COMP2322 Lab 6 TCP Steven Lee April 1, 2016. TCP Transmission Control Protocol Transport layer protocol User Datagram Protocol (UDP) is another one 2.

Slides:



Advertisements
Similar presentations
Transportation Layer (2). TCP full duplex data: – bi-directional data flow in same connection – MSS: maximum segment size connection-oriented: – handshaking.
Advertisements

CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
Lecture 7 Transport Layer
1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note on the use.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
Instructor: Sam Nanavaty TCP/IP protocol. Instructor: Sam Nanavaty Version – Allows for the evolution of the protocol IHL (Internet header length) – Length.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 7: Objectives Part 1
Computer Networks 2 Lecture 2 TCP – I - Transport Protocols: TCP Segments, Flow control and Connection Setup.
TRANSPORT LAYER  Session multiplexing  Segmentation  Flow control (TCP)  Connection-oriented (TCP)  Reliability (TCP)
EEC-484/584 Computer Networks Lecture 15 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
CSCE 515: Computer Network Programming TCP Details Wenyuan Xu Department of Computer Science and Engineering.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Transport Layer TCP and UDP IS250 Spring 2010
Chapter 4 OSI Transport Layer
Gursharan Singh Tatla Transport Layer 16-May
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Transmission Control Protocol Internet Protocol TCP/IP.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
The Saigon CTT Semester 1 CHAPTER 12 – 13 – 14 Le Chi Trung.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
TCP: A Closer Look Transmission Control Protocol.
TCP Transport Control Protocol Information management 2 Groep T Leuven – Information department 2/35 Introduction UDP provides the connection.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
Transport Layer: UDP, TCP
Transmission Control Protocol
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Networking Basics CCNA 1 Chapter 11.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 9.
© Jörg Liebeherr (modified by Malathi Veeraraghavan) 1 Overview Formats, Data Transfer, etc. Connection Management.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
1 14-Jun-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Two Transport Protocols Available Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Provides unreliable transfer Requires minimal – Overhead.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
COMP2322 Lab 6 TCP Steven Lee Mar 29, 2017.
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Chapter 17 and 18: TCP is connection oriented
Transport Layer.
Process-to-Process Delivery, TCP and UDP protocols
TCP.
Process-to-Process Delivery
TCP.
© 2003, Cisco Systems, Inc. All rights reserved.
TCP.
TCP - Part I Karim El Defrawy
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Figure 3-23: Transmission Control Protocol (TCP) (Study Figure)
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Transport Layer 9/22/2019.
Presentation transcript:

COMP2322 Lab 6 TCP Steven Lee April 1, 2016

TCP Transmission Control Protocol Transport layer protocol User Datagram Protocol (UDP) is another one 2

TCP segment structure Bit Source portDestination port 32 Sequence number 64 Acknowledgement number 96 ACKACK SYNSYN FINFIN Window size 128 Checksum Options (variable length) Application data (variable length) 3

TCP Point-to-point One sender, one receiver 4

TCP segment structure 5 Bit Source portDestination port 32 Sequence number 64 Acknowledgement number 96 ACKACK SYNSYN FINFIN Window size 128 Checksum Options (variable length) Application data (variable length)

TCP Reliable All bytes sent are guaranteed to be received identically, and in the correct order 6

TCP segment structure 7 Bit Source portDestination port 32 Sequence number 64 Acknowledgement number 96 ACKACK SYNSYN FINFIN Window size 128 Checksum Options (variable length) Application data (variable length) Sequence number The accumulated sequence number of the first data byte of this segment for the current session Acknowledgement number The next sequence number the receiver expects The receiver acknowledges receipt of all prior bytes

Connection establishment 8 Three-way handshake Host A [SYN, ACK] Seq=B, Ack=A+1 [SYN] Seq=A [ACK] Seq=A+1, Ack=B+1 Host B

Data transfer 9 Host Seq=1, Ack=38, Len=0 Seq=1, Ack=1, Len=37 Server Seq=38, Ack=1, Len=12 Seq=1, Ack=50, Len=0

Connection termination 10 Four-way handshake Host A [ACK] [FIN] [ACK] Host B [FIN]

Practice 1 1.Visit 2.Click “the first digits of Pi” and download the text file 3.Start capturing packets 4.Click “Upload” and upload the downloaded text file 5.Stop capturing packets after receiving a response from the server 11

Practice 1 There may be packets that say [ETHERNET FRAME CHECK SEQUENCE INCORRECT]. To disable Ethernet checksum validation: Right-click on any Ethernet layer → Protocol Preferences → Uncheck Validate the Ethernet checksum if possible To reveal information of packets that say [TCP segment of a reassembled PDU]: Right-click on any TCP layer → Protocol Preferences → Uncheck Allow subdissector to reassemble TCP streams To reveal the application data contained in the TCP segments: Analyze → Enabled Protocols → Uncheck HTTP → OK 12

Practice 1 Question 1 (4 marks) a)What is the TCP port number used by your computer to transfer the file? b)What is the TCP port number used by the server to receive the file? Question 2 (4 marks) a)What is the sequence number of the TCP SYN segment that establishes the TCP connection between your computer and the server? b)What indicates that the segment is a SYN segment? 13

Practice 1 Question 3 (6 marks) a)What is the sequence number of the SYN/ACK segment that the server responds the SYN with? b)How about its acknowledgement number? How does the server determine this value? c)What indicates that the segment is a SYN/ACK segment? Question 4 (4 marks) a)What are the sequence numbers of the data- containing segments in the TCP connection related to the file transfer? b)What is the length of each of them? 14

Practice 1 One way to view the round-trip time (RTT) of the TCP segments: Right-click on any column’s header → Column Preferences → Click the add button → Enter tcp.analysis.ack_rtt into Field Name → OK Question 5 (2 marks) What is the RTT of each of the data-containing segments? 15

Practice 2 Download and open a modified packet capture from cking.pcap cking.pcap 16

Practice 2 The packet capture shows a partial interaction between a client and a TCP server. After a normal TCP three-way handshake, the client begins data transfer to the server. Instead of sending a pure TCP ACK to the client, the server sends the acknowledgement along with the data (the acknowledgement is piggy-backed on the data). This is known as piggybacking. Question 6 (6 marks) a)What is the payload size of the TCP data packet sent from the server? b)What is the TCP/IP overhead? c)Assume the sizes of the TCP and IP headers remain unchanged. How much more TCP/IP data would the server need to transmit if piggybacking is not used? 17

Practice 3 Download and open a modified packet capture from ap ap 18

Practice 3 The packet capture shows that the Great Firewall (GFW) injects a series of forged TCP Reset (RST) packets upon seeing a request with blacklisted keywords, i.e. “ falun ” Question 7 (6 marks) a)How many TCP RST packets are injected by the GFW? b)What is the difference of the sequence numbers between each subsequent TCP RST packet? What is special about this number in TCP? c)Why does the GFW inject TCP RST packets with these specific sequence numbers? 19