SlideShare a Scribd company logo
1 of 1
Download to read offline
Experiment SetupExperiment Setup Pathtrace Packet FormatPathtrace Packet Format
Pathtrace
Nicholas Bastin, Long Tran, and Deniz Gurkan
DemoDemo
Pathtrace ProtocolPathtrace Protocol
L2 flow paths are traced with a network protocol implemented
using a Network Function (NF).
The devices on the path will forward the probe to the NF.
The NF sends a response packet back to the originator, and at the
same time forwards the original probe to the next hop devices.
The process continues until the probe packet reaches the
destination and all the traced information arrives at the
originator.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
Ethernet Header
Source MAC| Destination MAC
Version
2
Type
Request/Reply
Checksum
TTL
255
Unused Length
Type
Flowspec
Sub-type Length Ethernet header + IP header
Ethernet header + IP header
Type
Transaction
Sub-type Length Unsued
Source transaction
Source transaction Destination transaction
Destination transaction
Type
Hop
Sub-type Length Hop info
Hop info
Type
Authenticatio
n
Sub-type Length Algorithm Signature Data
Signature Data
DestinationOriginator Switch 1 Switch 2
? ?
<<
<<
<<
Last Hop -> Reply on
behalf of Destination
?
<<
Physical connection
Trace Request
Trace Reply
NF 1 NF 2
? << ? << <<

More Related Content

What's hot

Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamOWASP Delhi
 
Dcn (transmission control protocol) ppt
Dcn  (transmission control protocol) pptDcn  (transmission control protocol) ppt
Dcn (transmission control protocol) pptVijay Kumar
 
Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPSLoadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPSShrey Agarwal
 
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaNetcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaRaghunath G
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
 
Tipc Communication Groups
Tipc Communication GroupsTipc Communication Groups
Tipc Communication GroupsJon Maloy
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking ToolAmit Kumar
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric VanderburgEric Vanderburg
 
Vulnerability analysis of OpenFlow control channel
Vulnerability analysis of OpenFlow control channelVulnerability analysis of OpenFlow control channel
Vulnerability analysis of OpenFlow control channelYogesh Patil
 

What's hot (20)

Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
 
Dcn (transmission control protocol) ppt
Dcn  (transmission control protocol) pptDcn  (transmission control protocol) ppt
Dcn (transmission control protocol) ppt
 
Loadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPSLoadbalancing In-depth study for scale @ 80K TPS
Loadbalancing In-depth study for scale @ 80K TPS
 
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaNetcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beema
 
Port Scanning Overview
Port Scanning  OverviewPort Scanning  Overview
Port Scanning Overview
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Port numbers
Port numbersPort numbers
Port numbers
 
Tipc Communication Groups
Tipc Communication GroupsTipc Communication Groups
Tipc Communication Groups
 
Netcat - A Swiss Army Tool
Netcat - A Swiss Army ToolNetcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Port scanning
Port scanningPort scanning
Port scanning
 
Dynamic Port Scanning
Dynamic Port ScanningDynamic Port Scanning
Dynamic Port Scanning
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Traceroute- A Networking Tool
Traceroute- A Networking ToolTraceroute- A Networking Tool
Traceroute- A Networking Tool
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
 
Wireshark
WiresharkWireshark
Wireshark
 
Netcat
NetcatNetcat
Netcat
 
Trace route
Trace routeTrace route
Trace route
 
Vulnerability analysis of OpenFlow control channel
Vulnerability analysis of OpenFlow control channelVulnerability analysis of OpenFlow control channel
Vulnerability analysis of OpenFlow control channel
 

Similar to pathtrace

networking and computer security prasantation
networking  and computer  security  prasantationnetworking  and computer  security  prasantation
networking and computer security prasantationDasharathChaudhary3
 
presentation on Internet and its protocol
presentation on Internet and its protocolpresentation on Internet and its protocol
presentation on Internet and its protocolitsaartihere001
 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overviewphanleson
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdfhoang971
 
Open Systems Interconnection (OSI) model
Open Systems Interconnection (OSI) modelOpen Systems Interconnection (OSI) model
Open Systems Interconnection (OSI) modelYaser Rahmati
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsUMA MAHESWARI
 
TCP vs UDP in OSI model Computer Network
TCP vs UDP in OSI model  Computer NetworkTCP vs UDP in OSI model  Computer Network
TCP vs UDP in OSI model Computer NetworkSwarajSonavane
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2VISHNU N
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUICFarzad Soltani
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxAlphaKoiSylvester
 

Similar to pathtrace (20)

networking and computer security prasantation
networking  and computer  security  prasantationnetworking  and computer  security  prasantation
networking and computer security prasantation
 
presentation on Internet and its protocol
presentation on Internet and its protocolpresentation on Internet and its protocol
presentation on Internet and its protocol
 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overview
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
Commands.pptx
Commands.pptxCommands.pptx
Commands.pptx
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Open Systems Interconnection (OSI) model
Open Systems Interconnection (OSI) modelOpen Systems Interconnection (OSI) model
Open Systems Interconnection (OSI) model
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
TCP vs UDP in OSI model Computer Network
TCP vs UDP in OSI model  Computer NetworkTCP vs UDP in OSI model  Computer Network
TCP vs UDP in OSI model Computer Network
 
Mod4
Mod4Mod4
Mod4
 
TCP IP
TCP IP TCP IP
TCP IP
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Tcp Udp
Tcp UdpTcp Udp
Tcp Udp
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptx
 

pathtrace

  • 1. Experiment SetupExperiment Setup Pathtrace Packet FormatPathtrace Packet Format Pathtrace Nicholas Bastin, Long Tran, and Deniz Gurkan DemoDemo Pathtrace ProtocolPathtrace Protocol L2 flow paths are traced with a network protocol implemented using a Network Function (NF). The devices on the path will forward the probe to the NF. The NF sends a response packet back to the originator, and at the same time forwards the original probe to the next hop devices. The process continues until the probe packet reaches the destination and all the traced information arrives at the originator. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Ethernet Header Source MAC| Destination MAC Version 2 Type Request/Reply Checksum TTL 255 Unused Length Type Flowspec Sub-type Length Ethernet header + IP header Ethernet header + IP header Type Transaction Sub-type Length Unsued Source transaction Source transaction Destination transaction Destination transaction Type Hop Sub-type Length Hop info Hop info Type Authenticatio n Sub-type Length Algorithm Signature Data Signature Data DestinationOriginator Switch 1 Switch 2 ? ? << << << Last Hop -> Reply on behalf of Destination ? << Physical connection Trace Request Trace Reply NF 1 NF 2 ? << ? << <<