Lecture 3: IPv4 cont d, ICMP, and UDP
|
|
- Peter Smith
- 7 years ago
- Views:
Transcription
1 Internetworking Lecture 3: IPv4 cont d, ICMP, and UDP Literature: Forouzan, TCP/IP Protocol Suite: Ch 8-9, 11
2 IPv4 Options IPv4 options are intended for network testing or debugging Options are variable size and comes after the fixed header. Contiguous no separators Not required fields, but all IP implementations must include processing of options In practice many implementations do not! Max 40 bytes - very limited use Max header length is 60 bytes (fixed part is 20 bytes)
3 IP Options Encoding Two styles Single byte (only code) Multiple byte Option Code: 1 byte Copy (to fragments) (1 bit) Class (2 bits) 0 (00): Datagram or network control 2 (10): Debugging and measurement Number (5 bits) Option Length (len): 1 byte, defines total length of option (including code and len fields) Data: option specific code len data copy class option number
4 Categories of IP Options The McGraw-Hill Companies, Inc., 2000
5 IP options types Number Option End of option No option Loose source route Timestamp Record route Strict source route
6 IP Options: Record Route Each router records its address The destination processes the trace E.g. sends the result back to the sender Pointer is next available slot Source creates an empty list Every router adds its address. Increments pointer Limited to nine hops IP header size limit code len pointer First IPv4 addr Second IPv4 addr... Second IPv4 addr First IPv4 addr
7 IP Options: Record Route Example Note that pointer is an index, starting with code at index 1 The McGraw-Hill Companies, Inc., 2000
8 IP Options: Source Route The sender dictates a path through the network Strict Source Routing The path is exactly as specified. Loose Source Routing Allows multiple hops between successive addresses. The routers records their addresses Just like record route code len pointer First IPv4 addr Second IPv4 addr... Second IPv4 addr First IPv4 addr
9 IP Options: Source Route Example The McGraw-Hill Companies, Inc., 2000
10 IP Options: Timestamp Similar to record route, but also adds a timestamp Source creates an empty list Every router adds its address and a timestamp. An overflow field (O-flow) specifies how many routers could not specify a timestamp. A flags field specifies the visited router responsibilities E.g., add only timestamp or add timestamp + outgoing IP address Code: 68 Length (total) Pointer O-flow Flags Data
11 IP Options: Timestamp cont d The McGraw-Hill Companies, Inc., 2000
12 ICMP Internet Control Message Protocol - RFC 792
13 ICMP ICMP is a signalling protocol for IPv4. Report IP problems back to sender Control and Management Considered a part of IP, but uses IP for transfers. Query ICMPs Control purposes Examples: Echo, Router advertisement, Timestamp, etc. Error ICMPs Sent when an error in IP detected Includes the first 8 bytes of the data field of the original datagram which caused the error. Not sent for: icmp errors, broadcasts, fragments, etc. Examples: Dest unreachable, Redirect, etc.
14 ICMP Messages ICMP messages Error-reporting Query Type Message Type Message 3 Destination unreachable 8/0 Echo request/reply 4 Source quench 13/14 Timestamp request/reply 11 Time exceeded 17/18 Address mask request/reply 12 Parameter problem 10/9 Router solicitation/advertisement 5 Redirection
15 General Format of ICMP Messages Type: specifies type of message The McGraw-Hill Companies, Inc., 2000 Code: specifies reason for the particular message type
16 ICMP Header ICMP error messages returns original IP datagram Original IP header (+ options) and 8 bytes of payload Example: ICMP Destination Unreachable (UDP packet) ICMP Message Ethernet header IP header ICMP header IP header of datagram that generated the error UDP header ICMP Header varies depending on type Example: ICMP Destination Unreachable (type 3) type (3) code (0-15) checksum Common for all types Unused (all 0s) IP header (including options) + first 8 bytes of original IP data
17 ICMP Error Reporting One of the main responsibilities of ICMP Recall that IP is an unreliable protocol, and errors may occur ICMP does not correct errors Left to higher level protocols Error messages are always sent back to the original source Because the only information available in the datagram about the route is the source and destination IP addresses ICMP uses the source address of the IP packet to send the error message back to the source (originator)
18 ICMP Error Restrictions An ICMP Error is not returned in response to: A datagram carrying another ICMP Error A datagram destined to IP broadcast or multicast address A datagram sent as link-layer broadcast (e.g., Ethernet) An IP fragment other than the first A datagram whose source address does not define a single host (e.g., ) Reason is the risk of creating: Loops Packet explosions (broadcast storms)
19 ICMP Error Reporting Messages The McGraw-Hill Companies, Inc., 2000
20 ICMP Destination Unreachable Different types (Code 0-15): Code 0 network unreachable Returned by routers Code 1 host unreachable Returned by routers Code 3 port unreachable Returned by hosts when UDP/TCP port does not exist... (Code 0 15 are defined)
21 ICMP Source Quench Error Attempt to add a kind of flow control to IP! ICMP source quench may be generated if the system receives data faster than it can process it New Router Requirements RFC: routers should not generate source quench errors Consumes network bandwidth An ineffective and unfair fix for congestion Thus, for reliability you have to do end-to-end (transport level) flow control, error checking, and use acknowledgements TCP
22 ICMP Time Exceeded This type (11) of error message is sent in 2 cases Code 0: when TTL is zero after decrementation, the router discards the datagram and sends an ICMP Time Exceed back to the source Code 1: when all fragments of a datagram do not arrive at the destination host within a certain time limit Timer is started at reception of first fragment
23 Tool Using ICMP: Traceroute Traceroute traces a path to a destination by exploring every IP hop on the way Note: only receiving interfaces are traced, not sendig. Traceroute algorithm uses two steps: 1. Set small TTL fields and receive ICMP time exceeded incrementally 2. When final host reached, use unlikely UDP port and get ICMP port unreachable back Alternative: use an IP datagram with record route option But this is not always implemented Limited number of hops can be traced due to maximum size of IP options (Record route records IP addresses if outgoing interfaces)
24 ICMP Parameter Problem Code 0: Main IP header field problem Pointer points to byte with problem Code 1: Problem in IP option field Pointer not used IP routers and hosts do sanity checks on IP header The McGraw-Hill Companies, Inc., 2000
25 ICMP Redirect concept ICMP Redirect is sent by a router (R1) to the sender of an IP datagram (host) when the datagram should have been sent to a different router (R2) (3) ICMP Redirect (1) IP datagram (4) Subsequent IP datagrams R 1 (2) IP datagram R 2
26 ICMP Redirect message format Code 0: Redirection for network specific route Code 1: Redirection for host specific route... The McGraw-Hill Companies, Inc., 2000
27 ICMP Query Messages The McGraw-Hill Companies, Inc., 2000
28 Echo Request and Reply The McGraw-Hill Companies, Inc., 2000 Can you think of a widely used program that uses ICMP Echo request/reply?
29 Ping uses ICMP Echo Request/Reply Ping tests host reachability. Uses ICMP echo request/response, Almost all IP implementations support Ping server. Sends an ICMP echo request to a node Server replies with ICMP echo response With IP record route (RR) option, the route of the ping datagram can be traced ICMP Echo Request... ICMP Echo Respond
30 Timestamp Request and Reply Can be used to calculate round-trip time Even if clocks are not synchronized The McGraw-Hill Companies, Inc., 2000 Can be used to synchronize clocks if one-way duration is known
31 Address-Mask Request and Reply Can be used by diskless clients to find out the address mask Recall that RARP gives only the IP address Not used very much The McGraw-Hill Companies, Inc., 2000 Other protocols (DHCP, BOOTP) are used for autoconfiguration (later lecture)
32 Router Solicitation/Advertisement On booting, hosts send ~3 ICMP router solicitation messages (~3 seconds apart) to find a default router. Dynamic discovery of the default router. Routers periodically broadcast or multicast advertisements of their existence and desire to provide routing service Advertisements typically every seconds Advertisements have a stated lifetime (typically 30 minutes) Seldom implemented Mobile IP discovery mechanisms IPv6
33 ICMP Summary Destination Unreachable Network/Host/Protocol/Port/... Time Exceeded TTL expired Used in the traceroute tool Parameter problem IP header error Source Quench Requests source to decrease its data rate. Redirect Tell source to send its messages to a better address Echo Request/Echo reply For testing (e.g., ping program sends an Echo request) Timestamp Request/Reply Clock synchronization RTT Address Mask Request/Reply Diskless systems Router Solicitation and Advertisment Hosts query routers Routers advertise presence and routes
34 IP and ICMP Summary IPv4 is engineered to solve problems encountered at the network level Each field in the IPv4 header addresses a networking issue Logical addressing Different L2 characteristics (MTUs) QoS Bit errors Multiplexing The control and error mechanism of IP is provided by ICMP IPv4 is a very successful protocol, but there are many flaws and unused features IPv6 has cleaned up the IP layer considerably
35 Transport Layer
36 Transport Layer Responsible for end-to-end delivery of entire messages Service-point addressing (Protocol Port or Port Number) Address the specific running process on a computer Segmentation and Reassembly Divide message into transmittable segments and reassemble message at receiver Connection Control For connection-oriented transport protocols End-to-end Flow Control (in contrast to link level flow control) End-to-end Error Control (in contrast to link level error control)
37 TCP/IP Transport Layer Protocols 2 transport layer protocols in the TCP/IP stack UDP User Datagram Protocol Connectionless unreliable service TCP Transmission Control Protocol Connection-oriented reliable stream service... Telnet FTP DNS TCP UDP ICMP IP ARP Underlying link technology
38 Protocol Ports Ultimate source/destination of/for a transport level message is a protocol port A process sends/listens to a protocol port (identified with an integer) Most operating systems provide synchronous access to ports A process gets blocked if it attempts to extract data from a port prior to arrival of data In general, ports are buffered Data arriving before a process is ready to accept is placed in a (finite) queue To communicate with a port, sender needs to know both the IP address of the machine and the protocol port number within the machine The combination of an IP address and a port number is called a socket Each message must carry destination port and source port
39 Port Numbers in Three Groups Range Purpose Well-known ports Registered ports Dynamic ports Servers are normally known by their well-known port number (e.g., 80 for HTTP). Assigned and controlled by IANA Dynamic ports are ephemeral and can be used by any process (normally used by client processes)
40 UDP User Datagram Protocol - RFC 768
41 UDP UDP User Datagram Protocol Datagram-oriented transport layer protocol Provides connectionless unreliable service Provides optional end-to-end checksum covering header and data Provides no feedback to control data rate An UDP datagram is silently discarded if checksum errors UDP messages can be lost, duplicated, or arrive out of order Application programs using UDP must deal with reliability problems DNS, DHCP, SNMP, NFS, VoIP, etc. use UDP An advantage of UDP is that it is a base to build your own protocols on
42 UDP Message Format 8 byte header + possible data bit source port number 16 bit destination port number 16 bit UDP length 16 bit UDP checksum data (if any) UDP length field is redundant, since the IP software can pass this info to UDP IP header IP datagram UDP datagram UDP header UDP data 20 bytes 8 bytes 0..(2 16 1) ( ) = bytes
43 UDP Checksum and Pseudo-header UDP checksum covers application data, UDP header,a pseudoheader, and pad byte (if needed) Purpose with pseudo-header: double-check that packet arrived to correct destination check that IP delivered the packet to the correct protocol (UDP/TCP) Pseudoheader and pad byte not transmitted, only used for computation Pseudoheader 32-bit src IP addr 32-bit dst IP addr All 0s 8-bit protocol 16-bit UDP total length UDP header 16-bit src port number 16-bit UDP total length 16-bit dst port number 16-bit checksum Data, padded to multiple of 2 bytes (16 bits)
44 Maximum UDP Datagram Size Theoretical limit: 65,535 bytes - due to (IP s) 16-bit total length field with 20 bytes of IP header + 8 bytes of UDP header 65,507 bytes of user data Two limitations: sockets API limits size of send and receive buffer; generally 8 kbytes, but you can call a routine to change this TCP/IP implementation - Stevens found various limits to the sizes - even with loopback interface Hosts are required to handle at least 576 byte IP datagrams lots of protocols limit themselves to 512 bytes or less of data to avoid fragmentation DNS, TFTP, BOOTP, and SNMP
45 UDP Summary Transport Layer Basics end-to-end delivery of messages UDP a fairly simple connectionless protocol
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More information04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationSubnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
More informationChapter 11. User Datagram Protocol (UDP)
Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationNETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
More informationInternet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationNetwork Layer: Address Mapping, Error Reporting, and Multicasting
CHAPTER 21 Network Layer: Address Mapping, Error Reporting, In Chapter 20 we discussed the Internet Protocol (IP) as the main protocol at the network layer. IP was designed as a best-effort delivery protocol,
More information2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
More informationInternet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationКомпјутерски Мрежи NAT & ICMP
Компјутерски Мрежи NAT & ICMP Riste Stojanov, M.Sc., Aleksandra Bogojeska, M.Sc., Vladimir Zdraveski, B.Sc Internet AS Hierarchy Inter-AS border (exterior gateway) routers Intra-AS interior (gateway) routers
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationComputer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
More informationClassful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics
Switching and Forwarding Switching and Forwarding Generic Router rchitecture Forwarding Tables: ridges/layer Switches; VLN Routers and Layer 3 Switches Forwarding in Layer 3 (Network Layer) Network Layer
More informationDatacommunication. Internet Infrastructure IPv4 & IPv6
Internet Infrastructure IPv4 & IPv6 Eric Malmström eric.malmstrom@globalone.net Slide 1 Background mid 1970 DARPA finances research on packet switching networks p-p networks, packet radio and satellite
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationNetwork Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationUnix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
More informationNetwork Layer: and Multicasting. 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 21-1 ADDRESS MAPPING The delivery
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationNetwork Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More information- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
More informationLecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
More informationNetworks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
More informationWhat is a DoS attack?
CprE 592-YG Computer and Network Forensics Log-based Signature Analysis Denial of Service Attacks - from analyst s point of view Yong Guan 3216 Coover Tel: (515) 294-8378 Email: guan@ee.iastate.edu October
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More informationIP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets
Address Classes (Some are Obsolete) 15-441 15-441 Computer Networking 15-641 Class A 0 Network ID Network ID 8 16 Host ID Host ID 24 32 Lecture 8 Addressing & Packets Peter Steenkiste Fall 2013 www.cs.cmu.edu/~prs/15-441-f13
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationLab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
More informationAddress Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)
Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: Arto.Karila@hut.fi
More informationGary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
More informationUser Datagram Protocol - Wikipedia, the free encyclopedia
Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationInternet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationApplication Protocols for TCP/IP Administration
Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities
More informationIPv6 Associated Protocols
IPv6 Associated Protocols 1 New Protocols (1) New features are specified in IPv6 Protocol -RFC 2460 DS Neighbor Discovery (NDP) -RFC 4861 DS Auto-configuration : Stateless Address Auto-configuration -RFC
More informationSUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com
Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com SUPPORT DE COURS Matière : Réseaux 2 Niveau : 3 ème Année Licence en Informatique Option : Réseaux et
More informationHow Does Ping Really Work?
How Does Ping Really Work? George Mays, Global Knowledge Course Director, CCISP, CCNA, A+, Network+, Security+, I-Net+ Introduction Ping is a basic Internet program that most of us use daily, but did you
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationHOST AUTO CONFIGURATION (BOOTP, DHCP)
Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationComputer Networks. Main Functions
Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationThe Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
More informationACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More informationReview: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
More informationNetwork layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
More informationTroubleshooting TCP/IP
CHAPTER 7 The sections in this chapter describe common features of TCP/IP and provide solutions to some of the most common TCP/IP problems. The following items will be covered: TCP/IP Introduction Tools
More informationInternetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
More informationTFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES
TFTP - Trivial File TFTP Transfer Protocol TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES Peter R. Egli INDIGOO.COM 1/10 Contents
More informationCS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013
CS 43: Computer Networks IP Kevin Webb Swarthmore College November 5, 2013 Reading Quiz IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented
More informationDHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy
, ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationFuture Internet Technologies
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
More information2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationChapter 5. Transport layer protocols
Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationIP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
More informationChapter 13 Internet Protocol (IP)
Chapter 13 Internet Protocol (IP) Introduction... 13-5 IP Packets... 13-5 Addressing... 13-7 Subnets... 13-8 Assigning an IP Address... 13-9 Multihoming... 13-11 Local Interfaces... 13-11 Address Resolution
More informationUnderstanding Layer 2, 3, and 4 Protocols
2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new
More informationCHAPTER 1 PRINCIPLES OF NETWORK MONITORING
CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA E-mail:{ jshamsi,
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
More informationThe internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet
The internetworking solution of the Internet Prof. Malathi Veeraraghavan Elec. & Comp. Engg. Dept/CATT Polytechnic University mv@poly.edu What is the internetworking problem: how to connect different types
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More informationOutline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright
More informationTCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
More informationChapter 4 Network Layer
Chapter 4 Network Layer Reti degli Elaboratori Canale AL Prof.ssa Chiara Petrioli a.a. 2013/2014 We thank for the support material Prof. Kurose-Ross All material copyright 1996-2012 J.F Kurose and K.W.
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationOverview. 15-441 Computer Networking. IP Address Classes (Some are Obsolete) Outline. Lecture 9 IP Packets. CIDR IP addressing. Forwarding examples
Overview 15-441 Computer Networking Lecture 9 Packets Last lecture How does choice of address impact network architecture and scalability? What do addresses look like? This lecture Modern addresses How
More information1000 CCNA Certification Exam Preparation Questions and Answers:
1000 CCNA Certification Exam Preparation Questions and Answers: One Thousand Practice Questions for Passing the CCNA Exams - Pass On Your First Try 1 Copyright 2009 Notice of rights All rights reserved.
More information