Networks and TCP/IP Part 2. Transport Protocols  TCP vs. UDP TCP  Transmission Control Protocol  More complicated  Ensures delivery UDP  User Datagram.

Slides:



Advertisements
Similar presentations
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Advertisements

Networks and TCP/IP Part 2. PORTS Ports – What and Why are They?  Typically: Computers usually have only one network access point to the internet 
CCNA – Network Fundamentals
TCP 與 UDP 協定分析 第 22 組 b 陳贊羽 b 馬家驤 b 林怡賢 b 王奕棠.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Institute of Technology Sligo - Dept of Computing Semester 2 Chapter 9 The TCP/IP Protocol Suite Paul Flynn.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
TCP/IP Basics A review for firewall configuration.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
CS 356 Systems Security Spring Dr. Indrajit Ray
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
Module 1: Reviewing the Suite of TCP/IP Protocols.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
ITIS 6167/8167: Network Security Weichao Wang. 2 Contents ICMP protocol and attacks UDP protocol and attacks TCP protocol and attacks.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
Exploring the Packet Delivery Process Chapter
ICMP : Internet Control Message Protocol. Introduction ICMP is often considered part of the IP layer. It communicates error messages and other conditions.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
© 2002, Cisco Systems, Inc. All rights reserved..
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
10/13/2015© 2008 Raymond P. Jefferis IIILect 07 1 Internet Protocol.
10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
University of the Western Cape Chapter 12: The Transport Layer.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Cisco Networking Academy S2 C9 TCP/IP. ensure communication across any set of interconnected networks Stack components such as protocols to support file.
Networking Basics CCNA 1 Chapter 11.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
Module 16: Distributed System Structures Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 4, 2005 Distributed.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Networks and TCP/IP Part 2 - Transport. PORTS Ports – What and Why are They?  Typically: Computers usually have only one network access point to the.
Lecture#6:Connectivity Verification
© 2003, Cisco Systems, Inc. All rights reserved.
LESSON Networking Fundamentals Understand TCP/IP.
IP: Addressing, ARP, Routing
Chapter 9: Transport Layer
Introduction to TCP/IP networking
Instructor Materials Chapter 9: Transport Layer
Connectivity Verification
Networks and TCP/IP Part 2 - Transport.
ICMP ICMP = Internet Control Message Protocol Layer 3
Lec 2: Protocols.
Troubleshooting IP Communications
Lecture#7:Connectivity Verification
Lecture#6:Connectivity Verification
ITIS 6167/8167: Network and Information Security
Anjuman College of Engineering and Technology Department of Computer Science and Engineering VII Sem. TCP and IP (Elective I) Prof. Nazish Khan.
Internet Control Message Protocol
Transport Layer 9/22/2019.
Presentation transcript:

Networks and TCP/IP Part 2

Transport Protocols  TCP vs. UDP TCP  Transmission Control Protocol  More complicated  Ensures delivery UDP  User Datagram Protocol  Simpler protocol  Delivery not guaranteed Others  DCCP  Datagram Congestion Control Protocol  SCTP  Stream Control Transmission Protocol

TCP Transmission Control Protocol

TCP – Transmission Control Protocol  How data is transmitted between addresses Data broken into packets Numbered Each packet sent most “practical” way at that moment  Traffic  Failures  Etc. Reassembled at destination

TCP  TCP adds a great deal of functionality to the IP service it is layered over: Streams. TCP data is organized as a stream of bytes, much like a file. The datagram nature of the network is concealed. A mechanism (the Urgent Pointer) exists to let out-of-band data be specially flagged. Reliable delivery. Sequence numbers are used to coordinate which data has been transmitted and received. TCP will arrange for retransmission if it determines that data has been lost. Network adaptation. TCP will dynamically learn the delay characteristics of a network and adjust its operation to maximize throughput without overloading the network. Flow control. TCP manages data buffers, and coordinates traffic so its buffers will never overflow. Fast senders will be stopped periodically to keep up with slower receivers.

TCP Header TCP Header Format | Source Port | Destination Port | | Sequence Number | | Acknowledgment Number | | Data | |U|A|P|R|S|F| | | Offset| Reserved |R|C|S|S|Y|I| Window | | | |G|K|H|T|N|N| | | Checksum | Urgent Pointer | | Options | Padding | | data |

UDP Header | Source Port | Destination Port | | Length | Checksum | | Data

Ports – What and Why are They?  Typically: There is only one network access point to the internet Multiple systems and programs want to access the internet  How do programs and systems keep their conversations straight?

Ports  An extra field Added to the end of the IP address  16 bits  values  E.g :8080 Denotes which application Not all transport layers use ports  TCP and UPD do  ICMP does not

Common Ports Port # Common Protocol Service Port # Common Protocol Service 7TCPecho 80TCPhttp 9TCPdiscard 110TCPpop3 13TCPdaytime 111TCPsunrpc 19TCPchargen 119TCPnntp 20TCPftp-control 123UDPntp 21TCPftp-data 137UDPnetbios-ns 23TCPtelnet 138UDPnetbios-dgm 25TCPsmtp 139TCPnetbios-ssn 37UDPtime 143TCPimap 43TCPwhois 161UDPsnmp 53TCP/UDPdns 162UDPsnmp-trap 67UDPbootps 179TCPbgp 68UDPbootpc 443TCPhttps (http/ssl) 69UDPtftp 520UDPrip 70TCPgopher 1080TCPsocks 79TCPfinger 33434UDPtraceroute

Handy Tools

Ping  Answers the age old question: Is anybody out there?  To use: ping  Returns if found: Reply from : bytes=32 time<1ms TTL=63  Confirms address  Bytes sent  How long it took  Time To Live  If not found: Request timed out  Caution: Some systems will ping forever until command is terminated with something like a Ctrl-C  Linux, Unix, Mac OS Some systems will not echo failed pings until command is terminated

Ping  Many sites will no longer answer a ping request  Uses echo request Worry it can be used by worms for reconnaissance Can be used for DDoS attacks

Ping – Windows example  Executed: ping ctc.net Note the address can be an IP address or a DNS name Replied it was pinging Time it took to echo (23-36 ms) TTL (Time To Live) of 122  How many hops left before packet expires  Recommended default starting TTL is now 64  Can be up to 255  Different systems have different defaults C:\>ping ctc.net Pinging ctc.net [ ] with 32 bytes of data: Reply from : bytes=32 time=24ms TTL=122 Reply from : bytes=32 time=23ms TTL=122 Reply from : bytes=32 time=36ms TTL=122 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 23ms, Maximum = 36ms, Average = 26ms

Trace Route  “Pings” and reports the paths taken  Windows: tracert [options] target_name  Linux: traceroute [options] host

Trace Route Examples C:\>tracert google.com Tracing route to google.com [ ] over a maximum of 30 hops: 1 1 ms 1 ms <1 ms ms 46 ms 43 ms ms 61 ms 47 ms t3-3.cr02.knpl.ctc.net [ ] 4 24 ms 25 ms 29 ms t8-2.cr01.cncr.ctc.net [ ] 5 23 ms 27 ms 23 ms g5-1.bd01.cncr.ctc.net [ ] 6 41 ms 39 ms 39 ms sl-gw21-atl-6-3.sprintlink.net [ ] 7 42 ms 47 ms 41 ms sl-bb23-atl-5-0.sprintlink.net [ ] 8 38 ms 42 ms 39 ms sl-bb24-atl-15-0.sprintlink.net [ ] 9 39 ms 41 ms 39 ms sl-st20-atl sprintlink.net [ ] ms 42 ms 39 ms ms 44 ms 44 ms ms 61 ms 60 ms ms 71 ms 72 ms ms 72 ms 74 ms ms 72 ms 73 ms ms 82 ms 81 ms ms 75 ms 74 ms ms 69 ms 73 ms eh-in-f99.google.com [ ] Trace complete.

Trace Route Examples C:\>tracert myctc.net Tracing route to myctc.net [ ] over a maximum of 30 hops: 1 1 ms <1 ms <1 ms ms 27 ms 207 ms ms 25 ms 24 ms t3-3.cr02.knpl.ctc.net [ ] 4 24 ms 24 ms 23 ms t8-2.cr01.cncr.ctc.net [ ] 5 23 ms 25 ms 27 ms t9-1.ce01.cncr.ctc.net [ ] 6 24 ms 25 ms 28 ms myctc.net [ ] 7 40 ms 23 ms 23 ms myctc.net [ ] Trace complete. C:\>tracert Tracing route to over a maximum of 30 hops 1 2 ms <1 ms 1 ms Trace complete.

Hardware Support Specialized Machines to enable the network and TCP/IP

Hub, Switch, Router, Bridge, Repeater?  Hubs (Ethernet) Pass data to all devices connected  Switches (Ethernet) Pass data from sender to intended destination only Must be in network  Router Does switching Looks for destination outside network  Bridge Hooks dissimilar network protocols together  Token Ring  Ethernet  Repeater Amplifies, restores signal/strength

Hub  Receives signal Send to all ports May be regenerated Destination must be on the same physical network

Switch  Receives signal Sends only to destination port Destination must be on the name physical network

Router  Connects Networks Subnetworks  Finds the next address to get closer to destination Next Router Destination

Gateway  Router on the edge of a network  Connects LAN WAN

Bridge  Connects 2 dissimilar topologies May or may not be same network  Connect Token Ring to Ethernet ATM to Token Ring  Usually does not filter traffic

Proxy Server  A server that services the requests of its clients by forwarding the request to other servers  Many types: Caching Proxy Server Web Proxy Anonymzing proxy server Hostile proxy Intercepting proxy server

Caching Proxy Server  Saves results of previous requests Local copies Mainly for frequently used resources  Serves these saved requests  Ensure they are properly implemented Maximum performance

Web Proxy  Focuses on WWW traffic Can filter or block Can format for specific audiences  Cell phones  PDAs Can be used to enforce/enhance  Network use policies  Malware interception  Caching

Anonymizing Proxy Server  Removes requestors identifying information

Hostile Proxy  Inserted between requestors and internet For illegal/borderline purposes Typically eavesdrops  Information is Captured Analyzed Usually passed on to legitimate or original destination

Intercepting Proxy Server  Combination proxy server and gateway  Used to Prevent circumventing use policy Ease administrative burden Etc.

Transparent and Non-transparent Proxy Servers  Transparent Doe not modify requests other than that needed for proxy authentication and identification  Non-transparent Modifies requests and responses to provide “added” service  Annotation services  Protocol reduction  Anonymity filtering

Force Proxy  Ambiguous term

Open Proxy Server  Accessible by any internet user  Question: Some open proxies are limited in access by requiring authentication (by logging in) Is that ethical?

Split Proxy Server  Implemented by 2 programs On 2 computers  Good for Compressing data over a slow link Security

Reverse Proxy Server  Installed in the neighborhood of one or more web servers All traffic through proxy  Advantages Security Encryption/SSL acceleration Load distribution Caching

NAT  Network Address Translation Allows multiple use of IP addresses Allows hiding of originator IP address  Two varieties Network Address Port Translation  NAPT  Maps multiple IP addresses to a single IP address with different ports for each IP Straight forward NAT  One for one translation