from the server and wait for the result. The server performs that service as if it were local to the client. Servers are shared processes that support multiple clients.

Figure 2-1 shows a typical client/server relationship.

Figure 2-1 Client/Server Relationship



2.4 IP Addresses

Each host in an internet must have a unique Internet Protocol (IP) address. To communicate with a remote host, a local user must know the IP address of the remote host and both hosts must reside on the same internet.

The IP address consists of 32 bits (equivalent to 4 bytes or octets) of information. The 4 bytes are usually expressed in dotted decimal format with each byte a number between 0 and 255. For example, 98.0.2.65 is a valid IP address.

The 4-byte IP address is divided into two parts: the network address and the host number. Within the same network, the IP address of each host has the same network address number but a unique host number. For example, 201.233.20.125 and 201.233.20.130 are two separate hosts on the same network (201.233.20 is the network address and 125 and 130 the host numbers of the two hosts).

Currently, IP addresses are organized into three classes, depending on the size of the network they represent: Class A, Class B, and Class C. Class A networks are extremely large; each Class A network can consist of more than 16 million hosts. Class B networks are smaller with a maximum of 65,534 hosts, and Class C networks must contain fewer than 245 hosts. (These numbers are theoretical. In practice, Class A and Class B networks are usually divided into subnets, which significantly reduces the number of hosts they contain.)

Given that each IP address is 4 bytes, you can tell the relative size of a network based on its IP address, as follows:

See Table 2-1 for examples of the network address for the three classes of networks.

Table 2-1 Network Address Ranges
Class First Byte Second Byte Third Byte Fourth Byte Example
A 1--126 x¹ x¹ x¹ 103. x.x.x¹
B 128--191 1--255 x¹ x¹ 153.200. x.x¹
C 192--223 0--255 1--254 x¹ 203.120.2. x¹


¹x= Host number and subnet address

The InterNIC is the central organization that assigns these network addresses to other organizations, which in turn assign the host numbers represented by x in Table 2-1. Each organization is responsible for making sure that all attached hosts are properly numbered. Currently, only Class C networks are available. See Appendix A for more information about the InterNIC and how to obtain IP addresses.

2.4.1 Example of IP Addresses

Figure 2-2 shows an example of assigned IP addresses and names for an internet.

Figure 2-2 IP Addresses and Names of a Sample Internet



  1. (1) The gateway transfers data between hosts on different networks. Each gateways has an IP address for each network to which they are attached.
  2. (2) Each host in an internet has at least one unique name and IP address.
  3. (3) Hosts can have multiple names (multihomed). However, one name is usually considered the official name (Host F) and the others are aliases (Dallas).
  4. (4) IP addresses are assigned to network interfaces (for example, FDDI, token ring, Ethernet, SLIP, or PPP).

Although the name and address of a host can change, they usually remain stable for extended time periods.

2.4.2 Network Byte Order

Internet packets carry binary numbers that specify information such as destination addresses and packet lengths, which must be understood by both the sending and receiving hosts. Different machines, however, store 32-bit integers in different ways. The two most common ways are called Little Endian and Big Endian. With Little Endian style, the lowest memory address contains the low-order byte of the integer whereas with Big Endian, it contains the high-order byte of the integer. Thus, direct copying of bytes from one machine to another may change the value of the number.

To solve this problem, the Internet community has defined the Big Endian style as the network standard byte order that all machines must use for binary fields in internet packets. Each host converts binary items from the local representation to network standard byte order before it sends a packet and converts the packet back to the local representation when a packet is received.

In the network standard byte order, the high-order bits in the network number designate the network class of the IP address. For a Class A network, the first high-order bit is 0. For a Class B network, the first two high-order bits are 10. For a Class C network, the first three high-order bits are 110.

Figure 2-3 shows the bit positions of the IP address for the three network classes.

Figure 2-3 IP Network Classes



2.4.3 Network Mask

Subnet routing requires a different interpretation of IP addresses. A certain number of bits are taken from the octets in the host part of the address and used to specify subnet information.

When using subnet addresses, you use a network mask. The network mask informs the system which bits of the IP address to interpret as the network, subnet, and host addresses. A network mask is a 32-bit number. There is a one-to-one correspondence between the 32 bits in the network mask and the 32 bits in the IP address (the terms network mask and subnet mask can be used interchangeably).

For each bit in the network mask that is turned on (binary 1), the corresponding bit position in the IP address is interpreted as part of the network and subnet address.

The decimal number 255 is 11111111 in binary notation. The value 255 means that an entire 8-bit field is turned on because each bit position is a 1. Generally, the entire 8-bit field is turned either on (255) or off (0). Values other than 255 or 0 can be used. However, by using 255 or 0, you make it easier for users to differentiate between the network, host, and subnet fields.

If the network mask bit position is part of the host field and is turned on, the corresponding bit in the IP address is interpreted as part of the subnet address. If the network mask bit position is part of the host field and is turned off, the corresponding bit in the IP address is interpreted as part of the host address.

All bits in the first (leftmost) byte of the network mask must be turned on (decimal value of 255, binary value of 11111111), because the first byte of the IP address must always be interpreted as the network address regardless of whether there are subnets. If a bit in the first byte of the network mask is turned off, part of the network field of the IP address is interpreted as part of the host address. This may cause errors.

The second and third bytes of the new mask are usually either 255 or 0, depending on how the IP address is to be interpreted. The fourth byte is usually 0, to indicate that the fourth byte of the IP address is part of the host address.

Figures 2-4 and 2-5 illustrate the way different network masks affect the subnet address. As illustrated in Figure 2-4, a Class A network mask can be 255.255.0.0. When the network mask is 255.255.0.0, the first byte is the network address, the second byte is the subnet address, and the third and fourth bytes are the host address.

Figure 2-4 Class A Network Mask, Example 1



Figure 2-5 shows a Class A network with a network mask of 255.255.255.0. If the network mask is 255.255.255.0, the first byte is the network address, the second and third bytes are the subnet address, and the fourth byte is the host address.

Figure 2-5 Class A Network Mask, Example 2



If a Class B network uses 255.255.255.0 (as shown in Figure 2-6) for a network mask, the first and second bytes are the network address, the third byte is the subnet address, and the fourth byte is the host address.

Figure 2-6 Class B Network Mask



Normally, Class C networks do not have subnets, because only 8 bits are allocated for the host part of the IP address. Eight bits may not be enough to divide between a subnet address and a host address.

The default network masks for each class are as follows:

2.4.4 Broadcast Mask

The broadcast mask interprets the IP address as a broadcast address. The broadcast address allows messages to be sent to all the hosts on the network at the same time. If you use subnets, all the hosts on the same subnet must have the same IP broadcast address.

The default format of the broadcast address consists of the network number followed by all 1s. However, for compatibility it may be necessary to change the IP broadcast address to the network number followed by all 0s, because some operating systems (UNIX BSD 4.2 and DIGITAL UNIX prior to Version 1.2) require all 0s for a broadcast address.

The network number includes the subnet, if there is one.


Note

Problems can occur when systems using all 0s coexist on the same network as systems using all 1s. The two hosts may not be able to interpret each other's broadcast address.

If you know the IP address and the network mask for a particular host, you can determine the broadcast address by using the following formula:
(NOT networkmask) OR (internetaddress)

For example, if a host has an IP address of 128.50.100.100 and its network mask is 255.255.0.0 (the default), its broadcast mask is 128.50.255.255. The NOT of its network mask is 0.0.255.255. You then substitute the first two fields of the IP address for the two 0s to get the broadcast address.

Table 2-2 lists examples of broadcast addresses.

Table 2-2 Broadcast Addresses
Host IP Address Host Number Network Class Network Number Network Mask Broadcast Address
3.0.0.10 10 A 3. 255.0.0.0 3.255.255.255 or 3.0.0.0
11.1.0.12¹ 12 A 11.1. 255.255.0.0 11.1.255.255 or 11.1.0.0
129.39.0.15 15 B 129.39. 255.255.0.0 129.39.255.255 or 129.39.0.0
128.45.2.8¹ 2.8 B 128.45. 255.255.255.0 128.45.2.255 or 128.45.2.0
192.0.1.8 8 C 192.0.1. 255.255.255.0 192.0.1.255 or 192.0.1.0
192.0.1.223 223 C 192.0.1. 255.255.255.0 192.0.1.255 or 192.0.1.0


¹Shows use of subnet address

2.5 Routing

Routing is the process of moving information, in the form of datagrams, from one host to another over the network. A host has a name that is recognizable to users, such as HARRY or ULTRA. The host name is associated with one or more IP addresses.

The Internet layer deals primarily with addresses. Higher layer protocols (for example, protocols in the Application layer) map the names to addresses. The Internet layer maps the IP addresses to the local network addresses. The local gateway maps a destination not on the local network to the remote network. Figure 2-7 shows internet routing.

Figure 2-7 Internet Routing



Internet routing follows this progression:

  1. The sending application program (Application layer and Transport layer) prepares its data and calls on its Internet layer.
    The Internet layer receives the data and the destination address as arguments of the call.
  2. The Internet layer prepares a datagram header (lph1) that contains the destination IP address. This layer also attaches the data to this destination IP address. By knowing the IP address of the destination host, the Internet layer determines the network that receives the data. If the destination host is on the same network as the local host, the destination IP address is the address of the destination host. If the destination host is on another network, the destination IP address is the address of the gateway that connects the local network to the destination network.
    The Internet layer sends this datagram to the Network Interface layer.
  3. The Network Interface layer creates a local network header (Lnh1) and attaches the datagram to it. The datagram with the attached header is sent by means of the local network (local network 1).
  4. If the datagram is sent to a gateway host, the Network Interface layer of the gateway host removes the local network header (Lnh1) and delivers the datagram to the Internet layer.
  5. (5) The Internet layer uses the Internet header (lph1) to determine the destination IP address of the datagram. The Internet layer determines a local network address for the destination host and passes the datagram to the Network Interface layer and the network sends the datagram. The datagram contains a new Internet header (lph2) that contains the destination IP address.
  6. (6) The Network Interface layer creates a local network header (lnh2), attaches the datagram to it, and sends the results to the destination host on local network 2.
  7. (7) The destination host removes lnh2 at the Network Interface layer and passes the datagram to the Internet layer.
  8. (8) The Internet layer determines whether the datagram is for an application program in the host. If it is, the Internet layer removes the Internet header (lph2) and passes the data to the application program in response to a system call. The data, the source address, and other parameters are also passed to the application.

2.5.1 Subnet Routing

Using subnets allows you to organize hosts within a network into logical groups. A network can be made up of several subnets. A host on a network can access a host on a subnet if there is a gateway connecting the networks, as illustrated in Figure 2-8. The data from the host on the other network routes through the gateway to the network and onto the appropriate subnet, where the destination host receives the data.

See Figure 2-8 for an example of subnet routing on multiple physical networks.

Figure 2-8 Subnet Routing on Multiple Physical Networks



2.5.2 How Dynamic Routing Works

UCX supports dynamic routing. With dynamic routing, your system updates its routing database with routing information supplied over the network by gateways.

The dynamic routing server listens on a User Datagram Protocol (UDP) socket for packets with routing information. If the host is a gateway (internet router), it periodically supplies copies of its routing tables to directly connected hosts or networks.

When the dynamic routing server is started, it reads the UCX$ROUTE.DAT file to create entries in the internet routing table for gateways that were defined by the system manager. Then, it finds all active Internet interfaces (except those marked in loopback). If multiple interfaces are present, the dynamic router assumes that the host forwards packets between networks. The dynamic routing server then transmits a Routing Information Protocol (RIP) request packet on each interface. If the interface supports broadcast packets, the dynamic router sends a broadcast packet. Otherwise, the dynamic router sends a normal packet and listens for RIP request and RIP response packets from other hosts.

When a RIP request packet is received, the dynamic router formulates a reply based on the information maintained in its internal tables. The RIP response packet generated by the server contains a list of known routes, each marked with a hop count metric. The hop count is the number of hops between two hosts, based on the number of different routers needed to traverse the distance between the two hosts. A hop count of 16 or greater is considered infinite.

If one or more of the following conditions exist, the RIP response packets received by the dynamic router are used to update the internet routing tables:

When an update is applied, the dynamic router records the change in its internal tables and generates a RIP response packet to all hosts and networks to which it is directly connected. The dynamic router waits a short period of time (no more than 30 seconds) before modifying the internet routing tables to allow possible unstable situations to be resolved.

In addition to processing incoming packets, the dynamic routing server periodically checks the internet routing table entries. If an entry has not been updated for 3 minutes, the entry's metric is set to infinity and marked for deletion. Deletions are delayed an additional 60 seconds to ensure that the invalidation is propagated throughout the internet.

Hosts that act as gateways supply their routing tables to all directly connected hosts and networks every 30 seconds. The RIP response is sent to either the broadcast destination, an address on a point-to-point link, or the gateway's address on other networks. The normal routing tables are bypassed when sending RIP response packets.


Previous | Next | Contents