The Transport Layer. Antonio Carzaniga. October 24, 2014. Faculty of Informatics University of Lugano. 2005 2007 Antonio Carzaniga



Similar documents
How To Understand The Internet From A Telephone To A Computer (For A Computer)

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Objectives of Lecture. Network Architecture. Protocols. Contents

The Domain Name System

Introduction to Computer Networks

LESSON Networking Fundamentals. Understand TCP/IP

Chapter 11. User Datagram Protocol (UDP)

Network Layers. CSC358 - Introduction to Computer Networks

The OSI and TCP/IP Models. Lesson 2

EXPLORER. TFT Filter CONFIGURATION

Lecture 28: Internet Protocols

Network Address Translation (NAT)

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Transport and Network Layer

Protocols. Packets. What's in an IP packet

The TCP/IP Reference Model

Figure 41-1 IP Filter Rules

First Midterm for ECE374 03/09/12 Solution!!

CS335 Sample Questions for Exam #2

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Flow Analysis Versus Packet Analysis. What Should You Choose?

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Privacy Options

How To Understand The Internet Of S (Netware)

Web Browsing Examples. How Web Browsing and HTTP Works

8.2 The Internet Protocol

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Computer Networks & Security 2014/2015

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

How do I get to

Firewalls P+S Linux Router & Firewall 2013

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Communications Software. CSE 123b. CSE 123b. Spring Lecture 13: Load Balancing/Content Distribution. Networks (plus some other applications)

Unix System Administration

Effiziente Filter gegen Kinderpornos und andere Internetinhalte. Lukas Grunwald DN-Systems GmbH CeBIT Heise Forum 2010 Hannover

COMP416 Lab (1) Wireshark I. 23 September 2013

Overview of TCP/IP. TCP/IP and Internet

Introduction to Analyzer and the ARP protocol

Network Configuration Settings

Address Resolution Protocol (ARP)

Architecture and Performance of the Internet

Chapter 15. Firewalls, IDS and IPS

Networking Basics and Network Security

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Understanding Layer 2, 3, and 4 Protocols

Overview of Computer Networks

Transport Layer Protocols

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user

Network Programming TDC 561

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

TCP/IP Basis. OSI Model

Lab 1: Packet Sniffing and Wireshark

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Firewall Examples. Using a firewall to control traffic in networks

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Linux MDS Firewall Supplement

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Use Domain Name System and IP Version 6

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Mathatma Gandhi University

1 Introduction to mobile telecommunications

Building Applications With Sockets

Chapter 4 Restricting Access From Your Network

Computer Networks/DV2 Lab

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

Firewalls, IDS and IPS

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

What communication protocols are used to discover Tesira servers on a network?

Communication Security for Applications

Chapter 3 Restricting Access From Your Network

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Computer Networks. Chapter 5 Transport Protocols

IP address format: Dotted decimal notation:

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, Socket Programming

The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Data Communication & Networks G

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Improved Digital Media Delivery with Telestream HyperLaunch

allow all such packets? While outgoing communications request information from a

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Managed VPSv3 Firewall Supplement

Chakchai So-In, Ph.D.

Cork Institute of Technology Master of Science in Computing in Education National Framework of Qualifications Level 9

Basic Network Configuration

IP addressing and forwarding Network layer

Multi-Homing Dual WAN Firewall Router

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Proxy Server, Network Address Translator, Firewall. Proxy Server

Stateful Firewalls. Hank and Foo

Application Note. Onsight Connect Network Requirements V6.1

Transcription:

The Transport Layer Antonio Carzaniga Faculty of Informatics University of Lugano October 24, 2014

Outline Basic concepts in transport-layer protocols Multiplexing/demultiplexing UDP message format Reliable transfer

Transport Layer Internet

Transport Layer Internet Web browser Web server

Transport Layer Internet Web browser Web server

Transport Layer Internet Web browser GET / HTTP/1.1 Web server

Transport Layer Internet Web browser GET / HTTP/1.1 Web server Primitive communication between applications

Type of Service 2005 2007 Antonio Carzaniga

Type of Service HTTP

Type of Service HTTP SMTP

Type of Service HTTP SMTP DNS

Type of Service HTTP SMTP DNS connection

Type of Service HTTP SMTP DNS connection

Type of Service HTTP SMTP DNS connection GET / HTTP/1.1...

Type of Service HTTP SMTP DNS connection GET / HTTP/1.1... HTTP/1.1 200...

Type of Service HTTP SMTP DNS connection GET / HTTP/1.1... HTTP/1.1 200... GET...

Type of Service HTTP SMTP DNS connection GET / HTTP/1.1... HTTP/1.1 200... GET... HTTP/1.1 200...

Type of Service HTTP SMTP DNS connection GET / HTTP/1.1... HTTP/1.1 200... GET... HTTP/1.1 200...

Type of Service HTTP SMTP DNS connection GET / HTTP/1.1... HTTP/1.1 200... GET... HTTP/1.1 200... 250 Yo... HELO.. MAIL FROM:... RCPT TO:... QUIT 221 Bye

Type of Service HTTP SMTP DNS connection connection GET / HTTP/1.1... HTTP/1.1 200... GET... HTTP/1.1 200... 250 Yo... HELO.. MAIL FROM:... RCPT TO:... QUIT 221 Bye

Type of Service HTTP SMTP DNS connection connection messages root GET / HTTP/1.1... 250 Yo... HTTP/1.1 200... GET... HTTP/1.1 200... HELO.. MAIL FROM:... RCPT TO:... QUIT DNS app..ch unisi.ch 221 Bye

Type of Service HTTP SMTP DNS connection connection messages root GET / HTTP/1.1... 250 Yo... HTTP/1.1 200... GET... HTTP/1.1 200... HELO.. MAIL FROM:... RCPT TO:... QUIT DNS app..ch unisi.ch 221 Bye

Type of Service HTTP SMTP DNS connection connection messages root GET / HTTP/1.1... 250 Yo... HTTP/1.1 200... GET... HTTP/1.1 200... HELO.. MAIL FROM:... RCPT TO:... QUIT DNS app..ch unisi.ch 221 Bye

Type of Service HTTP SMTP DNS connection connection messages root GET / HTTP/1.1... 250 Yo... HTTP/1.1 200... GET... HTTP/1.1 200... HELO.. MAIL FROM:... RCPT TO:... QUIT DNS app..ch unisi.ch 221 Bye

Type of Service HTTP SMTP DNS connection connection messages root GET / HTTP/1.1... 250 Yo... HTTP/1.1 200... GET... HTTP/1.1 200... HELO.. MAIL FROM:... RCPT TO:... QUIT DNS app..ch unisi.ch 221 Bye

Type of Service HTTP SMTP DNS connection connection messages root GET / HTTP/1.1... 250 Yo... HTTP/1.1 200... GET... HTTP/1.1 200... HELO.. MAIL FROM:... RCPT TO:... QUIT DNS app..ch unisi.ch 221 Bye

Type of Service HTTP SMTP DNS connection connection messages root GET / HTTP/1.1... 250 Yo... HTTP/1.1 200... GET... HTTP/1.1 200... HELO.. MAIL FROM:... RCPT TO:... QUIT DNS app..ch unisi.ch 221 Bye

Type of Service HTTP SMTP DNS connection connection messages root GET / HTTP/1.1... 250 Yo... HTTP/1.1 200... GET... HTTP/1.1 200... HELO.. MAIL FROM:... RCPT TO:... QUIT DNS app..ch unisi.ch 221 Bye

Transport Layer in the Internet 2005 2007 Antonio Carzaniga

Transport Layer in the Internet Transport Control Protocol (TCP) conntection-oriented (i.e., connections )

Transport Layer in the Internet Transport Control Protocol (TCP) conntection-oriented (i.e., connections ) User Datagram Protocol (UDP) connectionless (i.e., messages )

Transport Layer in the Internet Transport Control Protocol (TCP) conntection-oriented (i.e., connections ) User Datagram Protocol (UDP) connectionless (i.e., messages ) Terminology transport-layer packets are called segments

Transport Layer in the Internet Transport Control Protocol (TCP) conntection-oriented (i.e., connections ) User Datagram Protocol (UDP) connectionless (i.e., messages ) Terminology transport-layer packets are called segments Basic assumptions on the underlying network layer

Transport Layer in the Internet Transport Control Protocol (TCP) conntection-oriented (i.e., connections ) User Datagram Protocol (UDP) connectionless (i.e., messages ) Terminology transport-layer packets are called segments Basic assumptions on the underlying network layer every host has one unique IP address

Transport Layer in the Internet Transport Control Protocol (TCP) conntection-oriented (i.e., connections ) User Datagram Protocol (UDP) connectionless (i.e., messages ) Terminology transport-layer packets are called segments Basic assumptions on the underlying network layer every host has one unique IP address best-effort delivery service no guarantees on the integrity of segments no guarantees on the order in which segments are delivered

Transport-Layer Value-Added Service 2005 2007 Antonio Carzaniga

Transport-Layer Value-Added Service Transport-layer multiplexing/demultiplexing i.e., connecting applications as opposed to hosts

Transport-Layer Value-Added Service Transport-layer multiplexing/demultiplexing i.e., connecting applications as opposed to hosts Reliable data transfer i.e., integrity and possibly ordered delivery

Transport-Layer Value-Added Service Transport-layer multiplexing/demultiplexing i.e., connecting applications as opposed to hosts Reliable data transfer i.e., integrity and possibly ordered delivery Connections i.e., streams can be seen as the same as ordered delivery

Transport-Layer Value-Added Service Transport-layer multiplexing/demultiplexing i.e., connecting applications as opposed to hosts Reliable data transfer i.e., integrity and possibly ordered delivery Connections i.e., streams can be seen as the same as ordered delivery Congestion control i.e., end-to-end traffic (admission) control so as to avoid destructive congestions within the network

Multiplexing/Demultiplexing Internet

Multiplexing/Demultiplexing Internet Web browser GET / HTTP/1.1 Web server

Multiplexing/Demultiplexing Internet Web browser e-mail client GET / HELO... HTTP/1.1 Web e-mail server server

Multiplexing/Demultiplexing GET Web browser Web browser e-mail client GET / HELO... Internet /index.html HTTP/1.1 HTTP/1.1 Web e-mail server server

Multiplexing/Demultiplexing GET Web browser Web browser e-mail client GET / HELO... Internet /index.html HTTP/1.1 HTTP/1.1 Web e-mail server server How do we distinguish all these connections?

Ports 2005 2007 Antonio Carzaniga

Ports Each application running on a host is identified (within that host) by a unique port number port numbers are simply cross-platform process identifiers

Ports Each application running on a host is identified (within that host) by a unique port number port numbers are simply cross-platform process identifiers How do we identify a connection?

Ports Each application running on a host is identified (within that host) by a unique port number port numbers are simply cross-platform process identifiers How do we identify a connection? two pairs of host and application identifiers i.e., two pairs (IP-address, port)

Ports Each application running on a host is identified (within that host) by a unique port number port numbers are simply cross-platform process identifiers How do we identify a connection? two pairs of host and application identifiers i.e., two pairs (IP-address, port) How do we find out which application (host and port number) to connect to?

Ports Each application running on a host is identified (within that host) by a unique port number port numbers are simply cross-platform process identifiers How do we identify a connection? two pairs of host and application identifiers i.e., two pairs (IP-address, port) How do we find out which application (host and port number) to connect to? outside the scope of the definition of the transport layer but of course we can have well-known service numbers

Ports 2005 2007 Antonio Carzaniga

Ports The message format of both UDP and TCP starts with the source and destination port numbers 0 1516 31 source port destination port

Ports The message format of both UDP and TCP starts with the source and destination port numbers 0 1516 31 source port destination port E.g., src port 1234 dst port 80 A B

Ports The message format of both UDP and TCP starts with the source and destination port numbers 0 1516 31 source port destination port E.g., src port 1234 dst port 80 A B src port dst port

Ports The message format of both UDP and TCP starts with the source and destination port numbers 0 1516 31 source port destination port E.g., src port 1234 dst port 80 A B 80 src port 1234 dst port

UDP Packet Format 2005 2007 Antonio Carzaniga

UDP Packet Format The UDP message format is very simple 0 1516 31 source port length destination port checksum application data (message)

UDP Features 2005 2007 Antonio Carzaniga

UDP Features UDP provides only the two most basic functionalities of a transport protocol

UDP Features UDP provides only the two most basic functionalities of a transport protocol application identification (multiplexing/demultiplexing)

UDP Features UDP provides only the two most basic functionalities of a transport protocol application identification (multiplexing/demultiplexing) integrity check by means of a CRC-type checksum

UDP Features UDP provides only the two most basic functionalities of a transport protocol application identification (multiplexing/demultiplexing) integrity check by means of a CRC-type checksum What if there is no application at the other end?

UDP Features UDP provides only the two most basic functionalities of a transport protocol application identification (multiplexing/demultiplexing) integrity check by means of a CRC-type checksum What if there is no application at the other end? How is the checksum computed? which parts of the segment does it cover?

UDP Features UDP provides only the two most basic functionalities of a transport protocol application identification (multiplexing/demultiplexing) integrity check by means of a CRC-type checksum What if there is no application at the other end? How is the checksum computed? which parts of the segment does it cover? What should happen when the checksum doesn t check?