History of tcp


Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

History of tcp

  1. 1. History of TCP/IPTransmission Control Protocol/Internet Protocol (TCP/IP) is an industry standard suite ofprotocols that is designed for large networks consisting of network segments that are connectedby routers. TCP/IP is the protocol that is used on the Internet, which is the collection ofthousands of networks worldwide that connect research facilities, universities, libraries,government agencies, private companies, and individuals.The roots of TCP/IP can be traced back to research conducted by the United States Departmentof Defense (DoD) Advanced Research Projects Agency (DARPA) in the late 1960s and early1970s. The following list highlights some important TCP/IP milestones:In 1970, ARPANET hosts started to use Network Control Protocol (NCP), a preliminaryform of what would become the Transmission Control Protocol (TCP).In 1972, the Telnet protocol was introduced. Telnet is used for terminal emulation toconnect dissimilar systems. In the early 1970s, these systems were different types ofmainframe computers.In 1973, the File Transfer Protocol (FTP) was introduced. FTP is used to exchange filesbetween dissimilar systems.In 1974, the Transmission Control Protocol (TCP) was specified in detail. TCP replacedNCP and provided enhanced reliable communication services.In 1981, the Internet Protocol (IP) (also known as IP version 4 [IPv4]) was specified indetail. IP provides addressing and routing functions for end-to-end delivery.In 1982, the Defense Communications Agency (DCA) and ARPA established theTransmission Control Protocol (TCP) and Internet Protocol (IP) as the TCP/IP protocolsuite.In 1983, ARPANET switched from NCP to TCP/IP.In 1984, the Domain Name System (DNS) was introduced. DNS resolves domain names(such as www.example.com) to IP addresses (such as 1995, Internet service providers (ISPs) began to offer Internet access to businesses andindividuals.In 1996, the Hypertext Transfer Protocol (HTTP) was introduced. The World Wide Webuses HTTP.In 1996, the first set of IP version 6 (IPv6) standards were published.For more information about these protocols and the layers of the TCP/IP protocol architecture,see Chapter 2, "Architectural Overview of the TCP/IP Protocol Suite."With the refinement of the IPv6 standards and their growing acceptance, the chapters of thisonline book make the following definitions:TCP/IP is the entire suite of protocols defined for use on private networks and theInternet. TCP/IP includes both the IPv4 and IPv6 sets of protocols.IPv4 is the Internet layer of the TCP/IP protocol suite originally defined for use on theInternet. IPv4 is in widespread use today.
  2. 2. IPv6 is the Internet layer of the TCP/IP protocol suite that has been recently developed.IPv6 is gaining acceptance today.IP is the term used to describe features or attributes that apply to both IPv4 and IPv6. Forexample, an IP address is either an IPv4 address or an IPv6 address.Note Because the term IP indicates IPv4 in most of the TCP/IP implementations today,the term IP will be used for IPv4 in some instances. These references will be made clearin the context of the discussion. When possible, the chapters of this online book will usethe term IP (IPv4).Top of pageThe Internet Standards ProcessBecause TCP/IP is the protocol of the Internet, it has evolved based on fundamental standardsthat have been created and adopted over more than 30 years. The future of TCP/IP is closelyassociated with the advances and administration of the Internet as additional standards continueto be developed. Although no one organization owns the Internet or its technologies, severalorganizations oversee and manage these new standards, such as the Internet Society and theInternet Architecture Board.The Internet Society (ISOC) was created in 1992 and is a global organization responsible for theinternetworking technologies and applications of the Internet. Although the society’s principalpurpose is to encourage the development and availability of the Internet, it is also responsible forthe further development of the standards and protocols that allow the Internet to function.The ISOC sponsors the Internet Architecture Board (IAB), a technical advisory group that setsInternet standards, publishes RFCs, and oversees the Internet standards process. The IABgoverns the following bodies:The Internet Assigned Number Authority (IANA) oversees and coordinates theassignment of protocol identifiers used on the Internet.The Internet Research Task Force (IRTF) coordinates all TCP/IP-related researchprojects.The Internet Engineering Task Force (IETF) solves technical problems and needs as theyarise on the Internet and develops Internet standards and protocols. IETF working groupsdefine standards known as RFCs.Requests for Comments (RFCs)The standards for TCP/IP are published in a series of documents called Requests for Comments(RFCs). RFCs describe the internal workings of the Internet. TCP/IP standards are alwayspublished as RFCs, although not all RFCs specify standards. Some RFCs provide informational,experimental, or historical information only.
  3. 3. An RFC begins as an Internet draft, which is typically developed by one or more authors in anIETF working group. An IETF working group is a group of individuals that has a specific charterfor an area of technology in the TCP/IP protocol suite. For example, the IPv6 working groupdevotes its efforts to furthering the standards of IPv6. After a period of review and a consensusof acceptance, the IETF publishes the final version of the Internet draft as an RFC and assigns itan RFC number.RFCs also receive one of five requirement levels, as listed in Table 1-1.RequirementlevelDescriptionRequired Must be implemented on all TCP/IP-based hosts and gateways.RecommendedEncouraged that all TCP/IP-based hosts and gateways implement the RFCspecifications. Recommended RFCs are usually implemented.ElectiveImplementation is optional. Its application has been agreed to but never widelyused.Limited use Not intended for general use.NotrecommendedNot recommended for implementation.Table 1-1 Requirement Levels of RFCsIf an RFC is being considered as a standard, it goes through stages of development, testing, andacceptance. Within the Internet standards process, these stages are formally known as maturitylevels.Internet standards have one of three maturity levels, as listed in Table 1-2. Maturity levels aredetermined by the RFCs IETF working group and are independent of requirement levels.MaturitylevelDescriptionProposedStandardA Proposed Standard specification is generally stable, has resolved known designchoices, is believed to be well understood, has received significant communityreview, and appears to enjoy enough community interest to be considered valuable.DraftStandardA Draft Standard specification must be well understood and known to be quitestable, both in its semantics and as a basis for developing an implementation.InternetStandardAn Internet Standard specification (which may simply be referred to as a Standard)is characterized by a high degree of technical maturity and by a generally held beliefthat the specified protocol or service provides significant benefit to the Internetcommunity.Table 1-2 Maturity Levels of Internet Standards
  4. 4. If an RFC-based standard must change, the IETF publishes a new Internet draft and, after aperiod of review, a new RFC with a new number. The original RFC is never updated. Therefore,you should verify that you have the most recent RFC on a particular topic or standard. Forexample, we reference RFCs throughout the chapters of this online book. If you decide to lookup the technical details of an Internet standard in its RFC, make sure that you have the latestRFC that describes the standard.You can obtain RFCs from http://www.ietf.org/rfc.html.Top of pageTCP/IP TerminologyThe Internet standards use a specific set of terms when referring to network elements andconcepts related to TCP/IP networking. These terms provide a foundation for subsequentchapters. Figure 1-1 illustrates the components of an IP network.Figure 1-1 Elements of an IP networkCommon terms and concepts in TCP/IP are defined as follows:Node Any device, including routers and hosts, which runs an implementation of IP.Router A node that can forward IP packets not explicitly addressed to itself. On an IPv6network, a router also typically advertises its presence and host configurationinformation.Host A node that cannot forward IP packets not explicitly addressed to itself (a non-router). A host is typically the source and the destination of IP traffic. A host silentlydiscards traffic that it receives but that is not explicitly addressed to itself.Upper-layer protocol A protocol above IP that uses IP as its transport. Examples includeInternet layer protocols such as the Internet Control Message Protocol (ICMP) andTransport layer protocols such as the Transmission Control Protocol (TCP) and UserDatagram Protocol (UDP). (However, Application layer protocols that use TCP and UDPas their transports are not considered upper-layer protocols. File Transfer Protocol [FTP]
  5. 5. and Domain Name System [DNS] fall into this category). For details of the layers of theTCP/IP protocol suite, see Chapter 2, "Architectural Overview of the TCP/IP ProtocolSuite."LAN segment A portion of a subnet consisting of a single medium that is bounded bybridges or Layer 2 switches.Subnet One or more LAN segments that are bounded by routers and use the same IPaddress prefix. Other terms for subnet are network segment and link.Network Two or more subnets connected by routers. Another term for network isinternetwork.Neighbor A node connected to the same subnet as another node.Interface The representation of a physical or logical attachment of a node to a subnet.An example of a physical interface is a network adapter. An example of a logicalinterface is a tunnel interface that is used to send IPv6 packets across an IPv4 network.Address An identifier that can be used as the source or destination of IP packets and thatis assigned at the Internet layer to an interface or set of interfaces.Packet The protocol data unit (PDU) that exists at the Internet layer and comprises an IPheader and payload.Top of pageTCP/IP Components in WindowsTable 1-3 lists the advantages of the TCP/IP protocol suite and the inclusion of TCP/IPcomponents in Windows.Advantages of the TCP/IP protocol suiteAdvantages of TCP/IP components inWindowsA standard, routable enterprise networking protocolthat is the most complete and accepted protocolavailable. All modern operating systems supportTCP/IP, and most large private networks rely onTCP/IP for much of their traffic.TCP/IP components in Windows enableenterprise networking and connectivityfor Windows and non-Windows–basedcomputers.A technology for connecting dissimilar systems. ManyTCP/IP application protocols were designed to accessand transfer data between dissimilar systems. Theseprotocols include HTTP, FTP, and Telnet.TCP/IP components in Windows allowstandards-based connectivity to otheroperating system platforms.A robust, scaleable, cross-platform client/serverframework.TCP/IP components in Windows supportthe Windows Sockets applicationprogramming interface, whichdevelopers use to create client/serverapplications.A method of gaining access to the Internet.Windows-based computers are Internet-ready.Table 1-3 Advantages of the TCP/IP protocol suite and TCP/IP components in Windows
  6. 6. Windows includes both an IPv4-based and an IPv6-based TCP/IP component.Configuring the IPv4-based TCP/IP Component in WindowsThe IPv4-based TCP/IP component in Windows Server 2003 and Windows XP is installed bydefault and appears as the Internet Protocol (TCP/IP) component in the Network Connectionsfolder. Unlike in previous versions of Windows, you cannot uninstall the Internet Protocol(TCP/IP) component. However, you can restore its default configuration by using the netshinterface ip reset command. For more information about Netsh commands, see WindowsServer 2003 or Windows XP Help and Support.The Internet Protocol (TCP/IP) component can be configured to obtain its configurationautomatically or from manually specified settings. By default, this component is configured toobtain an address configuration automatically. Figure 1-2 shows the General tab of the InternetProtocol (TCP/IP) Properties dialog box.Figure 1-2 The General tab of the properties dialog box for the Internet Protocol (TCP/IP)componentAutomatic ConfigurationIf you specify automatic configuration, the Internet Protocol (TCP/IP) component attempts tolocate a Dynamic Host Configuration Protocol (DHCP) server and obtain a configuration whenWindows starts. Many TCP/IP networks use DHCP servers that are configured to allocate
  7. 7. TCP/IP configuration information to clients on the network. For more information about DHCP,see Chapter 6, "Dynamic Host Configuration Protocol."If the Internet Protocol (TCP/IP) component fails to locate a DHCP server, TCP/IP checks thesetting on the Alternate Configuration tab. Figure 1-3 shows this tab.Figure 1-3 The Alternate Configuration tab of the Internet Protocol (TCP/IP) componentThis tab contains two options:Automatic Private IP Address If you choose this option, Automatic Private IPAddressing (APIPA) is used. The Internet Protocol (TCP/IP) component automaticallychooses an IPv4 address from the range to, using the subnetmask of The DHCP client ensures that the IPv4 address that the InternetProtocol (TCP/IP) component has chosen is not already in use. If the address is in use, theInternet Protocol (TCP/IP) component chooses another IPv4 address and repeats thisprocess for up to 10 addresses. When the Internet Protocol (TCP/IP) component haschosen an address that the DHCP client has verified as not in use, the Internet Protocol(TCP/IP) component configures the interface with this address. With APIPA, users onsingle-subnet Small Office/Home Office (SOHO) networks can use TCP/IP withouthaving to perform manual configuration or set up a DHCP server. APIPA does notconfigure a default gateway. Therefore, only local subnet traffic is possible.User Configured If you choose this option, the Internet Protocol (TCP/IP) componentuses the configuration that you specify. This option is useful when a computer is used onmore than one network, not all of the networks have a DHCP server, and an APIPA
  8. 8. configuration is not wanted. For example, you might want to choose this option if youhave a laptop computer that you use both at the office and at home. At the office, thelaptop uses a TCP/IP configuration from a DHCP server. At home, where no DHCPserver is present, the laptop automatically uses the alternate manual configuration. Thisoption provides easy access to home network devices and the Internet and allowsseamless operation on both networks, without requiring you to manually reconfigure theInternet Protocol (TCP/IP) component.If you specify an APIPA configuration or an alternate manual configuration, the InternetProtocol (TCP/IP) component continues to check for a DHCP server in the background every 5minutes. If TCP/IP finds a DHCP server, it stops using the APIPA or alternate manualconfiguration and uses the IPv4 address configuration offered by the DHCP server.Manual ConfigurationTo configure the Internet Protocol (TCP/IP) component manually, also known as creating a staticconfiguration, you must at a minimum assign the following:IP address An IP (IPv4) address is a logical 32-bit address that is used to identify theinterface of an IPv4-based TCP/IP node. Each IPv4 address has two parts: the subnetprefix and the host ID. The subnet prefix identifies all hosts that are on the same physicalnetwork. The host ID identifies a host on the network. Each interface on an IPv4-basedTCP/IP network requires a unique IPv4 address, such as mask A subnet mask allows the Internet Protocol (TCP/IP) component todistinguish the subnet prefix from the host ID. An example of a subnet mask is255.255.255.0.For more information about IPv4 addresses and subnet masks, see Chapter 3, "IP Addressing,"and Chapter 4, "Subnetting."You must configure these parameters for each network adapter in the node that uses the InternetProtocol (TCP/IP) component. If you want to connect to nodes beyond the local subnet, youmust also assign the IPv4 address of a default gateway, which is a router on the local subnet towhich the node is attached. The Internet Protocol (TCP/IP) component sends packets that aredestined for remote networks to the default gateway, if no other routes are configured on thelocal host.You can also manually configure the IPv4 addresses of primary and alternate DNS servers. TheInternet Protocol (TCP/IP) component uses DNS servers to resolve names, such aswww.example.com, to IPv4 or IPv6 addresses.Figure 1-4 shows an example of a manual configuration for the Internet Protocol (TCP/IP)component.
  9. 9. Figure 1-4 An example of a manual configuration for the Internet Protocol (TCP/IP)You can also manually configure the Internet Protocol (TCP/IP) using netsh interface ipcommands at a command prompt.Installing and Configuring the IPv6-based TCP/IP Component in WindowsWindows XP with Service Pack 1 (SP1) and Windows Server 2003 are the first versions ofWindows to support IPv6 for production use. You install IPv6 as a component in NetworkConnections; the component is named Microsoft TCP/IP Version 6 in Windows Server 2003andWindows XP with Service Pack 2 (SP2) and Microsoft IPv6 Developer Edition in Windows XPwith SP1.Note The Microsoft IPv6 Developer Edition component included in Windows XP with noservice packs was intended for application developers only, not for use in productionenvironments. Therefore, all of the Help topics for that version contain a disclaimer describingits limitations and supported uses. Windows XP SP1 and SP2 include a version of IPv6 that isintended for production use. However, the Help topics were not updated for Windows XP SP1 orSP2. Therefore, you can disregard the disclaimer if you have installed Windows XP SP1 or SP2.Unlike the Internet Protocol (TCP/IP) component, the IPv6 component is not installed by default,and you can uninstall it. You can install the IPv6 component in the following ways:Using the Network Connections folder.Using the netsh interface ipv6 install command.
  10. 10. To install the IPv6 component in Windows Server 2003 using the Network Connections folder,do the following:1. Click Start, point to Control Panel, and then double-click Network Connections.2. Right-click any local area connection, and then click Properties.3. Click Install.4. In the Select Network Component Type dialog box, click Protocol, and then click Add.5. In the Select Network Protocol dialog box, click Microsoft TCP/IP Version 6, andthen click OK.6. Click Close to save changes.Unlike Internet Protocol (TCP/IP), the IPv6 component has no properties dialog box from whichyou can configure IPv6 addresses and settings. Configuration should be automatic for IPv6 hostsand manual for IPv6 routers.Automatic ConfigurationThe Microsoft TCP/IP Version 6 component supports address autoconfiguration. All IPv6 nodesautomatically create unique IPv6 addresses for use between neighboring nodes on a subnet. Toreach remote locations, each IPv6 host upon startup sends a Router Solicitation message in anattempt to discover the local routers on the subnet. An IPv6 router on the subnet responds with aRouter Advertisement message, which the IPv6 host uses to automatically configure IPv6addresses, the default router, and other IPv6 settings.Manual ConfigurationYou do not need to configure the typical IPv6 host manually. If a host does require manualconfiguration, use the netsh interface ipv6 commands to add addresses or routes and configureother settings.If you are configuring a computer running Windows XP with SP1, Windows XP with SP2, orWindows Server 2003 to be an IPv6 router, then you must use the netsh interface ipv6commands to manually configure the IPv6 component with address prefixes.For more information about configuring an IPv6 router, see Chapter 5, "IP Routing."Name Resolution Files in WindowsThe Internet Protocol (TCP/IP) and Microsoft TCP/IP Version 6 components support the use ofname resolution files to resolve the names of destinations, networks, protocols, and services.Table 1-4 lists these name resolution files, which are stored in theSystemrootSystem32DriversEtc folder.FilenameDescriptionHosts Resolves host names to IPv4 or IPv6 addresses. For more information, see Chapter 7,
  11. 11. "Host Name Resolution."LmhostsResolves network basic input/output system (NetBIOS) names to IPv4 addresses. Asample Lmhosts file (Lmhosts.sam) is included by default. You can create a differentfile named Lmhosts or you can rename or copy Lmhosts.sam to Lmhosts in this folder.For more information, see Chapter 11, "NetBIOS over TCP/IP."Networks Resolves network names to IPv4 subnet prefixes.ProtocolResolves protocol names to RFC-defined protocol numbers. A protocol number is afield in the IPv4 header that identifies the upper-layer protocol (such as TCP or UDP)to which the IPv4 packet payload should be passed.ServicesResolves service names to port numbers and protocol names. Port numbers correspondto fields in the TCP or UDP headers that identify the application using TCP or UDP.Table 1-4 Name Resolution Files in WindowsTCP/IP Tools in WindowsTable 1-5 lists the TCP/IP diagnostic tools that are included with Windows Server 2003 andWindows XP. You can use these tools to help identify or resolve TCP/IP networking problems.Tool DescriptionArpAllows you to view and edit the Address Resolution Protocol (ARP) cache. The ARPcache maps IPv4 addresses to media access control (MAC) addresses. Windows usesthese mappings to send data on the local network.Hostname Displays the host name of the computer.IpconfigDisplays current TCP/IP configuration values for both IPv4 and IPv6. Also used tomanage DHCP configuration and the DNS client resolver cache.LpqDisplays the status of print queues on print servers running Line Printer Daemon(LPD) software.NbtstatChecks the state of current NetBIOS over TCP/IP connections, updates the Lmhostscache, and determines the registered names and scope ID.NetshDisplays and allows you to administer settings for IPv4 or IPv6 on either the localcomputer or a remote computer.Netstat Displays statistics and other information about current IPv4 and IPv6 connections.Nslookup Queries a DNS server.Ping Tests IPv4 or IPv6 connectivity to other IP nodes.RouteAllows you to view the local IPv4 and IPv6 routing tables and to modify the localIPv4 routing table.Tracert Traces the route that an IPv4 or IPv6 packet takes to a destination.PathpingTraces the route that an IPv4 or IPv6 packet takes to a destination and displaysinformation on packet losses for each router and subnet in the path.Table 1-5 TCP/IP diagnostic tools in Windows
  12. 12. Windows Server 2003 and Windows XP also include command-line tools for data transfer usingFTP, Trivial File Transfer Protocol (TFTP), Telnet, and connectivity to UNIX-based resources.After you have configured TCP/IP, you can use the Ipconfig and Ping tools to verify and test theconfiguration and connectivity to other TCP/IP hosts and networks.The Ipconfig ToolYou can use the Ipconfig tool to verify the TCP/IP configuration parameters on a host, includingthe following:For IPv4, the IPv4 address, subnet mask, and default gateway.For IPv6, the IPv6 addresses and the default router.Ipconfig is useful in determining whether the configuration is initialized and whether a duplicateIP address is configured. To view this information, type ipconfig at a command prompt.Here is an example of the display of the Ipconfig tool for a computer that is using both IPv4 andIPv6:C:>ipconfigWindows IP ConfigurationEthernet adapter Local Area Connection:Connection-specific DNS Suffix . : wcoast.example.comIP Address. . . . . . . . . . . . : Mask . . . . . . . . . . . : Address. . . . . . . . . . . . : 2001:db8:ffff:f282:204:76ff:fe36:7363IP Address. . . . . . . . . . . . : fec0::f282:204:76ff:fe36:7363%2IP Address. . . . . . . . . . . . : fe80::204:76ff:fe36:7363Default Gateway . . . . . . . . . : adapter Automatic Tunneling Pseudo-Interface:Connection-specific DNS Suffix . : wcoast.example.comIP Address. . . . . . . . . . . . :2001:db8:ffff:f70f:0:5efe: Address. . . . . . . . . . . . : fe80::5efe: Gateway . . . . . . . . . : fe80::5efe: ipconfig /all at a command prompt to view the IPv4 and IPv6 addresses of DNS servers,the IPv4 addresses of Windows Internet Name Service (WINS) servers (which resolve NetBIOSnames to IP addresses), the IPv4 address of the DHCP server, and lease information for DHCP-configured IPv4 addresses.The Ping Tool
  13. 13. After you verify the configuration with the Ipconfig tool, use the Ping tool to test connectivity.The Ping tool is a diagnostic tool that tests TCP/IP configurations and diagnoses connectionfailures. For IPv4, Ping uses ICMP Echo and Echo Reply messages to determine whether aparticular IPv4-based host is available and functional. For IPv6, Ping uses ICMP for IPv6(ICMPv6) Echo Request and Echo Reply messages. The basic command syntax isping Destination, in which Destination is either an IPv4 or IPv6 address or a name that can beresolved to an IPv4 or IPv6 address.Here is an example of the display of the Ping tool for an IPv4 destination:C:>ping with 32 bytes of data:Reply from bytes=32 time<1ms TTL=255Reply from bytes=32 time<1ms TTL=255Reply from bytes=32 time<1ms TTL=255Reply from bytes=32 time<1ms TTL=255Ping statistics for Sent = 4, Received = 4, Lost = 0 (0% loss),Approximate round trip times in milli-seconds:Minimum = 0ms, Maximum = 0ms, Average = 0msHere is an example of the display of the Ping tool for an IPv6 destination:C:>ping 2001:db8:1:21ad:210:ffff:fed6:58c0Pinging 2001:db8:1:21ad:210:ffff:fed6:58c0 from2001:DB8:1:21ad:204:76ff:fe36:7363 with 32 bytes of data:Reply from 2001:db8:1:21ad:210:ffff:fed6:58c0: time<1msReply from 2001:db8:1:21ad:210:ffff:fed6:58c0: time<1msReply from 2001:db8:1:21ad:210:ffff:fed6:58c0: time<1msReply from 2001:db8:1:21ad:210:ffff:fed6:58c0: time<1msPing statistics for 2001:db8:1:21ad:210:ffff:fed6:58c0:Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),Approximate round trip times in milli-seconds:Minimum = 0ms, Maximum = 1ms, Average = 0msTo verify a computer’s configuration and to test for router connections, do the following:1. Type ipconfig at a command prompt to verify whether the TCP/IP configuration hasinitialized.2. Ping the IPv4 address of the default gateway or the IPv6 address of the default router toverify whether they are functioning and whether you can communicate with a node on thelocal network.3. Ping the IPv4 or IPv6 address of a remote node to verify whether you can communicatethrough a router.
  14. 14. If you start with step 3 and you are successful, then you can assume that you would be successfulwith steps 1 and 2.Note You cannot use the Ping tool to troubleshoot connections if packet filtering routers andhost-based firewalls are dropping ICMP and ICMPv6 traffic. For more information, see Chapter13, "Internet Protocol Security (IPsec) and Packet Filtering."Network MonitorYou can use Network Monitor to simplify troubleshooting complex network problems because itmonitors and captures network traffic for analysis. Network Monitor works by configuring anetwork adapter to capture all incoming and outgoing packets.You can define capture filters so that only specific frames are saved. Filters can save framesbased on source and destination MAC addresses, source and destination protocol addresses, andpattern matches. After a packet is captured, you can use display filtering to further isolate aproblem. When a packet has been captured and filtered, Network Monitor interprets and displaysthe packet data in readable terms.Note Windows Server 2003 includes a version of Network Monitor that can capture data for thelocal computer only. Microsoft Systems Management Server includes a version that can capturedata for remote computers.To install Network Monitor in Windows Server 2003, do the following:1. Click Start, point to Control Panel, click Add or Remove Programs, and then clickAdd/Remove Windows Components.2. In the Windows Components wizard, click Management and Monitoring Tools, andthen click Details.3. In Management And Monitoring Tools, select the Network Monitor Tools check box,and then click OK.4. If you are prompted for additional files, insert the product CD, or type a path to thelocation of the files on the network.Note To perform this procedure, you must be logged on as a member of theAdministrators group on the local computer, or you must have been delegated theappropriate authority. If the computer is joined to a domain, members of the DomainAdmins group might also be able to perform this procedure.To analyze network traffic with Network Monitor, you must start the capture, generate thenetwork traffic you want to observe, stop the capture, and then view the data.Starting a CaptureNetwork Monitor uses different windows to display data in different ways. One of the primarywindows is the Capture window. Figure 1-5 shows an example of the Capture window.
  15. 15. Figure 1-5 The Capture window in Network MonitorWhen this window is active, the toolbar has options to start, pause, stop, or stop and viewcaptured data. On the Capture menu, click Start to start a capture. While the capture is running,statistical information appears in the Capture window.Stopping a CaptureAfter you have generated the network traffic that you want to analyze, on the Capture menu,click Stop to stop the capture. You can then start another capture or display the current capturedata. To stop a capture and immediately open it for viewing, on the Capture menu, click Stopand View.Viewing the DataWhen you open a capture to view, a Summary window appears, showing the list of frames in thecapture. Each frame contains a frame number, the time of frame reception, source anddestination addresses, the highest-layer protocol used in the frame, and a description of theframe. Figure 1-6 shows an example Summary window.Figure 1-6 The Summary window of a capture in Network MonitorFor more detailed information about a specific frame, on the Window menu, click Zoom pane.In the zoom view, the Summary window shows two more panes, the Detail pane and theHexadecimal pane. The Detail pane shows the protocol information in detail. The Hexadecimal
  16. 16. pane shows the individual bytes in the frame. Figure 1-7 shows the zoom view of a frame withinan example capture.Figure 1-7 Zoom view of a frame in a capture in Network MonitorTop of pageChapter SummaryThe chapter includes the following pieces of key information:TCP/IP is an industry-standard suite of protocols that are designed for large-scalenetworks. The TCP/IP protocol suite includes both the IPv4 and IPv6 sets of protocols.The standards for TCP/IP are published in a series of documents called RFCs.On a TCP/IP-based network, a router can forward packets that are not addressed to therouter, a host cannot, and a node is either a host or a router.On a TCP/IP-based network, a subnet is one or more LAN segments that are bounded byrouters and that use the same IP address prefix, and a network is two or more subnetsconnected by routers.The IPv4-based TCP/IP component in Windows is the Internet Protocol (TCP/IP)component in Network Connections. This component is installed by default, and youcannot uninstall it. You configure it either automatically (by using DHCP or an alternateconfiguration) or manually (by using Network Connections or the Netsh tool).The IPv6-based TCP/IP component in Windows is the Microsoft TCP/IP Version 6 orMicrosoft IPv6 Developer Edition component in Network Connections. This componentis not installed by default, and you can uninstall it. You configure it either automatically(by using router discovery) or manually (by using the Netsh tool).Ipconfig and ping are the primary tools for troubleshooting basic IP configuration andconnectivity.You can use Network Monitor to troubleshoot complex network problems by capturingand viewing network traffic for analysis.Top of pageChapter Glossary
  17. 17. address – An identifier that specifies the source or destination of IP packets and that is assignedat the IP layer to an interface or set of interfaces.APIPA – See Automatic Private IP Addressing.Automatic Private IP Addressing – A feature in Windows Server 2003 and Windows XP thatautomatically configures a unique IPv4 address from the range through169.254.255.254 and a subnet mask of APIPA is used when the Internet Protocol(TCP/IP) component is configured for automatic addressing, no DHCP server is available, andthe Automatic Private IP Address alternate configuration option is chosen.host – A node that is typically the source and a destination of IP traffic. Hosts silently discardreceived packets that are not addressed to an IP address of the host.interface – The representation of a physical or logical attachment of a node to a subnet. Anexample of a physical interface is a network adapter. An example of a logical interface is atunnel interface that is used to send IPv6 packets across an IPv4 network.IP – Features or attributes that apply to both IPv4 and IPv6. For example, an IP address is eitheran IPv4 address or an IPv6 address.IPv4 – The Internet layer protocols of the TCP/IP protocol suite as defined in RFC 791. IPv4 isin widespread use today.IPv6 – The Internet layer protocols of the TCP/IP protocol suite as defined in RFC 2460. IPv6 isgaining acceptance today.LAN segment – A portion of a subnet that consists of a single medium that is bounded bybridges or Layer 2 switches.neighbor – A node that is connected to the same subnet as another node.network – Two or more subnets that are connected by routers. Another term for network isinternetwork.node – Any device, including routers and hosts, which runs an implementation of IP.packet – The protocol data unit (PDU) that exists at the Internet layer and comprises an IP headerand payload.Request for Comments (RFC) - An official document that specifies the details for protocolsincluded in the TCP/IP protocol suite. The Internet Engineering Task Force (IETF) creates andmaintains RFCs for TCP/IP.RFC – See Request for Comments (RFC).
  18. 18. router – A node that can be a source and destination for IP traffic and can also forward IPpackets that are not addressed to an IP address of the router. On an IPv6 network, a router alsotypically advertises its presence and host configuration information.subnet – One or more LAN segments that are bounded by routers and that use the same IPaddress prefix. Other terms for subnet are network segment and link.TCP/IP – See Transmission Control Protocol/Internet Protocol (TCP/IP).Transmission Control Protocol/Internet Protocol (TCP/IP) – A suite of networking protocols,including both IPv4 and IPv6, that are widely used on the Internet and that providecommunication across interconnected networks of computers with diverse hardwarearchitectures and various operating systems.upper-layer protocol – A protocol above IP that uses IP as its transport. Examples of upper-layerprotocols include Internet layer protocols such as the Internet Control Message Protocol (ICMP)and Transport layer protocols such as the Transmission Control Protocol (TCP) and UserDatagram Protocol (UDP).Top of page
  19. 19. 2222222222222222222222222222http://www.netbsd.org/docs/guide/en/chap-net-practice.htmlChapter 23. Introduction to TCP/IP NetworkingTable of Contents23.1. Audience23.2. Supported Networking Protocols23.3. Supported Media23.3.1. Serial Line23.3.2. Ethernet23.4. TCP/IP Address Format23.5. Subnetting and Routing23.6. Name Service Concepts23.6.1. /etc/hosts23.6.2. Domain Name Service (DNS)23.6.3. Network Information Service (NIS/YP)23.6.4. Other23.7. Next generation Internet protocol - IPv623.7.1. The Future of the Internet23.7.2. What good is IPv6?23.7.3. Changes to IPv423.1. AudienceThis section explains various aspects of networking. It is intended to help people with littleknowledge about networks to get started. It is divided into three big parts. We start by giving ageneral overview of how networking works and introduce the basic concepts. Then we go into
  20. 20. details for setting up various types of networking in the second parts, and the third part of thenetworking section covers a number of “advanced” topics that go beyond the basic operation asintroduced in the first two sections.The reader is assumed to know about basic system administration tasks: how to become root, editfiles, change permissions, stop processes, etc. See the other chapters of this NetBSD guide ande.g. [AeleenFrisch] for further information on this topic. Besides that, you should know how tohandle the utilities were going to set up here, i.e. you should know how to use telnet, FTP, ... Iwill not explain the basic features of those utilities, please refer to the appropriate man-pages, thereferences listed or of course the other parts of this document instead.This introduction to TCP/IP Networking was written with the intention in mind to give starters abasic knowledge. If you really want to know what its all about, read [CraigHunt]. This bookdoes not only cover the basics, but goes on and explains all the concepts, services and how to setthem up in detail. Its great, I love it! :-)23.2. Supported Networking ProtocolsThere are several protocol suites supported by NetBSD, most of which were inherited fromNetBSDs predecessor, 4.4BSD, and subsequently enhanced and improved. The first and mostimportant one today is DARPAs Transmission Control Protocol/Internet Protocol (TCP/IP).Other protocol suites available in NetBSD include the Xerox Network System (XNS) which wasonly implemented at UCB to connect isolated machines to the net, Apples AppleTalk protocolsuite and the ISO protocol suite, CCITT X.25 and ARGO TP. They are only used in some specialapplications these days.Today, TCP/IP is the most widespread protocol of the ones mentioned above. It is implementedon almost every hardware and operating system, and it is also the most-used protocol inheterogenous environments. So, if you just want to connect your computer running NetBSD tosome other machine at home or you want to integrate it into your companys or universitysnetwork, TCP/IP is the right choice. Besides the "old" IP version 4, NetBSD also supports the"new" IP version 6 (IPv6) since NetBSD 1.5, thanks to code contributed by the KAME project.There are other protocol suites such as DECNET, Novells IPX/SPX or Microsofts NetBIOS, butthese are not currently supported by NetBSD. These protocols differ from TCP/IP in that they areproprietary, in contrast to the others, which are well-defined in several RFCs and other openstandards.23.3. Supported MediaThe TCP/IP protocol stack behaves the same regardless of the underlying media used, andNetBSD supports a wide range of these, among them are Ethernet (10/100/1000MBd), Arcnet,serial line, ATM, FDDI, Fiber Channel, USB, HIPPI, FireWire (IEEE 1394), Token Ring, andserial lines.23.3.1. Serial Line
  21. 21. There are a couple of reasons for using TCP/IP over a serial line.If your remote host is only reachable via telephone, you can use a modem to access it.Many computers have a serial port, and the cable needed is rather cheap.The disadvantage of a serial connection is that its slower than other methods. NetBSD can use atmost 115200 bit/s, making it a lot slower than e.g. Ethernets minimum 10 Mbit/s and Arcnets 4Mbit/s.There are two possible protocols to connect a host running NetBSD to another host using a serialline (possibly over a phone-line):Serial Line IP (SLIP)Point to Point Protocol (PPP)The choice here depends on whether you use a dial-up connection through a modem or if you usea static connection (null-modem or leased line). If you dial up for your IP connection, its wise touse PPP as it offers some possibilities to auto-negotiate IP-addresses and routes, which can bequite painful to do by hand. If you want to connect to another machine which is directlyconnected, use SLIP, as this is supported by about every operating system and more easy to setup with fixed addresses and routes.PPP on a direct connection is a bit difficult to setup, as its easy to timeout the initial handshake;with SLIP, theres no such initial handshake, i.e. you start up one side, and when the other sitehas its first packet, it will send it over the line.[RFC1331] and [RFC1332] describe PPP and TCP/IP over PPP. SLIP is defined in [RFC1055].23.3.2. EthernetEthernet is the medium commonly used to build local area networks (LANs) of interconnectedmachines within a limited area such as an office, company or university campus. Ethernet isbased on a bus structure to which many machines can connect to, and communication alwayshappens between two nodes at a time. When two or more nodes want to talk at the same time,both will restart communication after some timeout. The technical term for this is CSMA/CD(Carrier Sense w/ Multiple Access and Collision Detection).Initially, Ethernet hardware consisted of a thick (yellow) cable that machines tapped into usingspecial connectors that poked through the cables outer shielding. The successor of this wascalled 10base5, which used BNC-type connectors for tapping in special T-connectors andterminators on both ends of the bus. Today, ethernet is mostly used with twisted pair lines whichare used in a collapsed bus system that are contained in switches or hubs. The twisted pair linesgive this type of media its name - 10baseT for 10 Mbit/s networks, and 100baseT for 100 MBit/sones. In switched environments theres also the distinction if communication between the nodeand the switch can happen in half- or in full duplex mode.
  22. 22. 23.4. TCP/IP Address FormatTCP/IP uses 4-byte (32-bit) addresses in the current implementations (IPv4), also called IP-numbers (Internet-Protocol numbers), to address hosts.TCP/IP allows any two machines to communicate directly. To permit this all hosts on a givennetwork must have a unique IP address. To assure this, IP addresses are administrated by onecentral organisation, the InterNIC. They give certain ranges of addresses (network-addresses)directly to sites which want to participate in the internet or to internet-providers, which give theaddresses to their customers.If your university or company is connected to the Internet, it has (at least) one such network-address for its own use, usually not assigned by the InterNIC directly, but rather through anInternet Service Provider (ISP).If you just want to run your private network at home, see below on how to “build” your own IPaddresses. However, if you want to connect your machine to the (real :-) Internet, you should getan IP addresses from your local network-administrator or -provider.IP addresses are usually written in “dotted quad”-notation - the four bytes are written down indecimal (most significant byte first), separated by dots. For example, would be avalid address. Another way to write down IP-addresses would be as one 32-bit hex-word, e.g.0x84c70f63. This is not as convenient as the dotted-quad, but quite useful at times, too. (Seebelow!)Being assigned a network means nothing else but setting some of the above-mentioned 32address-bits to certain values. These bits that are used for identifying the network are callednetwork-bits. The remaining bits can be used to address hosts on that network, therefore they arecalled host-bits. Figure 23.1, “IPv4-addresses are divided into more significant network- and lesssignificant hostbits” illustrates the separation.Figure 23.1. IPv4-addresses are divided into more significant network- and less significanthostbitsIn the above example, the network-address is (host-bits are set to 0 in network-addresses) and the hosts address is 15.99 on that network.How do you know that the hosts address is 16 bit wide? Well, this is assigned by the providerfrom which you get your network-addresses. In the classless inter-domain routing (CIDR) usedtoday, host fields are usually between as little as 2 to 16 bits wide, and the number of network-bits is written after the network address, separated by a “/”, e.g. tells that the
  23. 23. network in question has 16 network-bits. When talking about the “size” of a network, its usual toonly talk about it as “/16”, “/24”, etc.Before CIDR was used, there used to be four classes of networks. Each one starts with a certainbit-pattern identifying it. Here are the four classes:Class A starts with “0” as most significant bit. The next seven bits of a class A addressidentify the network, the remaining 24 bit can be used to address hosts. So, within oneclass A network there can be 224hosts. Its not very likely that you (or your university, orcompany, or whatever) will get a whole class A address.The CIDR notation for a class A network with its eight network bits is an “/8”.Class B starts with “10” as most significant bits. The next 14 bits are used for thenetworks address and the remaining 16 bits can be used to address more than 65000hosts. Class B addresses are very rarely given out today, they used to be common forcompanies and universities before IPv4 address space went scarce.The CIDR notation for a class B network with its 16 network bits is an “/16”.Returning to our above example, you can see that (or 0x84c70f63, whichis more appropriate here!) is on a class B network, as 0x84... = 1000... (base 2).Therefore, the address can be split into an network-address of a host-address of 15.99.Class C is identified by the MSBs being “110”, allowing only 256 (actually: only 254,see below) hosts on each of the 221possible class C networks. Class C addresses areusually found at (small) companies.The CIDR notation for a class C network with its 24 network bits is an “/24”.There are also other addresses, starting with “111”. Those are used for special purposes(e. g. multicast-addresses) and are not of interest here.Please note that the bits which are used for identifying the network-class are part of the network-address.When separating host-addresses from network-addresses, the “netmask” comes in handy. In thismask, all the network-bits are set to “1”, the host-bits are “0”. Thus, putting together IP-addressand netmask with a logical AND-function, the network-address remains.To continue our example, is a possible netmask for When applyingthis mask, the network-address remains.
  24. 24. For addresses in CIDR notation, the number of network-bits given also says how many of themost significant bits of the address must be set to “1” to get the netmask for the correspondingnetwork. For classful addressing, every network-class has a fixed default netmask assigned:Class A (/8): default-netmask:, first byte of address: 1-127Class B (/16): default-netmask:, first byte of address: 128-191Class C (/24): default-netmask:, first byte of address: 192-223Another thing to mention here is the “broadcast-address”. When sending to this address, all hostson the corresponding network will receive the message sent. The broadcast address ischaracterized by having all host-bits set to “1”.Taking with its netmask again, the broadcast-address would result in132.199.255.255.Youll ask now: But what if I want a hosts address to be all bits “0” or “1”? Well, this doesntwork, as network- and broadcast-address must be present! Because of this, a class B (/16)network can contain at most 216-2 hosts, a class C (/24) network can hold no more than 28-2 =254 hosts.Besides all those categories of addresses, theres the special IP-address which alwaysrefers to the “local” host, i.e. if you talk to youll talk to yourself without starting anynetwork-activity. This is sometimes useful to use services installed on your own machine or toplay around if you dont have other hosts to put on your network.Lets put together the things weve introduced in this section:IP-address32 bit-address, with network- and host-bits.Network-addressIP-address with all host bits set to “0”.Netmask32-bit mask with “1” for network- and “0” for host-bits.BroadcastIP-address with all host bits set “1”.localhosts addressThe local hosts IP address is always
  25. 25. 23.5. Subnetting and RoutingAfter talking so much about netmasks, network-, host- and other addresses, I have to admit thatthis is not the whole truth.Imagine the situation at your university, which usually has a class B (/16) address, allowing it tohave up to 216~= 65534 hosts on that net. Maybe it would be a nice thing to have all those hostson one single network, but its simply not possible due to limitations in the transport mediacommonly used today.For example, when using thinwire ethernet, the maximum length of the cable is 185 meters. Evenwith repeaters in between, which refresh the signals, this is not enough to cover all the locationswhere machines are located. Besides that, there is a maximum number of 1024 hosts on oneethernet wire, and youll lose quite a bit of performance if you go to this limit.So, are you hosed now? Having an address which allows more than 60000 hosts, but beingbound to media which allows far less than that limit?Well, of course not! :-)The idea is to divide the “big” class B net into several smaller networks, commonly called sub-networks or simply subnets. Those subnets are only allowed to have, say, 254 hosts on them (i.e.you divide one big class B network into several class C networks!).To do this, you adjust your netmask to have more network- and less host-bits on it. This isusually done on a byte-boundary, but youre not forced to do it there. So, commonly yournetmask will not be as supposed by a class B network, but it will be set to255.255.255.0.In CIDR notation, you now write a “/24” instead of the “/16” to show that 24 bits of the addressare used for identifying the network and subnet, instead of the 16 that were used before.This gives you one additional network-byte to assign to each (physical!) network. All the 254hosts on that subnet can now talk directly to each other, and you can build 256 such class C nets.This should fit your needs.To explain this better, lets continue our above example. Say our host (Ill call himdusk from now; well talk about assigning hostnames later) has a netmask of andthus is on the subnet Lets furthermore introduce some more hosts so we havesomething to play around with, see Figure 23.2, “Our demo-network”.Figure 23.2. Our demo-network
  26. 26. In the above network, dusk can talk directly to dawn, as they are both on the same subnet. (Thereare other hosts attached to the but they are not of importance for us now)But what if dusk wants to talk to a host on another subnet?Well, the traffic will then go through one or more gateways (routers), which are attached to twosubnets. Because of this, a router always has two different addresses, one for each of the subnetsit is on. The router is functionally transparent, i.e. you dont have to address it to reach hosts onthe “other” side. Instead, you address that host directly and the packets will be routed to itcorrectly.Example. Lets say dusk wants to get some files from the local ftp-server. As dusk cant reachftp directly (because its on a different subnet), all its packets will be forwarded to its"defaultrouter" rzi (, which knows where to forward the packets.Dusk knows the address of its defaultrouter in its network (rzi,, and it willforward any packets to it which are not on the same subnet, i.e. it will forward all IP-packets inwhich the third address-byte isnt 15.
  27. 27. The (default)router then gives the packets to the appropriate host, as its also on the FTP-serversnetwork.In this example, all packets are forwarded to the, simply because its thenetworks backbone, the most important part of the network, which carries all the traffic thatpasses between several subnets. Almost all other networks besides are attachedto the backbone in a similar manner.But what if we had hooked up another subnet to instead of something the situation displayed in Figure 23.3, “Attaching one subnet to another one”.Figure 23.3. Attaching one subnet to another oneWhen we now want to reach a host which is located in the from dusk, itwont work routing it to rzi, but youll have to send it directly to route2 ( Duskwill have to know to forward those packets to route2 and send all the others to rzi.When configuring dusk, you tell it to forward all packets for the toroute2, and all others to rzi. Instead of specifying this default as,, etc., can be used to set the default-route.Returning to Figure 23.2, “Our demo-network”, theres a similar problem when dawn wants tosend to noon, which is connected to dusk via a serial line running. When looking at the IP-addresses, noon seems to be attached to the, but it isnt really. Instead,dusk is used as gateway, and dawn will have to send its packets to dusk, which will forward
  28. 28. them to noon then. The way dusk is forced into accepting packets that arent destined at it but fora different host (noon) instead is called “proxy arp”.The same goes when hosts from other subnets want to send to noon. They have to send theirpackets to dusk (possibly routed via rzi),23.6. Name Service ConceptsIn the previous sections, when we talked about hosts, we referred to them by their IP-addresses.This was necessary to introduce the different kinds of addresses. When talking about hosts ingeneral, its more convenient to give them “names”, as we did when talking about routing.Most applications dont care whether you give them an IP address or a hostname. However,theyll use IP addresses internally, and there are several methods for them to map hostnames toIP addresses, each one with its own way of configuration. In this section well introduce the ideabehind each method, in the next chapter, well talk about the configuration-part.The mapping from hostnames (and domainnames) to IP-addresses is done by a piece of softwarecalled the “resolver”. This is not an extra service, but some library routines which are linked toevery application using networking-calls. The resolver will then try to resolve (hence the name ;-) the hostnames you give into IP addresses. See [RFC1034] and [RFC1035] for details on theresolver.Hostnames are usually up to 256 characters long, and contain letters, numbers and dashes (“-”);case is ignored.Just as with networks and subnets, its possible (and desirable) to group hosts into domains andsubdomains. When getting your network-address, you usually also obtain a domainname by yourprovider. As with subnets, its up to you to introduce subdomains. Other as with IP-addresses,(sub)domains are not directly related to (sub)nets; for example, one domain can contain hostsfrom several subnets.Figure 23.2, “Our demo-network” shows this: Both subnets and others) are part of the subdomain “rz.uni-regensburg.de”. The domain the University ofRegensburg got from its IP-provider is “uni-regensburg.de” (“.de” is for Deutschland,Germany), the subdomain “rz” is for Rechenzentrum, computing center.Hostnames, subdomain- and domainnames are separated by dots (“.”). Its also possible to usemore than one stage of subdomains, although this is not very common. An example would befox_in.socs.uts.edu.au.A hostname which includes the (sub)domain is also called a fully qualified domain name(FQDN). For example, the IP-address belongs to the host with the FQDNdusk.rz.uni-regensburg.de.
  29. 29. Further above I told you that the IP-address always belongs to the local host, regardlesswhats the “real” IP-address of the host. Therefore, is always mapped to the name“localhost”.The three different ways to translate hostnames into IP addresses are: /etc/hosts, the DomainName Service (DNS) and the Network Information Service (NIS).23.6.1. /etc/hostsThe first and simplest way to translate hostnames into IP-addresses is by using a table tellingwhich IP address belongs to which hostname(s). This table is stored in the file /etc/hosts andhas the following format:IP-address hostname [nickname [...]]Lines starting with a hash mark (“#”) are treated as comments. The other lines contain one IP-address and the corresponding hostname(s).Its not possible for a hostname to belong to several IP addresses, even if I made you think sowhen talking about routing. rzi for example has really two distinct names for each of its twoaddresses: rzi and rzia (but please dont ask me which name belongs to which address!).Giving a host several nicknames can be convenient if you want to specify your favorite hostproviding a special service with that name, as is commonly done with FTP-servers. The first(leftmost) name is usually the real (canonical) name of the host.Besides giving nicknames, its also convenient to give a hosts full name (including domain) asits canonical name, and using only its hostname (without domain) as a nickname.Important: There must be an entry mapping localhost to in /etc/hosts!23.6.2. Domain Name Service (DNS)/etc/hosts bears an inherent problem, especially in big networks: when one host is added orone hosts address changes, all the /etc/hosts files on all machines have to be changed! This isnot only time-consuming, its also very likely that there will be some errors and inconsistencies,leading to problems.Another approach is to hold only one hostnames-table (-database) for a network, and make allthe clients query that “nameserver”. Updates will be made only on the nameserver.This is the basic idea behind the Domain Name Service (DNS).Usually, theres one nameserver for each domain (hence DNS), and every host (client) in thatdomain knows which domain it is in and which nameserver to query for its domain.
  30. 30. When the DNS gets a query about a host which is not in its domain, it will forward the query to aDNS which is either the DNS of the domain in question or knows which DNS to ask for thespecified domain. If the DNS forwarded the query doesnt know how to handle it, it will forwardthat query again to a DNS one step higher. This is not ad infinitum, there are several “root”-servers, which know about any domain.See Chapter 26, The Domain Name System for details on DNS.23.6.3. Network Information Service (NIS/YP)Yellow Pages (YP) was invented by Sun Microsystems. The name has been changed intoNetwork Information Service (NIS) because YP was already a trademark of the British telecom.So, when Im talking about NIS youll know what I mean. ;-)There are quite some configuration files on a Unix-system, and often its desired to maintain onlyone set of those files for a couple of hosts. Those hosts are grouped together in a NIS-domain(which has nothing to do with the domains built by using DNS!) and are usually contained in oneworkstation cluster.Examples for the config-files shared among those hosts are /etc/passwd, /etc/group and - lastbut not least - /etc/hosts.So, you can “abuse” NIS for getting a unique name-to-address-translation on all hosts throughoutone (NIS-)domain.Theres only one drawback, which prevents NIS from actually being used for that translation: Incontrast to the DNS, NIS provides no way to resolve hostnames which are not in the hosts-table.Theres no hosts “one level up” which the NIS-server can query, and so the translation will fail!Suns NIS+ takes measures against that problem, but as NIS+ is only available on Solaris-systems, this is of little use for us now.Dont get me wrong: NIS is a fine thing for managing e.g. user-information (/etc/passwd, ...) inworkstation-clusters, its simply not too useful for resolving hostnames.23.6.4. OtherThe name resolving methods described above are whats used commonly today to resolvehostnames into IP addresses, but they arent the only ones. Basically, every database mechanismwould do, but none is implemented in NetBSD. Lets have a quick look what you may encounter.With NIS lacking hierarchy in data structures, NIS+ is intended to help out in that field. Tablescan be setup in a way so that if a query cannot be answered by a domains server, there can beanother domain “above” that might be able to do so. E.g. you could choose to have a domain thatlists all the hosts (users, groups, ...) that are valid in the whole company, one that defines thesame for each division, etc. NIS+ is not used a lot today, even Sun went back to ship back NISby default.
  31. 31. Last century, the X.500 standard was designed to accommodate both simple databases like/etc/hosts as well as complex, hierarchical systems as can be found e.g. in DNS today. X.500wasnt really a success, mostly due to the fact that it tried to do too much at the same time. A cut-down version is available today as the Lightweight Directory Access Protocol (LDAP), which isbecoming popular in the last years to manage data like users but also hosts and others in small tomedium sized organisations.23.7. Next generation Internet protocol - IPv623.7.1. The Future of the InternetAccording to experts, the Internet as we know it will face a serious problem in a few years. Dueto its rapid growth and the limitations in its design, there will be a point at which no more freeaddresses are available for connecting new hosts. At that point, no more new web servers can beset up, no more users can sign up for accounts at ISPs, no more new machines can be setup toaccess the web or participate in online games - some people may call this a serious problem.Several approaches have been made to solve the problem. A very popular one is to not assign aworldwide unique address to every users machine, but rather to assign them “private” addresses,and hide several machines behind one official, globally unique address. This approach is called“Network Address Translation” (NAT, also known as IP Masquerading). It has problems, as themachines hidden behind the global address cant be addressed, and as a result of this, openingconnections to them - which is used in online gaming, peer to peer networking, etc. - is notpossible. For a more in-depth discussion of the drawbacks of NAT, see [RFC3027].A different approach to the problem of internet addresses getting scarce is to abandon the oldInternet protocol with its limited addressing capabilities, and use a new protocol that does nothave these limitations. The protocol - or actually, a set of protocols - used by machinesconnected to form todays Internet is know as the TCP/IP (Transmission Control Protocol,Internet Protocol) suite, and version 4 currently in use has all the problems described above.Switching to a different protocol version that does not have these problems of course requires fora better version to be available, which actually is. Version 6 of the Internet Protocol (IPv6) doesfulfill any possible future demands on address space, and also addresses further features such asprivacy, encryption, and better support of mobile computing.Assuming a basic understanding of how todays IPv4 works, this text is intended as anintroduction to the IPv6 protocol. The changes in address formats and name resolution arecovered. With the background given here, Section 24.9, “IPv6 Connectivity & Transition via6to4” will show how to use IPv6 even if your ISP doesnt offer it by using a simple yet efficienttransition mechanism called 6to4. The goal is to get online with IPv6, giving exampleconfiguration for NetBSD.23.7.2. What good is IPv6?When telling people to migrate from IPv4 to IPv6, the question you usually hear is “why?”.There are actually a few good reasons to move to the new version:
  32. 32. Bigger address spaceSupport for mobile devicesBuilt-in security23.7.2.1. Bigger Address SpaceThe bigger address space that IPv6 offers is the most obvious enhancement it has over IPv4.While todays internet architecture is based on 32-bit wide addresses, the new version has 128 bitavailable for addressing. Thanks to the enlarged address space, work-arounds like NAT donthave to be used any more. This allows full, unconstrained IP connectivity for todays IP basedmachines as well as upcoming mobile devices like PDAs and cell phones will benefit from fullIP access through GPRS and UMTS. MobilityWhen mentioning mobile devices and IP, another important point to note is that some specialprotocol is needed to support mobility, and implementing this protocol - called “Mobile IP” - isone of the requirements for every IPv6 stack. Thus, if you have IPv6 going, you have support forroaming between different networks, with everyone being updated when you leave one networkand enter the other one. Support for roaming is possible with IPv4 too, but there are a number ofhoops that need to be jumped in order to get things working. With IPv6, theres no need for this,as support for mobility was one of the design requirements for IPv6. See [RFC3024] for somemore information on the issues that need to be addressed with Mobile IP on IPv4. SecurityBesides support for mobility, security was another requirement for the successor to todaysInternet Protocol version. As a result, IPv6 protocol stacks are required to include IPsec. IPsecallows authentication, encryption and compression of any IP traffic. Unlike application levelprotocols like SSL or SSH, all IP traffic between two nodes can be handled, without adjustingany applications. The benefit of this is that all applications on a machine can benefit fromencryption and authentication, and that policies can be set on a per-host (or even per-network)base, not per application/service. An introduction to IPsec with a roadmap to the documentationcan be found in [RFC2411], the core protocol is described in [RFC2401].23.7.3. Changes to IPv4After giving a brief overview of all the important features of IPv6, well go into the details of thebasics of IPv6 here. A brief understanding of how IPv4 works is assumed, and the changes inIPv6 will be highlighted. Starting with IPv6 addresses and how theyre split up well go into thevarious types of addresses there are, what became of broadcasts, then after discussing the IPlayer go into changes for name resolving and whats new in DNS for IPv6. Addressing
  33. 33. An IPv4 address is a 32 bit value, thats usually written in “dotted quad” representation, whereeach “quad” represents a byte value between 0 and 255, for example: allows a theoretical number of 232or ~4 billion hosts to be connected on the internet today.Due to grouping, not all addresses are available today.IPv6 addresses use 128 bit, which results in 2128theoretically addressable hosts. This allows for aReally Big number of machines to addressed, and it sure fits all of todays requirements plus allthose nifty PDAs and cell phones with IP phones in the near future without any sweat. Whenwriting IPv6 addresses, they are usually divided into groups of 16 bits written as four hex digits,and the groups are separated by colons. An example is:fe80::2a0:d2ff:fea5:e9f5This shows a special thing - a number of consecutive zeros can be abbreviated by a single “::”once in the IPv6 address. The above address is thus equivalent tofe80:0:00:000:2a0:d2ff:fea5:e9f5 - leading zeros within groups can be omitted, and only one “::”can be used in an IPv6 address.To make addresses manageable, they are split in two parts, which are the bits identifying thenetwork a machine is on, and the bits that identify a machine on a (sub)network. The bits areknown as netbits and hostbits, and in both IPv4 and IPv6, the netbits are the “left”, mostsignificant bits of an IP address, and the host bits are the “right”, least significant bits, as shownin Figure 23.4, “IPv6-addresses are divided into more significant network- and less significanthostbits, too”.Figure 23.4. IPv6-addresses are divided into more significant network- and less significanthostbits, tooIn IPv4, the border is drawn with the aid of the netmask, which can be used to mask all net/hostbits. Typical examples are that uses 16 bit for addressing the network, and 16 bit forthe machine, or which takes another 8 bit to allow addressing 256 subnets on e.g.a class B net.When addressing switched from classful addressing to CIDR routing, the borders between netand host bits stopped being on 8 bit boundaries, and as a result the netmasks started looking uglyand not really manageable. As a replacement, the number of network bits is used for a givenaddress, to denote the border, e.g.
  34. 34. the same as a netmask of (24 1-bits). The same scheme is used in IPv6:2001:638:a01:2::/64tells us that the address used here has the first (leftmost) 64 bits used as the network address, andthe last (rightmost) 64 bits are used to identify the machine on the network. The network bits arecommonly referred to as (network) “prefix”, and the “prefixlen” here would be 64 bits.Common addressing schemes found in IPv4 are the (old) class B and class C nets. With a class Cnetwork (/24), you get 24 bits assigned by your provider, and it leaves 8 bits to be assigned byyou. If you want to add any subnetting to that, you end up with “uneven” netmasks that are a bitnifty to deal with. Easier for such cases are class B networks (/16), which only have 16 bitsassigned by the provider, and that allow subnetting, i.e. splitting of the rightmost bits into twoparts. One to address the on-site subnet, and one to address the hosts on that subnet. Usually, thisis done on byte (8 bit) boundaries. Using a netmask of (or a /24 prefix) allowsflexible management even of bigger networks here. Of course there is the upper limit of 254machines per subnet, and 256 subnets.With 128 bits available for addressing in IPv6, the scheme commonly used is the same, only thefields are wider. Providers usually assign /48 networks, which leaves 16 bits for a subnetting and64 hostbits.Figure 23.5. IPv6-addresses have a similar structure to class B addressesNow while the space for network and subnets here is pretty much ok, using 64 bits for addressinghosts seems like a waste. Its unlikely that you will want to have several billion hosts on a singlesubnet, so what is the idea behind this?
  35. 35. The idea behind fixed width 64 bit wide host identifiers is that they arent assigned manually asits usually done for IPv4 nowadays. Instead, IPv6 host addresses are recommended (notmandatory!) to be built from so-called EUI64 addresses. EUI64 addresses are - as the name says- 64 bit wide, and derived from MAC addresses of the underlying network interface. E.g. forethernet, the 6 byte (48 bit) MAC address is usually filled with the hex bits “fffe” in the middleand a bit is set to mark the address as unique (which is true for Ethernet), e.g. the MAC address01:23:45:67:89:abresults in the EUI64 address03:23:45:ff:fe:67:89:abwhich again gives the host bits for the IPv6 address as::0323:45ff:fe67:89abThese host bits can now be used to automatically assign IPv6 addresses to hosts, which supportsautoconfiguration of IPv6 hosts - all thats needed to get a complete IPv6 address is the first(net/subnet) bits, and IPv6 also offers a solution to assign them automatically.When on a network of machines speaking IP, theres usually one router which acts as thegateway to outside networks. In IPv6 land, this router will send “router advertisement”information, which clients are expected to either receive during operation or to solicit uponsystem startup. The router advertisement information includes data on the routers address, andwhich address prefix it routes. With this information and the host-generated EUI64 address, anIPv6-host can calculate its IP address, and there is no need for manual address assignment. Ofcourse routers still need some configuration.The router advertisement information they create are part of the Neighbor Discovery Protocol(NDP, see [RFC2461]), which is the successor to IPv4s ARP protocol. In contrast to ARP, NDPdoes not only do lookup of IPv6 addresses for MAC addresses (the neighborsolicitation/advertisement part), but also does a similar service for routers and the prefixes theyserve, which is used for autoconfiguration of IPv6 hosts as described in the previous paragraph. Multiple AddressesIn IPv4, a host usually has one IP address per network interface or even per machine if the IPstack supports it. Only very rare applications like web servers result in machines having morethan one IP address. In IPv6, this is different. For each interface, there is not only a globallyunique IP address, but there are two other addresses that are of interest: The link local address,and the site local address. The link local address has a prefix of fe80::/64, and the host bits arebuilt from the interfaces EUI64 address. The link local address is used for contacting hosts androuters on the same network only, the addresses are not visible or reachable from differentsubnets. If wanted, theres the choice of either using global addresses (as assigned by a provider),or using site local addresses. Site local addresses are assigned the network address fec0::/10, and
  36. 36. subnets and hosts can be addressed just as for provider-assigned networks. The only differenceis, that the addresses will not be visible to outside machines, as these are on a different network,and their “site local” addresses are in a different physical net (if assigned at all). As with the 10/8network in IPv4, site local addresses can be used, but dont have to. For IPv6 its most commonto have hosts assigned a link-local and a global IP address. Site local addresses are ratheruncommon today, and are no substitute for globally unique addresses if global connectivity isrequired. MulticastingIn IP land, there are three ways to talk to a host: unicast, broadcast and multicast. The mostcommon one is by talking to it directly, using its unicast address. In IPv4, the unicast address isthe “normal” IP address assigned to a single host, with all address bits assigned. The broadcastaddress used to address all hosts in the same IP subnet has the network bits set to the networkaddress, and all host bits set to “1” (which can be easily done using the netmask and some bitoperations). Multicast addresses are used to reach a number of hosts in the same multicast group,which can be machines spread over the whole internet. Machines must join multicast groupsexplicitly to participate, and there are special IPv4 addresses used for multicast addresses,allocated from the 224/8 subnet. Multicast isnt used very much in IPv4, and only fewapplications like the MBone audio and video broadcast utilities use it.In IPv6, unicast addresses are used the same as in IPv4, no surprise there - all the network andhost bits are assigned to identify the target network and machine. Broadcasts are no longeravailable in IPv6 in the way they were in IPv4, this is where multicasting comes into play.Addresses in the ff::/8 network are reserved for multicast applications, and there are two specialmulticast addresses that supersede the broadcast addresses from IPv4. One is the “all routers”multicast address, the others is for “all hosts”. The addresses are specific to the subnet, i.e. arouter connected to two different subnets can address all hosts/routers on any of the subnets itsconnected to. Addresses here are:ff0X::1 for all hosts andff0X::2 for all routers,where “X” is the scope ID of the link here, identifying the network. Usually this starts from “1”for the “node local” scope, “2” for the first link, etc. Note that its perfectly ok for two networkinterfaces to be attached to one link, thus resulting in double bandwidth:Figure 23.6. Several interfaces attached to a link result in only one scope ID for the link
  37. 37. One use of the “all hosts” multicast is in the neighbor solicitation code of NDP, where anymachine that wants to communicate with another machine sends out a request to the “all hosts”group, and the machine in question is expected to respond. Name Resolving in IPv6After talking a lot about addressing in IPv6, anyone still here will hope that theres a proper wayto abstract all these long & ugly IPv6 addresses with some nice hostnames as one can do in IPv4,and of course there is.Hostname to IP address resolving in IPv4 is usually done in one of three ways: using a simpletable in /etc/hosts, by using the Network Information Service (NIS, formerly YP) or via theDomain Name System (DNS).As of this writing, NIS/NIS+ over IPv6 is currently only available on Solaris 8, for both databasecontents and transport, using a RPC extension.Having a simple address<->name map like /etc/hosts is supported in all IPv6 stacks. With theKAME implementation used in NetBSD, /etc/hosts contains IPv6 addresses as well as IPv4addresses. A simple example is the “localhost” entry in the default NetBSD installation: localhost::1 localhostFor DNS, there are no fundamentally new concepts. IPv6 name resolving is done with AAAArecords that - as the name implies - point to an entity thats four times the size of an A record.The AAAA record takes a hostname on the left side, just as A does, and on the right side theresan IPv6 address, e.g.noon IN AAAA 3ffe:400:430:2:240:95ff:fe40:4385For reverse resolving, IPv4 uses the in-addr.arpa zone, and below that it writes the bytes (indecimal) in reversed order, i.e. more significant bytes are more right. For IPv6 this is similar,only that hex digits representing 4 bits are used instead of decimal numbers, and the resourcerecords are also under a different domain, ip6.int.So to have the reverse resolving for the above host, you would put into your /etc/named.confsomething like:zone "" {type master;file "db.reverse";};and in the zone file db.reverse you put (besides the usual records like SOA and NS):
  38. 38. IN PTR noon.ipv6.example.com.The address is reversed here, and written down one hex digit after the other, starting with theleast significant (rightmost) one, separating the hex digits with dots, as usual in zone files.One thing to note when setting up DNS for IPv6 is to take care of the DNS software version inuse. BIND 8.x does understand AAAA records, but it does not offer name resolving via IPv6.You need BIND 9.x for that. Beyond that, BIND 9.x supports a number of resource records thatare currently being discussed but not officially introduced yet. The most noticeable one here isthe A6 record which allows easier provider/prefix changing.To sum up, this section talked about the technical differences between IPv4 and IPv6 foraddressing and name resolving. Some details like IP header options, QoS and flows weredeliberately left out to not make this document more complex than necessary.