Slides from TCP/IP - Forouzan. Chapter 12 TCP

Similar documents
Transport Layer Protocols

Chapter 5. Transport layer protocols

Chapter 11. User Datagram Protocol (UDP)

Transport Layer. Chapter 3.4. Think about

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

[Prof. Rupesh G Vaishnav] Page 1

Computer Networks. Chapter 5 Transport Protocols

Ethernet. Ethernet. Network Devices

Computer Networks UDP and TCP

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Transport and Network Layer

IP address format: Dotted decimal notation:

Internet Protocols. Background CHAPTER

La couche transport dans l'internet (la suite TCP/IP)

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user

TCP Performance Management for Dummies

8-bit Microcontroller. Application Note. AVR460: Embedded Web Server. Introduction. System Description

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Understanding Layer 2, 3, and 4 Protocols

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

How do I get to

TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services

What is a DoS attack?

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

This sequence diagram was generated with EventStudio System Designer (

Networks: IP and TCP. Internet Protocol

IP - The Internet Protocol

Network Layer: Network Layer and IP Protocol

Kap. 2. Transport - Schicht

Overview of TCP/IP. TCP/IP and Internet

Effect of Packet-Size over Network Performance

Networking Test 4 Study Guide

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Network Security TCP/IP Refresher

TCP/IP and the Internet

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

TCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Higher Layer Protocols: UDP, TCP, ATM, MPLS

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

Outline. TCP connection setup/data transfer Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

TCP/IP Networking Terms you ll need to understand: Techniques you ll need to master:

How To Design A Layered Network In A Computer Network

Configuring Health Monitoring

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Introduction to IP networking

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

A Framework for Stateful Inspection

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

CSCE 465 Computer & Network Security

User Datagram Protocol - Wikipedia, the free encyclopedia

2.1 Introduction. 2.2 Voice over IP (VoIP)

Application Protocols for TCP/IP Administration

Introduction to Cisco IOS Flexible NetFlow

IP Subnetting and Addressing

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Host Fingerprinting and Firewalking With hping

Troubleshooting Tools

La couche transport dans l'internet (la suite TCP/IP)

Lecture Computer Networks

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.

LESSON Networking Fundamentals. Understand TCP/IP

Lecture 16: TCP/IP Vulnerabilities: IP Spoofing and Denial-of-Service Attacks. Lecture Notes on Computer and Network Security

Architecture and Performance of the Internet

Network Working Group Request for Comments: 840 April Official Protocols

Layer 7 Load Balancing and Content Customization

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Command Manual - Network Protocol Quidway S3000 Series Ethernet Switches. Table of Contents

Defending Computer Networks Lecture 6: TCP and Scanning. Stuart Staniford Adjunct Professor of Computer Science

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Solution of Exercise Sheet 5

Access Control: Firewalls (1)

Network Layers. CSC358 - Introduction to Computer Networks

Network Programming TDC 561

20. Switched Local Area Networks

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Computer Networks Practicum 2015

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Internet Control Protocols Reading: Chapter 3

Cisco Configuring Commonly Used IP ACLs

1 An application in BPC: a Web-Server

Transcription:

Chapter 12 Services Segments and Options Flow Control and Error Control rs Connections State Transition Diagram Congestion Control Operation and Design Figure Application layer Position of in /IP protocol suite... SMTP FTP TFTP DNS SNMP BOOTP Transport layer UDP Network layer IGMP ICMP IP ARP RARP Data link layer Physical layer Underlying LAN or WAN technology 12-2

Figure 12-2 versus IP Application program (Process) Application program (Process) Internet Domain of IP protocol Domain of protocol 12-3 Figure 12-3 Port numbers TELNET (Client) TELNET (Server) 64,295 23 12-4 12-2

Figure 12-4 segment format Header Data HLEN 4 bits Source port address 16 bits Reserved 6 bits u r g a c k Checksum 16 bits p s h Sequence number 32 bits Acknowledgment number 32 bits r s f s yn in t Destination port address 16 bits Window size 16 bits Urgent pointer 16 bits Options & padding 12-5 Figure 12-5 Control field URG: Urgent pointer is valid ACK: Acknowledgment is valid PSH: Request for push RST: Reset the connection SYN: Synchronize sequence numbers FIN: Terminate the connection URG ACK PSH RST SYN FIN 12-6 12-3

Figure 12-6 Options Single-byte End of option No operation Options Maximum segment size Multiple-byte Window scale factor stamp 12-7 Figure 12-7 End of option Code: 0 00000000 a. End of option ~ Options Data END-OP ~ b. Used for padding 12-8 12-4

Figure 12-8 No operation option Code: 1 00000001 a. No operation option NO-OP A 7-byte option NO-OP An 11-byte option b. Used to align beginning of an option An 8-byte option c. Used to align the next option 12-9 Figure 12-9 Maximum segment size option Code: 2 00000010 Length: 4 00000100 Maximum segment size 1 byte 1 byte 2 bytes 0 12-5

Figure 0 Window scale factor option Code: 3 00000011 Length: 3 00000011 Scale factor 1 byte 1 byte 1 byte 1 Figure 1 stamp option Code: 8 00001000 Length: 10 00001010 stamp value stamp echo reply 2 12-6

Figure 2 Header Pseudoheader All 0s Source port 32-bit source IP address 32-bit destination IP address 8-bit protocol (6) Sequence number Acknowledgment number Pseudoheader added to the segment 16-bit total length Destination port HLEN Reserved Control Window size Checksum Urgent pointer Data and Option (Padding must be added to make the data a multiple of 16-bits) 3 Figure 3 Sliding window Sliding window 1 2 3 4 5 6 7 8 9 1011121314 a. Before sliding Sliding window 1 2 3 4 5 6 7 8 9 1011121314 b. After sliding 4 12-7

Figure 4 Sliding window with pointer Sliding window 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Acknowledged bytes Bytes 4 to 7 have been sent Pointer Bytes 8 to 13 can be sent Bytes 14 to 16 cannot be sent 5 Figure 5 Sliding window Increasing the window size 1 2 3 4 5 6 7 8 9 1011121314 a. Window of size 7 Sliding window 1 2 3 4 5 6 7 8 9 1011121314 b. 3 bytes acknowledged, window size increased to 10 6 12-8

Figure 6 Decreasing the window size Sliding window 1 2 3 4 5 6 7 8 9 1011121314 a. Window of size 7 Sliding window 1 2 3 4 5 6 7 8 9 1011121314 b. 3 bytes acknowledged, window size decreased to 5 7 Figure 7 Sender Window management Receiver Segment 1 seq: 1001, 4000 bytes 4000 ack: 5001 win:0 ack: 5001 win:1000 Buffer 1000 3000 Buffer Segment 2 seq: 5001, 1000 bytes 8 12-9

Figure 8 Sender Receiver Corrupted segment Segment 1 seq: 1201, 200 bytes Segment 2 seq: 1401, 200 bytes OK OK Segment 3 seq: 1601, 200 bytes ack: 1601 Segment 3 corrupted -out Segment 3, retransmitted seq: 1601, 200 bytes ack: 1801 OK 9 Figure 9 Sender Receiver Lost segment Segment 1 seq: 1201, 200 bytes Segment 2 seq: 1401, 200 bytes Segment 3 seq: 1601, 200 bytes ack: 1601 OK OK Segment 3 lost -out Segment 3, retransmitted seq: 1601, 200 bytes ack: 1801 OK 12-20

Figure 12-20 Lost acknowledgment Sender Receiver seq: 1201, 200 bytes seq: 1401, 200 bytes seq: 1601, 200 bytes Acknowledgment lost ack: 1601 ack: 1801 OK OK OK 12-21 Figure 12-21 rs rs Retransmission Persistence Keepalive -waited 12-22

Figure 12-22 Three-Way Handshaking Sender Receiver Segment 1: SYN seq: 1200, ack: --- Segment 2: SYN + ACK seq: 4800, ack: 1201 Segment 3: ACK seq: 1201, ack: 4801 12-23 Figure 12-23 Four-way Handshaking Sender Receiver Segment 1: FTN seq: 2500, ack: --- Segment 2: ACK seq: 7000, ack: 2501 Segment 3: ACK seq: 7001, ack: 2501 Segment 4: ACK seq: 2501, ack: 7002 12-24

Figure 12-24 State Transition Diagram CLOSED Passive open / SYN / SYN + ACK LISTEN RST / Active open / SYN Close / -out/ RST / Send / SYN RST SYN-RCVD SYN / SYN + ACK SYN-SENT (Simultaneous open) Close or ACK / ESTABLISHED SYN + ACK / ACK time-out / Close / FIN Close / FIN FIN /ACK FIN WAIT-1 ACK / FIN WAIT-2 FIN / ACK FIN + ACK / ACK FIN / ACK CLOSING TIME- WAIT ACK / (-out) Close / FIN CLOSE WAIT LAST ACK ACK / 12-25 Figure 12-25 Window Size Increase Strategy Congestion window size 26 24 22 20 18 16 14 12 10 08 06 04 02 Threshold Transmission number 1 2 3 4 5 6 7 8 12-26

Figure 12-26 Encapsulation and Decapsulation Application program Application program Message from application program Message to application program header data header data IP header IP data IP header IP data Frame header Frame data Frame header Frame data a. Encapsulation b. Decapsulation 12-27 Figure 12-27 Queues in TELNET client TELNET server Port 51786 Port 23 12-28

Figure 12-28 Multiplexing and demultiplexing Application Programs Application Programs (Multiplexer) (Demultiplexer) IP IP 12-29 Figure 12-29 design Application layer Message from application T C P rs Input processing module Main module TCBs Output processing module segment segment IP layer 12-30

Figure 12-30 Transmission Control Blocks (TCBs) State Process Pointer Buffers.... 12-31