Assignment 6: Internetworking Due October 17/18, 2012



Similar documents
Cisco Configuring Commonly Used IP ACLs

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Transport and Network Layer

Technical Support Information Belkin internal use only

RARP: Reverse Address Resolution Protocol

Chapter 4 Network Layer

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Network Security TCP/IP Refresher

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Introduction to LAN/WAN. Network Layer (part II)

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Internet Protocol: IP packet headers. vendredi 18 octobre 13

LESSON Networking Fundamentals. Understand TCP/IP

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010

Internetworking. Problem: There is more than one network (heterogeneity & scale)

TCP/IP Network Essentials. Linux System Administration and IP Services

The Internet. Internet Technologies and Applications

Lecture Computer Networks

8.2 The Internet Protocol

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

IP Addressing A Simplified Tutorial

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

IP addressing and forwarding Network layer

10CS64: COMPUTER NETWORKS - II

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Introduction to Network Security Lab 1 - Wireshark

Broadband Phone Gateway BPG510 Technical Users Guide

Internet Protocol Address

Application Protocols for TCP/IP Administration

Lab Organizing CCENT Objectives by OSI Layer

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Multi-Homing Security Gateway

CHAPTER 0 INTRODUCTION TO TCP/IP

Chapter 6 Using Network Monitoring Tools

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

Introduction to TCP/IP

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Networking Basics for Automation Engineers

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Networking Test 4 Study Guide

Internet Control Protocols Reading: Chapter 3

IP - The Internet Protocol

Communications and Networking

IP Addressing Introductory material.

CCT vs. CCENT Skill Set Comparison

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Introduction To Computer Networking

Overview of TCP/IP. TCP/IP and Internet

Network Programming TDC 561

You will work in groups of two on the labs. It is OK to talk to others and help each other in the lab.

UIP1868P User Interface Guide

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

TCP/IP Security Problems. History that still teaches

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

HOST AUTO CONFIGURATION (BOOTP, DHCP)

Savvius Insight Initial Configuration

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Chapter 6 Using Network Monitoring Tools

EECS 489 Winter 2010 Midterm Exam

Table of Contents. Cisco How Does Load Balancing Work?

>>> SOLUTIONS <<< c) The OSI Reference Model has two additional layers. Where are these layers in the stack and what services do they provide?

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

EXPLORER. TFT Filter CONFIGURATION

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Objectives of Lecture. Network Architecture. Protocols. Contents

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

Introduction to Analyzer and the ARP protocol

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewall Implementation

CS335 Sample Questions for Exam #2

How do I get to

ECE 578 Term Paper Network Security through IP packet Filtering

Basic Network Configuration

Networking Technology Online Course Outline

IP address format: Dotted decimal notation:

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

Introduction to IP v6

Inter-domain Routing. Outline. Border Gateway Protocol

EE984 Laboratory Experiment 2: Protocol Analysis

Route Discovery Protocols

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Address Resolution Protocol (ARP)

Transcription:

Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet Protocol Suite, the collection of protocol standards that make the Internet possible. These include protocols you have probably heard of including HTTP, FTP, TELNET, and TCP, all of which depend on IP to provide the basic service of data delivery. In addition, there are a number of protocols in the Internet Protocol Suite that are critical to the functioning of IP itself. These include ARP, RARP, ICMP, OSPF and BGP. While our focus this week is on IP, to fully understand IP, we will also need to consider the role of these support protocols. The main reading for IP will be the appropriate sections of the text. Please read 3.2 and 4.1. To give you a bit more background on the design of IP, please read: Clark, David, The Design Philosophy of the DARPA Internet Protocols, SIGCOMM 88, pp. 106-114. It does a nice job of discussing some of the design choices that led to the final TCP/IP standards. As I think I mentioned in all of our meetings this week, I would like to take a closer look at BGP in our meetings two weeks from now. With that in mind, I have found three papers I would like you to look at a bit this week. BGP is a protocol that leaves quite a bit unspecified. It dictates how border routers should exchange routing information (as complete paths rather than as link state packets or distance vectors), but it leaves each AS lots of freedom to choose which routes it will use and which routes it will advertise to other ASes. The paper: Caesar, Matthew, and Rexford Jennifer, BGP routing policies in ISP networks, IEEE Network, pp. 5-11, Vol. 19:6, 2005. seems to provide some concrete details about how these decisions are made in practice. Please read this paper for this week. The other two papers I found are candidates for our meetings two weeks from now. For now, I just ask that you skim them enough that you can express a preference this week for which paper might be most interesting to discuss in the future. Exercises Sharon Goldberg, Shai Halevi, Aaron D. Jaggard, Vijay Ramachandran, and Rebecca N. Wright. 2008. Rationality and traffic attraction: Incentives for honest path announcements in BGP, In Proceedings of the ACM SIGCOMM 2008 conference on Data communication (SIGCOMM 08). ACM, New York, NY, USA, 267-278. John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, Thomas Anderson, and Arun Venkataramani. 2008. Consensus routing: The internet as a distributed system, in Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08), pp. 351-364. 1. When an IP packet is sent across an Ethernet, the entire IP packet is placed in the data field of an Ethernet packet. The Ethernet packet has 6 byte destination and source address fields. 1

In addition, the IP packet stored within the data field has two 4 byte fields for the source and destination IP addresses. Suppose, you spent some time eavesdropping on the packets flowing across some Ethernet attached to the Internet. After a while, you notice that in most packets the IP destination address and the Ethernet destination address refer to the same host. For one host, however, you see a significant number of packets containing the host s Ethernet address as their Ethernet destinations but containing IP destination addresses that don t match the host s IP address. Is something wrong? Explain. 2. Suppose some neophyte network programmer constructs a network application using IP to transmit data. Knowing that the application will primarily be used to communicate between hosts connected by an Ethernet, and that the maximum packet size on an Ethernet is 1500 bytes, the programmer decides to send 1500 bytes of data in each IP packet created. If the program is used to transfer 1,500,000 bytes of data between two computers on such an Ethernet, how many Ethernet packets will actually be sent? What number of data bytes/packet would minimize the number of Ethernet packets sent? How many packets would be sent in this case? (Assume no retransmissions, collisions, etc. Just count the number of packets IP will try to send.) 3. Complete question 3.72. 4. Friday afternoon I went into TCL 312 and with Donny watching from across the room I logged into the imac, made a few changes to the machine s standard configuration and then typed a command. The command and its output are shown below: -> netstat -nr -f inet Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire default 137.165.8.1 UGSc 7 0 en0 default 137.165.248.2 UGScI 1 0 en1 127 127.0.0.1 UCS 0 0 lo0 127.0.0.1 127.0.0.1 UH 1 68 lo0 137.165.8/22 link#4 UCS 11 0 en0 137.165.8.3 0:21:9b:a2:da:ae UHLWIi 5 37 en0 1194 137.165.8.5 3c:7:54:7f:1:4 UHLWIi 8 385 en0 1194 137.165.8.77 c8:2a:14:43:22:45 UHLWIi 1 1 en0 1196 137.165.8.122 127.0.0.1 UHS 0 0 lo0 137.165.10.23 0:14:6c:75:fd:ab UHLWIi 0 6 en0 1194 137.165.11.255 ff:ff:ff:ff:ff:ff UHLWbI 0 6 en0 137.165.248/22 link#5 UCS 1 0 en1 137.165.250.116 127.0.0.1 UHS 0 0 lo0 137.165.251.255 ff:ff:ff:ff:ff:ff UHLWbI 0 5 en1 169.254 link#4 UCS 1 0 en0 169.254.255.255 0:5:5e:da:5e:a1 UHLSW 0 0 en0 Explain as much of the output that results as you can. This may require some extra reading. At the least, you will probably want to type man netstat 2

on a Mac or FreeBSD system and read the manual page for the netstat command. In addition, there are many other sources of Unix documentation online that you may want to consult. It may help you to try the same command in a terminal window on one of our Macs. 5. Every protocol s packet format represents a compromise between flexibility and overhead. If two many bits are allocated for fields such as addresses and error checks in a protocol s packet header, then the efficiency with which data can be delivered will be reduced. If too few bits are made available, the flexibility of the protocol will be limited in some way. For example, as the discussion of IPv6 in chapter 4 suggests, the decision to allocate only 32 bits for addresses in IP headers is now limiting the ability of the Internet to grow. The complete layout of the standard (i.e. non-optional) components of an IP packet header is shown in Figure 4.3 of Peterson and Davie. Obviously, there are many fields in addition to the address fields and each of these fields has been allocated a fixed number of bits. Each of these allocations may limit the flexibility of the protocol in some way. I would like you to consider whether the sizes of each the following fields limit the flexibility of IP: HLen Length Ident Offset TTL Checksum Be precise. Specify which features of the current protocol would be affected. Discuss whether the limitation would become a factor as a result of growth in the size of the network, increases in supported transmission rates, introduction of new underlying network hardware (such as wireless), or other factors. If possible, be quantitative. 6. Many networking problems would be trivial if you could assume you already had a way for independent computers to communicate, but become difficult when you realize you need to solve them before you can communicate effectively. For example, writing an algorithm to find shortest paths is not difficult. To run such an algorithm, however, you must collect information about the state of distant parts of the network. This requires communication, which is difficult to perform until you are able to run your routing algorithm. Internet routing protocols are based on routing algorithms we have already discussed. In particular, RIP is based on the Bellman-Ford distance vector algorithm and OSPF is based on Dijkstra s shortest path first algorithm. To exchange routing updates, the routers running these Internet protocols depend on TCP and UDP, which depends on IP to deliver packets, which depends on these algorithms to build its routing tables! I d like you to explain how Internet routing protocols can get away with this apparently circular dependence of IP routing on IP routing. To keep things concise, limit your attention to RIP (which uses Bellman-Ford) and explain precisely which features of the IP routing mechanism and the Bellman-Ford Algorithm make it possible for RIP to depend on UDP to deliver routing update messages (i.e. distance vectors). 3

7. Before Purple Air, the wireless network at Williams had a particularly annoying security system. In order to use the wireless network, you had to enter an ID and password through a web browser every time your laptop restarted or was woken from sleep. If you tried to use any network application other than a web browser before you did this, the network would appear to be dead. If you opened a web browser and tried to visit any website, what would actually show up in your browser window was the campus network login page. Once you entered your login information correctly on this page, everything would start to work correctly. 1 I would like you to use what you now know about IP, DHCP, ARP, OSPF, BGP, etc. to explain how such a security system could be implemented. Although this question was inspired by the Williams network, you should base your answers strictly on the characteristics of the network described within the problem statement rather than on any knowledge of the techniques actually used on the Williams network now or in the past. In particular: Assume that the network in question is a single hardware network based on one of the common IEEE 802 standards. That is, it might be an Ethernet or an 802.11 wireless network. You should not assume anything peculiar to just one of these standards, but you can rely on their common features (i.e. you can assume that they all use similar hardware addresses, they all support broadcast messages, none of them guarantee reliable delivery, they all impose a maximum packet size, etc.). Assume that no components of the hardware network will be modified to provide security. Assume that no component of or software on the client machines using the network will be modified. In particular, users will not be required to modify the software on their systems or install any specialized software on their computers. At the same time, assume that users will not modify any of the standard network device drivers, TCP/IP code, or network applications on their machines to circumvent the security mechanisms. That is, assume all of the networking hardware and software used by the client machines is standard. Assume the client machines are configured for automatic network configuration using DCHP. Assume that the goal of the security mechanism is total isolation until authentication. That is, a client machine should not be able to exchange IP packets with any machines other than the machine installed to implement the security scheme until its user has sent a user id and password to that machine. Note that the word machine in the preceding sentence is singular. That is, you should also assume that only one of the servers on the network will run modified code to implement this scheme. We will refer to this machine as the security appliance. The security appliance may run several services (Hint: one of them will be DHCP), but other servers (e.g., the campus mail server) should be able to run without any modification. A complete answer to this question might seem to involve more information about TCP or the domain name lookup service than we have covered at this point. In fact, as far as TCP is concerned all you need to know about TCP is that web browsers, mail programs, chat clients and just about all other network applications send packets through TCP but 1 You have probably encountered other wireless networks that work in a similar manner. One key feature is that you do not have to enter a wireless password to authenticate to the wireless network infrastructure itself. That is, you get some wireless service without entering any password. The other feature is that no matter what you try, the only way to actually get useful network access is to attempt to access any web page and respond by providing the data requested in some form of login web page that appears on your machine instead of the page you actually requested. 4

that they eventually end up in IP packets. The domain name service provides a way for a machine to translate a symbolic name like cs.williams.edu into an IP address like 137.165.8.2. You should just assume that this process happens by magic for this question. Finally, you may assume any modifications you like to the implementations of the members of the TCP/IP protocol suite on the security appliance. 5