The IP, TCP, UDP protocols

Slides:



Advertisements
Similar presentations
TCP/IP Christopher Zacky. lolwut Decimal Numbers.
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
CCNA – Network Fundamentals
Transmission Control Protocol (TCP)
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Fundamentals of Computer Networks ECE 478/578 Lecture #20: Transmission Control Protocol Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
Introduction1-1 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Configuring a Router with RIP Basic Configuration and Show Commands.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
Instructor: Sam Nanavaty TCP/IP protocol. Instructor: Sam Nanavaty Version – Allows for the evolution of the protocol IHL (Internet header length) – Length.
Transmission Control Protocol (TCP) Basics
5/6/2015© 2010 Raymond P. Jefferis IIILect Transport Layer.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 7 – Transport Layer Protocols
TELE202 Lecture 14 TCP/UDP (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »TCP/UDP (1) »Source: chapter 17 ¥This Lecture »TCP/UDP (2) »Source: chapter.
1 Transport Control Protocol. 2 Header Identifies the port number of a source application program. Used by the receiver to reply. (16-bit). Identifies.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Gursharan Singh Tatla Transport Layer 16-May
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 26.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
1 15. Transport Protocols. Prof. Sang-Jo Yoo 2 Contents  Transport protocol  Transport Service  Protocol for reliable network service  Protocol for.
Breno de MedeirosFlorida State University Fall 2005 The IP, TCP, UDP protocols A quick refresher.
1 CSE 5346 Spring Network Simulator Project.
© Jörg Liebeherr (modified by Malathi Veeraraghavan) 1 Overview Formats, Data Transfer, etc. Connection Management.
Hour 6 The Transport Layer 1. What You'll Learn in This Hour Connections oriented and connectionless protocols Ports and sockets TCP UDP 2.
© 2002, Cisco Systems, Inc. All rights reserved..
Transport Layer1 TCP Connection Management Recall: TCP sender, receiver establish “connection” before exchanging data segments r initialize TCP variables:
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
09-Transport Layer: TCP Transport Layer.
Introduction to TCP/IP networking
COMP2322 Lab 6 TCP Steven Lee Mar 29, 2017.
5. End-to-end protocols (part 1)
TCP/IP Internetworking
Process-to-Process Delivery
TCP.
© 2003, Cisco Systems, Inc. All rights reserved.
PART 5 Transport Layer Computer Networks.
TCP/IP Internetworking
TCP Transport layer Er. Vikram Dhiman LPU.
TCP - Part I Karim El Defrawy
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
CSC Advanced Unix Programming, Fall 2015
PART 5 Transport Layer.
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Introduction to Computer Networks
Transport Protocols: TCP Segments, Flow control and Connection Setup
ITIS 6167/8167: Network and Information Security
Transport Layer 9/22/2019.
TCP Connection Management
Attacks on TCP.
Presentation transcript:

The IP, TCP, UDP protocols A quick refresher Breno de Medeiros Florida State University Fall 2005

Florida State University IP protocol Defines a uniform mechanism to access resources between internets Enables networking across networks that are not connected at level 2 (data-link). Defines IP addresses and how to route network packets to a destination address. IP v.4, addresses: 4 octets, organized hierarchically Single host: 128.220.23.4 or 192.168.33.1 Class C network: 128.220.23.x, also written 128.220.23.0/24 Class B network: 192.168.x.x., also written 192.168.0.0/16 Class A network: 10.x.x.x, or 10.0.0.0/8 Breno de Medeiros Florida State University Fall 2005

Florida State University IP v.6 16 octet addresses, also hierarchical Represented by eight 4-digit hexadecimal values (one string of 0’s can be omitted) Single host: 1080:0:0:0:0:800:0:417A or 1080::800:0:417A Internet routing is performed only on the 64 left bits (the remaining is for internal routing to hosts) Blocks of addresses denoted using the / notation. 12AB::CD30:0:0:0:0/60 indicates a 68-bit wide space, from 12AB:0:0:CD30:0:0:0:0 to 12AB:0:0:CD3F:FFFF:FFFF:FFFF:FFFF (all addresses starting with prefix 12AB:0:0:CD3) Breno de Medeiros Florida State University Fall 2005

Florida State University IP packet Checksum is quite trivial, just the one’s complement sum of all 16-bit words in the header Because different networks may have different maximum datagram lengths, IP packets may sometimes have to be fragmented to cross a network boundary. This has security implications. Breno de Medeiros Florida State University Fall 2005

Florida State University TCP/UDP Layer 4 (transport layer) protocols, run over IP TCP and UDP packets are encapsulated into IP packets Use their own control information, stored in packet headers Port numbers (indicate consuming program in the destination host) TCP is connection-oriented, and provides for reliable, order-preserving transmission of data UDP is not connection-oriented, does not guarantee data arrival, or proper ordering of arriving data Breno de Medeiros Florida State University Fall 2005

Florida State University TCP header flags: URG (urgent), ACK (acknowledg-ment), PSH (push function), RST (close the connection), SYN (synchronize sequence numbers), FIN (end of data from sender) d.o = Data offset: Number of 32-bit words in the header. reserved = must be 0 Breno de Medeiros Florida State University Fall 2005

Florida State University TCP state diagram TCP new connection: 3-way handshake, by TCP packets with SYN, SYN & ACK, and ACK flags set. TCP close connection: Via RST, without ACK Via FIN, ACK, FIN, ACK (4 way teardown) The SYN_RCVD stage is vulnerable to denial-of-service attacks. At this stage, the server (i.e., the machine receiving the connection) has committed resources by creating a table to maintain the state of the connection, while the connection initiator may have used a forged IP address and never follow up with the ACK. See next slides. Breno de Medeiros Florida State University Fall 2005

Florida State University TCP SYN-flood attack An adversarial client can spoof many IP addresses and send large numbers of SYN-packets, requesting new TCP connections to the server. The server responds with SYN-ACK packets, and keeps record of the requested connections (in state SYN-received), waiting on each a period (timeout) for an ACK-packet that will never arrive. If the adversary’s rate of requests is large enough, the server’s resources (memory buffers) for handling pending connections will fill up quickly (well before timeout). The server will no longer be able to handle legitimate service requests. Moreover, it can result in OS instability and crashing. Breno de Medeiros Florida State University Fall 2005

Florida State University TCP SYN Cookies Enable servers to continue to accept and serve legitimate connections even after its resources to handle pending connections (in SYN-received state) have been exhausted. Requires no modification of clients, can be unilaterally adopted by servers without modifying the underlying behavior of the IP protocol. Change the generation of server sequence numbers. Of the 32-bit sequence counter, use the top 5 bits for a counter t than increases every 64 seconds. Use the bottom 24 bits to encode a secret function of the server and client IP addresses and port numbers, and of t. When out of resources, server just sends SYN-ACK as if ok. When the ACK is received, re-compute the secret function and verify if the ACK is a possible reply to an (unrecorded) SYN-ACK packet. Use the information in the ACK to re-create the connection table. Breno de Medeiros Florida State University Fall 2005

Florida State University UDP Breno de Medeiros Florida State University Fall 2005