This document contains information about various network protocols including:
- Address Resolution Protocol (ARP) which resolves IP addresses to MAC addresses and vice versa
- Internet Control Message Protocol (ICMP) which is used to send error messages and network information
- User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) which are transport layer protocols
- Congestion control algorithms used by TCP like slow start, congestion avoidance, and fast retransmit
- Stream Control Transmission Protocol (SCTP) which supports multihoming and independent data streams
The presentation addresses the most typical issues during network software development and testing, explains the causes and suggests solutions:
- overlapping IP networks
- invalid netmasks
- incomplete routing configuration
- incorrect local MAC addresses
- unidirectional packet generator and unicast flood
- disabled ethernet auto negotiation
SOSCON 2019.10.17
What are the methods for packet processing on Linux? And how fast are each packet processing methods? In this presentation, we will learn how to handle packets on Linux (User space, socket filter, netfilter, tc), and compare performance with analysis of where each packet processing is done in the network stack (hook point). Also, we will discuss packet processing using XDP, an in-kernel fast-path recently added to the Linux kernel. eXpress Data Path (XDP) is a high-performance programmable network data-path within the Linux kernel. The XDP is located at the lowest level of access through SW in the network stack, the point at which driver receives the packet. By using the eBPF infrastructure at this hook point, the network stack can be expanded without modifying the kernel.
Daniel T. Lee (Hoyeon Lee)
@danieltimlee
Daniel T. Lee currently works as Software Engineer at Kosslab and contributing to Linux kernel BPF project. He has interest in cloud, Linux networking, and tracing technologies, and likes to analyze the kernel's internal using BPF technology.
Handy Networking Tools and How to Use ThemSneha Inguva
When I joined the networking team at DigitalOcean a few years ago, I dove into an entirely different world of software-defined networking in the data center. Virtual switches, networking protocols — these were concepts that I had encountered at the surface level before — but now I frequently found myself debugging them. With time, I came to rely on a variety of Linux networking tools for introspecting, troubleshooting, and examining network state. In this talk, I’ll share some of my favorite Linux networking tools and discuss scenarios in which they are quite helpful.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
Many applications are network I/O bound, including common database-based applications and service-based architectures. But operating systems and applications are often untuned to deliver high performance. This session uncovers hidden issues that lead to low network performance, and shows you how to overcome them to obtain the best network performance possible.
NAT and firewall presentation - how setup a nice firewallCassiano Campes
This is a presentation I did during my internship @ PARKS in 2014. It shows how to configure NAT & firewall rules using IPTABLES.
I hope this can be useful to somebody in the future.
Slides supporting the "Computer Networking: Principles, Protocols and Practice" ebook. The slides can be freely reused to teach an undergraduate computer networking class using the open-source ebook.
The presentation addresses the most typical issues during network software development and testing, explains the causes and suggests solutions:
- overlapping IP networks
- invalid netmasks
- incomplete routing configuration
- incorrect local MAC addresses
- unidirectional packet generator and unicast flood
- disabled ethernet auto negotiation
SOSCON 2019.10.17
What are the methods for packet processing on Linux? And how fast are each packet processing methods? In this presentation, we will learn how to handle packets on Linux (User space, socket filter, netfilter, tc), and compare performance with analysis of where each packet processing is done in the network stack (hook point). Also, we will discuss packet processing using XDP, an in-kernel fast-path recently added to the Linux kernel. eXpress Data Path (XDP) is a high-performance programmable network data-path within the Linux kernel. The XDP is located at the lowest level of access through SW in the network stack, the point at which driver receives the packet. By using the eBPF infrastructure at this hook point, the network stack can be expanded without modifying the kernel.
Daniel T. Lee (Hoyeon Lee)
@danieltimlee
Daniel T. Lee currently works as Software Engineer at Kosslab and contributing to Linux kernel BPF project. He has interest in cloud, Linux networking, and tracing technologies, and likes to analyze the kernel's internal using BPF technology.
Handy Networking Tools and How to Use ThemSneha Inguva
When I joined the networking team at DigitalOcean a few years ago, I dove into an entirely different world of software-defined networking in the data center. Virtual switches, networking protocols — these were concepts that I had encountered at the surface level before — but now I frequently found myself debugging them. With time, I came to rely on a variety of Linux networking tools for introspecting, troubleshooting, and examining network state. In this talk, I’ll share some of my favorite Linux networking tools and discuss scenarios in which they are quite helpful.
Linux offers an extensive selection of programmable and configurable networking components from traditional bridges, encryption, to container optimized layer 2/3 devices, link aggregation, tunneling, several classification and filtering languages all the way up to full SDN components. This talk will provide an overview of many Linux networking components covering the Linux bridge, IPVLAN, MACVLAN, MACVTAP, Bonding/Team, OVS, classification & queueing, tunnel types, hidden routing tricks, IPSec, VTI, VRF and many others.
Many applications are network I/O bound, including common database-based applications and service-based architectures. But operating systems and applications are often untuned to deliver high performance. This session uncovers hidden issues that lead to low network performance, and shows you how to overcome them to obtain the best network performance possible.
NAT and firewall presentation - how setup a nice firewallCassiano Campes
This is a presentation I did during my internship @ PARKS in 2014. It shows how to configure NAT & firewall rules using IPTABLES.
I hope this can be useful to somebody in the future.
Slides supporting the "Computer Networking: Principles, Protocols and Practice" ebook. The slides can be freely reused to teach an undergraduate computer networking class using the open-source ebook.
Отзиви от курсовете ни в IMG IT Academy - Пловдив (Софтуерни курсове и графич...IMG IT Academy
Ето няколко отзива, които успяхме да измъкнем след края на курсовете ни в IMG IT Academy - Пловдив. http://www.img-academy.com/
"IMG ИТ Академия Пловдив" организира и провежда най-търсените в областта на информационните технологии компютърни курсове: Web дизайн (HTML и CSS, Wordpress, Joomla, OpenCart), Курсове за програмисти - Web програмиране (PhP и MySQL, Java, C) , Photoshop курсове, Quality Assurance, SEO Оптимизация, SMM и др. В програмата ние наблягаме на софтуерни технологии, програмиране, уеб дизайн и UI технологии. Виж още на http://www.img-academy.com/
Overview of UDP protocol.
UDP (User Datagram Protocol) is a simple extension of the Internet Protocol services. It basically provides simple packet transport service without any quality of service functions.
Unlike TCP, UDP is connection-less and packet-based. Application PDUs (application packets) sent over a UDP socket are delivered to the receiving host application as is without fragmentation.
UDP is mostly used by applications with simple request-response communication patterns like DNS, DHCP, RADIUS, RIP or RPC.
Since UDP does provide any error recovery such as retransmission of lost packets, the application protocols have to take care of these situations.
A short but packed course on TCP Dynamic Behavior. It starts by explaining TCP from scratch so the dynamic parts can be understood. Then it dives deep into how TCP behaves in real IP networks in the face of packet losses, delays and other phenomena.
Reconsider TCPdump for Modern TroubleshootingAvi Networks
Are you tired of troubleshooting with TCPdump? The Avi Vantage Platform is here to help. Learn how you can reconsider your decades-old CPU-intensive logging tools – and gain intuitive, real-time analytics, faster time-to-resolution, modern SSL / TLS encryption, and (most importantly) happy IT teams focused on delivering applications.
Watch this Avi webinar to learn:
- Why TCPdump should be your tool of last resort
- How headers compressed with HTTP/2, PFS, and distributed systems have rendered certain tools useless
- How you can replace TCPdump with intelligent logs and analytics
- How to future proof your troubleshooting tools with HTTP/3, TLS 1.3, containers and Kubernetes
Watch on-demand here https://www.networkworld.com/resources/form?placement_id=de4979d3-4f46-498e-8285-2bdad91ca3fb&brand_id=512
Abandon Decades-Old TCPdump for Modern TroubleshootingAvi Networks
Are you tired of troubleshooting with TCPdump? The Avi Vantage Platform is here to help. Learn how you can abandon your decades-old CPU-intensive logging tools – and gain intuitive, real-time analytics, faster time-to-resolution, modern SSL encryption, and (most importantly) happy IT teams focused on delivering applications.
Watch this Avi webinar to #ByeByeTCPdump forever and learn:
- Why TCPdump should be your tool of last resort
- How headers compressed with HTTP/2, SSL leveraging PFS, and distributed systems have rendered certain tools useless
- How automation and visibility can help you troubleshoot more quickly
- How you can replace TCPdump with intelligent logs and analytics
Watch the full webinar: https://info.avinetworks.com/webinars-avi-tech-corner-episode-1
Many applications are network I/O bound, including common database-based applications and service-based architectures. But operating systems and applications are often untuned to deliver high performance. This session uncovers hidden issues that lead to low network performance, and shows you how to overcome them to obtain the best network performance possible.
This gives an overall idea about wireshark design and how to capture packets using wireshark, tcpdump and tshark. It also covers basics behind measuring network performance and tools to use such as bmon and iperf.
How to implement PassKeys in your applicationMarian Marinov
PassKeys is relatively new way of authentication. This presentation aims to provide a bit of guidance on how you can implement them in your own application.
Management of system administrators and devops teams is different then managing Developers.
This presentation shows key differences and what to worry about :)
MySQL security is not trivial. This presentation will walk you trough some of the more important decisions you have to take, when configuring a MySQL server instance
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
1. 7 – Protocols7 – Protocols
Marian MarinovMarian Marinov
CEO of 1H Ltd.CEO of 1H Ltd.
mm@1h.commm@1h.com
Borislav VaradinovBorislav Varadinov
System AdministratorSystem Administrator
bobi [ at ] itp.bgbobi [ at ] itp.bg
7. Address Resolution Protocol
● Address resolution
– Forward (what is the MAC of this machine)
08:11:96:03:B2:2808:11:96:03:B2:28
FF:FF:FF:FF:FF:FFFF:FF:FF:FF:FF:FF
192.168.2.254192.168.2.254
192.168.2.58192.168.2.58
Request
0x08000x0800
1 - req1 - req 2 - reply2 - reply
8. Address Resolution Protocol
● Address resolution
– Forward (what is the MAC of this machine)
40:b3:95:80:c5:aa40:b3:95:80:c5:aa
08:11:96:03:b2:2808:11:96:03:b2:28
192.168.2.58192.168.2.58
192.168.2.254192.168.2.254
Reply
9. Address Resolution Protocol
● Address resolution
– Reverse (what is the IP of this machine)
08:11:96:03:B2:2808:11:96:03:B2:28
40:b3:95:80:c5:aa40:b3:95:80:c5:aa
192.168.2.254192.168.2.254
0.0.0.00.0.0.0
Request
10. Address Resolution Protocol
● Address resolution
– Reverse (what is the IP of this machine)
40:b3:95:80:c5:aa40:b3:95:80:c5:aa
08:11:96:03:B2:2808:11:96:03:B2:28
192.168.2.58192.168.2.58
192.168.2.254192.168.2.254
Reply
20. Transmission Datagram Protocol -TCP
● TCP (RFC793 Jon Postel 1981)
– Session establishment and tear-down
– Window procedure
– Slow start and congestion avoidance (Van
Jacobson 1988)
– Fast open
– Syn cookies
22. Transmission Datagram Protocol -TCP
Flags: ACK
Flags: SYN, ACK
Seq: Y, Ack: X+1
Flags: SYN, ACK
Flags: SYN Seq: X
Seq: X + 1, Ack: Y+1
Client Server
Three way handshake
SYN RCVD
Server
Established
SYN SENT
Established
25. Transmission Datagram Protocol -TCP
Flags: ACK
Flags: FIN, ACK
Seq: Y, Ack: X+1
Flags: FIN Seq: X
Seq: X + 1, Ack: Y+1
Client Server
Connection Close
FIN WAIT 1
CLOSE WAIT
FIN WAIT 2 LAST ACK
TIME WAIT
CLOSE
27. TCP Congestion
➢ Slow start
➢ Congestion avoidance
➢ Fast retransmit
➢ Fast Recovery
28. TCP Congestion – Slow start
➢ The initial window size is initialized to one MSS
➢ Each time a packet is ACKed the congestion window i
increased
➢ When the ssthresh is reached, the next phase starts
http://en.wikipedia.org/wiki/Slow-starthttp://en.wikipedia.org/wiki/Slow-start
29. TCP Congestion –
Congestion avoidance
➢ In this phase window size is increased linearly until
timeout occurs or duplicate ACK is received
30. TCP Congestion – Fast retransmit
➢ If more then 3 ACKs are received for the same segmen
the sender has to send that particular segment even be
its timer has expired
http://en.wikipedia.org/wiki/Fast_retransmithttp://en.wikipedia.org/wiki/Fast_retransmit
31. TCP Congestion – Fast Recovery
➢ In this phase window size is decreased to ssthresh rat
then the smaller initial value and increase its size line
http://histrory.visualland.net/tcp_fast_recovery.htmlhttp://histrory.visualland.net/tcp_fast_recovery.html
32. TCP Congestion Avoidance - Problems
➢ Slow-start assumes that unacknowledged segments a
due to network congestion, which is usually NOT the c
in wireless networks, where dropped packets are main
because of poor data link quality.
➢ The slow-start protocol performs badly for short-lived
connections, because it actually slows down the
transmission of data.
➢ It is possible to trick the congestion avoidance algorit
to think that the pipe is full and slow down all connect
originating from that machine.
33. TCP Keepalive
➢ The keepalive packets are packets which contain no d
sent at regular interval to confirm that this connection
alive
➢ Keepalive time is the duration between two keepalive
transmissions in idle condition. TCP keepalive period
required to be configurable and by default is set to no
than 2 hours.
➢ Keepalive interval is the duration between two succe
keepalive retransmissions, if acknowledgement to the
previous keepalive transmission is not received. Usual
around 75 seconds.
➢ Keepalive retry is the number of retransmissions to b
sent out before declaring that remote end is not availa
34. Datagram Congestion Control Protocol
➢ Basically DCCP is UDP with congestion control mechan
It features
➢ Unreliable flows of datagrams
➢ Reliable handshakes for connection setup and teardow
➢ Negotiation of a suitable congestion control mechanism
➢ Acknowledgment mechanisms communicating packet lo
➢ Path Maximum Transmission Unit (PMTU) discovery
➢ RFC4340
35. DCCP header (x = 1)
0 1 2 30 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port | Dest Port || Source Port | Dest Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data Offset | CCVal | CsCov | Checksum || Data Offset | CCVal | CsCov | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | |X| | .| | |X| | .
| Res | Type |=| Reserved | Sequence Number (high bits) .| Res | Type |=| Reserved | Sequence Number (high bits) .
| | |1| | .| | |1| | .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. Sequence Number (low bits) |. Sequence Number (low bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
If X is 1 the Sequence Number field is 48 bits longIf X is 1 the Sequence Number field is 48 bits long
36. DCCP header (x = 0)
0 1 2 30 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port | Dest Port || Source Port | Dest Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data Offset | CCVal | CsCov | Checksum || Data Offset | CCVal | CsCov | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | |X| || | |X| |
| Res | Type |=| Sequence Number (low bits) || Res | Type |=| Sequence Number (low bits) |
| | |0| || | |0| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
If X is 0 the Sequence Number field is 24 bits longIf X is 0 the Sequence Number field is 24 bits long
Data Offset - the offset from the start of the packet's DCCP header to thData Offset - the offset from the start of the packet's DCCP header to th
start of its application data areastart of its application data area
CCVal - Defines the congestion control algorithm usedCCVal - Defines the congestion control algorithm used
CCVal = 2 - TCP like congestion avoidanceCCVal = 2 - TCP like congestion avoidance
CCVal = 3 - TCP friendly congestion avoidanceCCVal = 3 - TCP friendly congestion avoidance
CsCov - Checksum Coverage determines the parts of the packet that areCsCov - Checksum Coverage determines the parts of the packet that are
covered by the Checksum field.covered by the Checksum field.
Checksum – DCCP header checksumChecksum – DCCP header checksum
Type – DCCP packet typeType – DCCP packet type
X - Extended Sequence Numbers (may be 0 or 1)X - Extended Sequence Numbers (may be 0 or 1)
37. DCCP header
All currently defined packet types except DCCP-Request and DCCP-DataAll currently defined packet types except DCCP-Request and DCCP-Data
carry an Acknowledgment Number Subheadercarry an Acknowledgment Number Subheader
When X=1, its format is:When X=1, its format is:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved | Acknowledgment Number .| Reserved | Acknowledgment Number .
| | (high bits) .| | (high bits) .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. Acknowledgment Number (low bits) |. Acknowledgment Number (low bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
When X=0, only the low 24 bits of the Acknowledgment Number areWhen X=0, only the low 24 bits of the Acknowledgment Number are
transmitted, giving the Acknowledgment Number Subheader this format:transmitted, giving the Acknowledgment Number Subheader this format:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved | Acknowledgment Number (low bits) || Reserved | Acknowledgment Number (low bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
40. Stream ControlTransmission Protocol
➢ Multihoming support in which one or both endpoints of aMultihoming support in which one or both endpoints of a
connection can consist of more than one IP address,connection can consist of more than one IP address,
enabling transparent fail-over between redundant networkenabling transparent fail-over between redundant network
paths.paths.
➢ Delivery of chunks within independent streams eliminateDelivery of chunks within independent streams eliminate
unnecessary head-of-line blockingunnecessary head-of-line blocking
➢ Path selection and monitoringPath selection and monitoring
➢ Validation and acknowledgment mechanisms protectValidation and acknowledgment mechanisms protect
against flooding attacks and provide notification ofagainst flooding attacks and provide notification of
duplicated or missing data chunks.duplicated or missing data chunks.
➢ Improved error detection suitable for Ethernet jumboImproved error detection suitable for Ethernet jumbo
frames.frames.
43. IP & Domain allocation
➢ IANA – www.iana.org
➢ Number resources
➢ IP Addresses
➢ Autonomous System (AS)
➢ Protocol number assignments
➢ Domain assignments
➢ Root zone management
➢ gTLD database
➢ .int and .arpa domains
➢ IP registrars
➢ ARIN, LACNIC, Africa, APNIC, RIPE
44. IP & Domain allocation
➢ Regional Internet Registrar(RIR)
➢ Local Internet Registrar(LIR)
➢ There are two types of IP addresses that can be reques
➢ Provider dependent
➢ These you get from your ISP
➢ Provider independent
➢ You get them from the local LIR or the regional RIR
➢ These allocations can not be smaller then /24 networ
➢ Autonomous System (AS)
➢ Used for the BGP routing protocol
➢ Aggregated IP route announcements are made from a
to them
➢ The corner stone of the Internet routing
➢ Look at http://www.youtube.com/watch?v=oK-lgjJhC4
45. Domain Name System - DNS
Everything was 'hosts':Everything was 'hosts':
127.0.0.1127.0.0.1 localhostlocalhost
192.168.0.174192.168.0.174 store1store1
192.168.0.238192.168.0.238 store2store2
192.168.0.244192.168.0.244 store3store3
192.168.155.2192.168.155.2 operationsoperations
192.168.155.149192.168.155.149 zimbra0.siteground.comzimbra0.siteground.com
193.107.36.190193.107.36.190 sapport.bgsapport.bg www.sapport.bgwww.sapport.bg
8.8.8.88.8.8.8 ns.google.comns.google.com
89.25.120.3189.25.120.31 google.comgoogle.com
89.25.120.2489.25.120.24 www.google.comwww.google.com
Linux: /etc/hostsLinux: /etc/hosts
Windows: C:WindowsSystem32driversetchostsWindows: C:WindowsSystem32driversetchosts
46.
47. DNS
➢ Internet Corporation For Assigned Names and Numbe
➢ IANA is now part of it
➢ Handles ccTLDs
➢ Handles gTLDs
➢ Handles the Root zone
➢ Country level domains
➢ .bg, .co.za, .co.uk, .edu.us
➢ Top-level domains
➢ .com, .net, .org, .edu, .gov, .mil
➢ .biz, .name, .info
➢ Instances of J and L root servers are hosted in Sofia
49. DNS
➢ Internet Corporation For Assigned Names and Numbe
➢ IANA is now part of it
➢ Handles ccTLDs
➢ Handles gTLDs
➢ Handles the Root zone
➢ Internationalized domain name (IDN)
➢ Domain names are encoded using Punycode
➢ .ru = .рф
➢ We are expecting soon .bg = .бг
➢ Country level domains
➢ .bg, .co.za, .co.uk, .edu.us
➢ Top-level domains
➢ .com, .net, .org, .edu, .gov, .mil
➢ .biz, .name, .info
50. DNS➢ Name servers
➢ Authoritative only
➢ Recursive
➢ Authoritative + recursive
➢ .in-addr.arpa
➢ .ip6.arpa
52. DNS - Resolving
➢ Forward resolving
➢ Host/FQDN to IP
➢ Reverse resolving
➢ IP to Host
➢ Reverse resolver delegation
➢ RIR -> LIR -> Local ISP -> YOU
54. DNS Resource records
TYPE value and meaning
A 1 a host address
NS 2 an authoritative name server
CNAME 5 the canonical name for an alias
SOA 6 start of a zone of authority
WKS 11 a well known service description
PTR 12 a domain name pointer
HINFO 13 host information
MINFO 14 mailbox or mail list information
MX 15 mail exchange
TXT 16 text strings
AXFR 252 A request for a transfer of an
entire zone
RFC1035
55. DNS Resource records
kar-do.cc. 86400 IN SOA ns1.ex1.com.
mm.yuhu.biz. (
2013013106 ;Serial Number
86400 ;refresh
7200 ;retry
3600000 ;expire
86400 ;minimum
)
kar-do.cc. IN NS ns1.ex1.com.
kar-do.cc. IN NS ns2.ex1.com.
kar-do.cc. IN A 134.154.23.12
localhost IN A 127.0.0.1
kar-do.cc. IN MX 0 mail.kar-do.cc.
mail IN CNAME mail.yuhu.biz.
www IN A 134.154.23.12
www IN A 134.142.65.81
kar-do.cc. IN TXT
"v=spf1 +a +mx +ip4:134.154.23.12 ?all"
57. Send
Mail
Transport
Protocol
-
SMTP
S: 220 smtp.example.com ESMTP Postfix
C: HELO relay.example.org
S: 250 Hello relay.example.org, I am glad to meet you
C: MAIL FROM:<bob@example.org>
S: 250 Ok
C: RCPT TO:<alice@example.com>
S: 250 Ok
C: RCPT TO:<theboss@example.com>
S: 250 Ok
C: DATA
S: 354 End data with <CR><LF>.<CR><LF>
C: From: "Bob Example" <bob@example.org>
C: To: "Alice Example" <alice@example.com>
C: Cc: theboss@example.com
C: Date: Tue, 15 January 2008 16:02:43 -0500
C: Subject: Test message
C:
C: Hello Alice.
C: This is a test message with 5 header fields and 4 lines in the message body.
C: Your friend,
C: Bob
C: .
S: 250 Ok: queued as 12345
C: QUIT
58. HTTP
➢ In this phase window size is increased linearly until
timeout occurs or duplicate ACK is received