SlideShare ist ein Scribd-Unternehmen logo
1 von 61
7 – Protocols7 – Protocols
Marian MarinovMarian Marinov
CEO of 1H Ltd.CEO of 1H Ltd.
mm@1h.commm@1h.com
Borislav VaradinovBorislav Varadinov
System AdministratorSystem Administrator
bobi [ at ] itp.bgbobi [ at ] itp.bg
● ARP/RARP
● ICMP
● UDP
● TCP
● TCP Congestion
● SCTP
● DCCP
● DNS
Type of requests - Unicast
Type of requests - Broadcast
Type of requests - Multicast
Address Resolution Protocol
● Address resolution
– Forward
– Reverse
● ARP
– Probe
– Proxy
– Mediation
– Stuffing
Address Resolution Protocol
● Address resolution
– Forward (what is the MAC of this machine)
08:11:96:03:B2:2808:11:96:03:B2:28
FF:FF:FF:FF:FF:FFFF:FF:FF:FF:FF:FF
192.168.2.254192.168.2.254
192.168.2.58192.168.2.58
Request
0x08000x0800
1 - req1 - req 2 - reply2 - reply
Address Resolution Protocol
● Address resolution
– Forward (what is the MAC of this machine)
40:b3:95:80:c5:aa40:b3:95:80:c5:aa
08:11:96:03:b2:2808:11:96:03:b2:28
192.168.2.58192.168.2.58
192.168.2.254192.168.2.254
Reply
Address Resolution Protocol
● Address resolution
– Reverse (what is the IP of this machine)
08:11:96:03:B2:2808:11:96:03:B2:28
40:b3:95:80:c5:aa40:b3:95:80:c5:aa
192.168.2.254192.168.2.254
0.0.0.00.0.0.0
Request
Address Resolution Protocol
● Address resolution
– Reverse (what is the IP of this machine)
40:b3:95:80:c5:aa40:b3:95:80:c5:aa
08:11:96:03:B2:2808:11:96:03:B2:28
192.168.2.58192.168.2.58
192.168.2.254192.168.2.254
Reply
Address Resolution Protocol
● How it actually looks
15:12:43.772954 ARP, Ethernet (len 6), IPv4 (len 4),
Request who-has 192.168.2.58 tell 192.168.2.254, length 28
15:12:43.962834 ARP, Ethernet (len 6), IPv4 (len 4),
Reply 192.168.2.58 is-at 40:b3:95:80:c5:aa, length 46
● ARP probe
● ARP proxy
● ARP mediation
● ARP stuffing
Internet Control Message Protocol - ICMP
Internet Control Message Protocol - ICMP
● ICMP types
– 0 – Echo replay
– 1,2 – Reserved
– 3 – Destination unreachable
– 8 – Echo request
– 9 –TTL Exceeded
– 30 –Traceroute
Internet Control Message Protocol - ICMP
● Type codes
3 – Destination unreachable
0 – network unreachable
1 – host unreachable
2 – protocol unreachable
3 – port unreachable
6 – network unknown
7 – host unknown
9 – network prohibited
10 – host prohibited
11 – Time to live exceeded
0 – in transit
1 – in reassembly
Protocol Encapsolation
Layer 2
Layer 3
Layer 2
Layer 4/5
Ethernet payloadEthernet Header
IP Header IP Payload
TCP Header IP Payload
Machine YMachine Y
User Datagram Protocol - UDP
12
3
4
12
3
4
Machine XMachine X
UDP (RFC768 Jon Postel 1980)
User Datagram Protocol - UDP
12
3
4
12
3
4
Machine YMachine Y
Transmission Datagram Protocol -TCP
12
3
4
12
3
4
Machine XMachine X
UDP
TCP
TCP (RFC793 Jon Postel 1981)
Transmission Datagram Protocol -TCP
Transmission Datagram Protocol -TCP
● TCP (RFC793 Jon Postel 1981)
– Session establishment and tear-down
– Window procedure
– Slow start and congestion avoidance (Van
Jacobson 1988)
– Fast open
– Syn cookies
Transmission Datagram Protocol -TCP
TCP
Process
TCP
Process
Machine X
Machine Y
Transmission Datagram Protocol -TCP
Flags: ACK
Flags: SYN, ACK
Seq: Y, Ack: X+1
Flags: SYN, ACK
Flags: SYN Seq: X
Seq: X + 1, Ack: Y+1
Client Server
Three way handshake
SYN RCVD
Server
Established
SYN SENT
Established
Transmission Datagram Protocol -TCP
TCP Fast open
Transmission Datagram Protocol -TCP
TCP Fast open
Transmission Datagram Protocol -TCP
Flags: ACK
Flags: FIN, ACK
Seq: Y, Ack: X+1
Flags: FIN Seq: X
Seq: X + 1, Ack: Y+1
Client Server
Connection Close
FIN WAIT 1
CLOSE WAIT
FIN WAIT 2 LAST ACK
TIME WAIT
CLOSE
TCP Congestion
http://en.wikipedia.org/wiki/TCP_congestion_avoidance_algorithmhttp://en.wikipedia.org/wiki/TCP_congestion_avoidance_algorithm
TCP Congestion
➢ Slow start
➢ Congestion avoidance
➢ Fast retransmit
➢ Fast Recovery
TCP Congestion – Slow start
➢ The initial window size is initialized to one MSS
➢ Each time a packet is ACKed the congestion window i
increased
➢ When the ssthresh is reached, the next phase starts
http://en.wikipedia.org/wiki/Slow-starthttp://en.wikipedia.org/wiki/Slow-start
TCP Congestion –
Congestion avoidance
➢ In this phase window size is increased linearly until
timeout occurs or duplicate ACK is received
TCP Congestion – Fast retransmit
➢ If more then 3 ACKs are received for the same segmen
the sender has to send that particular segment even be
its timer has expired
http://en.wikipedia.org/wiki/Fast_retransmithttp://en.wikipedia.org/wiki/Fast_retransmit
TCP Congestion – Fast Recovery
➢ In this phase window size is decreased to ssthresh rat
then the smaller initial value and increase its size line
http://histrory.visualland.net/tcp_fast_recovery.htmlhttp://histrory.visualland.net/tcp_fast_recovery.html
TCP Congestion Avoidance - Problems
➢ Slow-start assumes that unacknowledged segments a
due to network congestion, which is usually NOT the c
in wireless networks, where dropped packets are main
because of poor data link quality.
➢ The slow-start protocol performs badly for short-lived
connections, because it actually slows down the
transmission of data.
➢ It is possible to trick the congestion avoidance algorit
to think that the pipe is full and slow down all connect
originating from that machine.
TCP Keepalive
➢ The keepalive packets are packets which contain no d
sent at regular interval to confirm that this connection
alive
➢ Keepalive time is the duration between two keepalive
transmissions in idle condition. TCP keepalive period
required to be configurable and by default is set to no
than 2 hours.
➢ Keepalive interval is the duration between two succe
keepalive retransmissions, if acknowledgement to the
previous keepalive transmission is not received. Usual
around 75 seconds.
➢ Keepalive retry is the number of retransmissions to b
sent out before declaring that remote end is not availa
Datagram Congestion Control Protocol
➢ Basically DCCP is UDP with congestion control mechan
It features
➢ Unreliable flows of datagrams
➢ Reliable handshakes for connection setup and teardow
➢ Negotiation of a suitable congestion control mechanism
➢ Acknowledgment mechanisms communicating packet lo
➢ Path Maximum Transmission Unit (PMTU) discovery
➢ RFC4340
DCCP header (x = 1)
0 1 2 30 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port | Dest Port || Source Port | Dest Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data Offset | CCVal | CsCov | Checksum || Data Offset | CCVal | CsCov | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | |X| | .| | |X| | .
| Res | Type |=| Reserved | Sequence Number (high bits) .| Res | Type |=| Reserved | Sequence Number (high bits) .
| | |1| | .| | |1| | .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. Sequence Number (low bits) |. Sequence Number (low bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
If X is 1 the Sequence Number field is 48 bits longIf X is 1 the Sequence Number field is 48 bits long
DCCP header (x = 0)
0 1 2 30 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port | Dest Port || Source Port | Dest Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data Offset | CCVal | CsCov | Checksum || Data Offset | CCVal | CsCov | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | |X| || | |X| |
| Res | Type |=| Sequence Number (low bits) || Res | Type |=| Sequence Number (low bits) |
| | |0| || | |0| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
If X is 0 the Sequence Number field is 24 bits longIf X is 0 the Sequence Number field is 24 bits long
Data Offset - the offset from the start of the packet's DCCP header to thData Offset - the offset from the start of the packet's DCCP header to th
start of its application data areastart of its application data area
CCVal - Defines the congestion control algorithm usedCCVal - Defines the congestion control algorithm used
CCVal = 2 - TCP like congestion avoidanceCCVal = 2 - TCP like congestion avoidance
CCVal = 3 - TCP friendly congestion avoidanceCCVal = 3 - TCP friendly congestion avoidance
CsCov - Checksum Coverage determines the parts of the packet that areCsCov - Checksum Coverage determines the parts of the packet that are
covered by the Checksum field.covered by the Checksum field.
Checksum – DCCP header checksumChecksum – DCCP header checksum
Type – DCCP packet typeType – DCCP packet type
X - Extended Sequence Numbers (may be 0 or 1)X - Extended Sequence Numbers (may be 0 or 1)
DCCP header
All currently defined packet types except DCCP-Request and DCCP-DataAll currently defined packet types except DCCP-Request and DCCP-Data
carry an Acknowledgment Number Subheadercarry an Acknowledgment Number Subheader
When X=1, its format is:When X=1, its format is:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved | Acknowledgment Number .| Reserved | Acknowledgment Number .
| | (high bits) .| | (high bits) .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. Acknowledgment Number (low bits) |. Acknowledgment Number (low bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
When X=0, only the low 24 bits of the Acknowledgment Number areWhen X=0, only the low 24 bits of the Acknowledgment Number are
transmitted, giving the Acknowledgment Number Subheader this format:transmitted, giving the Acknowledgment Number Subheader this format:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved | Acknowledgment Number (low bits) || Reserved | Acknowledgment Number (low bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
DCCP packet types
Type MeaningType Meaning
---- ----------- -------
0 DCCP-Request0 DCCP-Request
1 DCCP-Response1 DCCP-Response
2 DCCP-Data2 DCCP-Data
3 DCCP-Ack3 DCCP-Ack
4 DCCP-DataAck4 DCCP-DataAck
5 DCCP-CloseReq5 DCCP-CloseReq
6 DCCP-Close6 DCCP-Close
7 DCCP-Reset7 DCCP-Reset
8 DCCP-Sync8 DCCP-Sync
9 DCCP-SyncAck9 DCCP-SyncAck
10-15 Reserved10-15 Reserved
Multihoming
ISP xISP x
ISP yISP y
ISP mISP m
ISP jISP j
ISP sISP s
The InternetThe Internet
Stream ControlTransmission Protocol
➢ Multihoming support in which one or both endpoints of aMultihoming support in which one or both endpoints of a
connection can consist of more than one IP address,connection can consist of more than one IP address,
enabling transparent fail-over between redundant networkenabling transparent fail-over between redundant network
paths.paths.
➢ Delivery of chunks within independent streams eliminateDelivery of chunks within independent streams eliminate
unnecessary head-of-line blockingunnecessary head-of-line blocking
➢ Path selection and monitoringPath selection and monitoring
➢ Validation and acknowledgment mechanisms protectValidation and acknowledgment mechanisms protect
against flooding attacks and provide notification ofagainst flooding attacks and provide notification of
duplicated or missing data chunks.duplicated or missing data chunks.
➢ Improved error detection suitable for Ethernet jumboImproved error detection suitable for Ethernet jumbo
frames.frames.
Stream ControlTransmission Protocol
0 1 2 30 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Common Header || Common Header |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Chunk #1 || Chunk #1 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ... || ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Chunk #n || Chunk #n |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
RFC4960RFC4960
Stream ControlTransmission Protocol
Common HeaderCommon Header
0 1 2 30 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port Number | Destination Port Number || Source Port Number | Destination Port Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Verification Tag || Verification Tag |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Checksum || Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
RFC4960RFC4960
IP & Domain allocation
➢ IANA – www.iana.org
➢ Number resources
➢ IP Addresses
➢ Autonomous System (AS)
➢ Protocol number assignments
➢ Domain assignments
➢ Root zone management
➢ gTLD database
➢ .int and .arpa domains
➢ IP registrars
➢ ARIN, LACNIC, Africa, APNIC, RIPE
IP & Domain allocation
➢ Regional Internet Registrar(RIR)
➢ Local Internet Registrar(LIR)
➢ There are two types of IP addresses that can be reques
➢ Provider dependent
➢ These you get from your ISP
➢ Provider independent
➢ You get them from the local LIR or the regional RIR
➢ These allocations can not be smaller then /24 networ
➢ Autonomous System (AS)
➢ Used for the BGP routing protocol
➢ Aggregated IP route announcements are made from a
to them
➢ The corner stone of the Internet routing
➢ Look at http://www.youtube.com/watch?v=oK-lgjJhC4
Domain Name System - DNS
Everything was 'hosts':Everything was 'hosts':
127.0.0.1127.0.0.1 localhostlocalhost
192.168.0.174192.168.0.174 store1store1
192.168.0.238192.168.0.238 store2store2
192.168.0.244192.168.0.244 store3store3
192.168.155.2192.168.155.2 operationsoperations
192.168.155.149192.168.155.149 zimbra0.siteground.comzimbra0.siteground.com
193.107.36.190193.107.36.190 sapport.bgsapport.bg www.sapport.bgwww.sapport.bg
8.8.8.88.8.8.8 ns.google.comns.google.com
89.25.120.3189.25.120.31 google.comgoogle.com
89.25.120.2489.25.120.24 www.google.comwww.google.com
Linux: /etc/hostsLinux: /etc/hosts
Windows: C:WindowsSystem32driversetchostsWindows: C:WindowsSystem32driversetchosts
DNS
➢ Internet Corporation For Assigned Names and Numbe
➢ IANA is now part of it
➢ Handles ccTLDs
➢ Handles gTLDs
➢ Handles the Root zone
➢ Country level domains
➢ .bg, .co.za, .co.uk, .edu.us
➢ Top-level domains
➢ .com, .net, .org, .edu, .gov, .mil
➢ .biz, .name, .info
➢ Instances of J and L root servers are hosted in Sofia
DNS
DNS
➢ Internet Corporation For Assigned Names and Numbe
➢ IANA is now part of it
➢ Handles ccTLDs
➢ Handles gTLDs
➢ Handles the Root zone
➢ Internationalized domain name (IDN)
➢ Domain names are encoded using Punycode
➢ .ru = .рф
➢ We are expecting soon .bg = .бг
➢ Country level domains
➢ .bg, .co.za, .co.uk, .edu.us
➢ Top-level domains
➢ .com, .net, .org, .edu, .gov, .mil
➢ .biz, .name, .info
DNS➢ Name servers
➢ Authoritative only
➢ Recursive
➢ Authoritative + recursive
➢ .in-addr.arpa
➢ .ip6.arpa
DNS - Resolving
Default service port TCP/UDP: 53
DNS - Resolving
➢ Forward resolving
➢ Host/FQDN to IP
➢ Reverse resolving
➢ IP to Host
➢ Reverse resolver delegation
➢ RIR -> LIR -> Local ISP -> YOU
DNS
DNS Resource records
TYPE value and meaning
A 1 a host address
NS 2 an authoritative name server
CNAME 5 the canonical name for an alias
SOA 6 start of a zone of authority
WKS 11 a well known service description
PTR 12 a domain name pointer
HINFO 13 host information
MINFO 14 mailbox or mail list information
MX 15 mail exchange
TXT 16 text strings
AXFR 252 A request for a transfer of an
entire zone
RFC1035
DNS Resource records
kar-do.cc. 86400 IN SOA ns1.ex1.com.
mm.yuhu.biz. (
2013013106 ;Serial Number
86400 ;refresh
7200 ;retry
3600000 ;expire
86400 ;minimum
)
kar-do.cc. IN NS ns1.ex1.com.
kar-do.cc. IN NS ns2.ex1.com.
kar-do.cc. IN A 134.154.23.12
localhost IN A 127.0.0.1
kar-do.cc. IN MX 0 mail.kar-do.cc.
mail IN CNAME mail.yuhu.biz.
www IN A 134.154.23.12
www IN A 134.142.65.81
kar-do.cc. IN TXT
"v=spf1 +a +mx +ip4:134.154.23.12 ?all"
Send MailTransport Protocol - SMTP
RFC5321
Send
Mail
Transport
Protocol
-
SMTP
S: 220 smtp.example.com ESMTP Postfix
C: HELO relay.example.org
S: 250 Hello relay.example.org, I am glad to meet you
C: MAIL FROM:<bob@example.org>
S: 250 Ok
C: RCPT TO:<alice@example.com>
S: 250 Ok
C: RCPT TO:<theboss@example.com>
S: 250 Ok
C: DATA
S: 354 End data with <CR><LF>.<CR><LF>
C: From: "Bob Example" <bob@example.org>
C: To: "Alice Example" <alice@example.com>
C: Cc: theboss@example.com
C: Date: Tue, 15 January 2008 16:02:43 -0500
C: Subject: Test message
C:
C: Hello Alice.
C: This is a test message with 5 header fields and 4 lines in the message body.
C: Your friend,
C: Bob
C: .
S: 250 Ok: queued as 12345
C: QUIT
HTTP
➢ In this phase window size is increased linearly until
timeout occurs or duplicate ACK is received
7 - Protocols7 - Protocols
http://academy.telerik.com/student-courses/software-technologies/os-windows-linux/http://academy.telerik.com/student-courses/software-technologies/os-windows-linux/
Beer timeBeer time
FreeTrainings @Telerik Academy
 Operating Systems @Telerik Academy
 http://telerikacademy.com/Courses/Courses/Details/35
 Telerik Software Academy
 academy.telerik.com
 Telerik Academy @ Facebook
 facebook.com/TelerikAcademy
 Telerik Software Academy Forums
 forums.academy.telerik.com

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to tcp ip linux networking
Introduction to tcp ip   linux networkingIntroduction to tcp ip   linux networking
Introduction to tcp ip linux networkingSreenatha Reddy K R
 
Programming TCP for responsiveness
Programming TCP for responsivenessProgramming TCP for responsiveness
Programming TCP for responsivenessKazuho Oku
 
Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017Andriy Berestovskyy
 
QoS marking on cisco IOS Router
QoS marking on cisco IOS RouterQoS marking on cisco IOS Router
QoS marking on cisco IOS RouterNetProtocol Xpert
 
QoS Pre-Classify on Cisco IOS
QoS Pre-Classify on Cisco IOSQoS Pre-Classify on Cisco IOS
QoS Pre-Classify on Cisco IOSNetProtocol Xpert
 
Faster packet processing in Linux: XDP
Faster packet processing in Linux: XDPFaster packet processing in Linux: XDP
Faster packet processing in Linux: XDPDaniel T. Lee
 
Handy Networking Tools and How to Use Them
Handy Networking Tools and How to Use ThemHandy Networking Tools and How to Use Them
Handy Networking Tools and How to Use ThemSneha Inguva
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking ExplainedThomas Graf
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet CountAmazon Web Services
 
Programming TCP for responsiveness
Programming TCP for responsivenessProgramming TCP for responsiveness
Programming TCP for responsivenessKazuho Oku
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallCassiano Campes
 
Surviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsSurviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsDuane Bodle
 
RTSP Analysis Wireshark
RTSP Analysis WiresharkRTSP Analysis Wireshark
RTSP Analysis WiresharkYoss Cohen
 
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...NetProtocol Xpert
 
Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Olivier Bonaventure
 

Was ist angesagt? (20)

RAZORPOINT TCP/UDP PORTS LIST
RAZORPOINT TCP/UDP PORTS LISTRAZORPOINT TCP/UDP PORTS LIST
RAZORPOINT TCP/UDP PORTS LIST
 
Introduction to tcp ip linux networking
Introduction to tcp ip   linux networkingIntroduction to tcp ip   linux networking
Introduction to tcp ip linux networking
 
Programming TCP for responsiveness
Programming TCP for responsivenessProgramming TCP for responsiveness
Programming TCP for responsiveness
 
Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017
 
Lab telematicos
Lab telematicosLab telematicos
Lab telematicos
 
QoS marking on cisco IOS Router
QoS marking on cisco IOS RouterQoS marking on cisco IOS Router
QoS marking on cisco IOS Router
 
8 congestion-ipv6
8 congestion-ipv68 congestion-ipv6
8 congestion-ipv6
 
QoS Pre-Classify on Cisco IOS
QoS Pre-Classify on Cisco IOSQoS Pre-Classify on Cisco IOS
QoS Pre-Classify on Cisco IOS
 
Faster packet processing in Linux: XDP
Faster packet processing in Linux: XDPFaster packet processing in Linux: XDP
Faster packet processing in Linux: XDP
 
Handy Networking Tools and How to Use Them
Handy Networking Tools and How to Use ThemHandy Networking Tools and How to Use Them
Handy Networking Tools and How to Use Them
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
 
Tcpdump
TcpdumpTcpdump
Tcpdump
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet Count
 
Programming TCP for responsiveness
Programming TCP for responsivenessProgramming TCP for responsiveness
Programming TCP for responsiveness
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewall
 
Surviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsSurviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview Questions
 
RTSP Analysis Wireshark
RTSP Analysis WiresharkRTSP Analysis Wireshark
RTSP Analysis Wireshark
 
Npc08
Npc08Npc08
Npc08
 
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
DMVPN configuration - Configuring Cisco dynamic Multipoint VPN - HUB, SPOKES,...
 
Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6
 

Andere mochten auch

6. processes and threads
6. processes and threads6. processes and threads
6. processes and threadsMarian Marinov
 
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...James Salter
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple AccessAhmar Hashmi
 
03 internetworking
03 internetworking03 internetworking
03 internetworkingbajulusiraj
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_ServiceAhmar Hashmi
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTPAhmar Hashmi
 
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_FirewallsAhmar Hashmi
 
H.264 nal and RTP
H.264 nal and RTPH.264 nal and RTP
H.264 nal and RTPYoss Cohen
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Отзиви от курсовете ни в IMG IT Academy - Пловдив (Софтуерни курсове и графич...
Отзиви от курсовете ни в IMG IT Academy - Пловдив (Софтуерни курсове и графич...Отзиви от курсовете ни в IMG IT Academy - Пловдив (Софтуерни курсове и графич...
Отзиви от курсовете ни в IMG IT Academy - Пловдив (Софтуерни курсове и графич...IMG IT Academy
 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseAbhilasha Lahigude
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram ProtocolPeter R. Egli
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 

Andere mochten auch (20)

6. processes and threads
6. processes and threads6. processes and threads
6. processes and threads
 
29 Multimedia
29 Multimedia29 Multimedia
29 Multimedia
 
RTP
RTPRTP
RTP
 
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
 
30 Cryptography
30 Cryptography30 Cryptography
30 Cryptography
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
03 internetworking
03 internetworking03 internetworking
03 internetworking
 
RTP
RTPRTP
RTP
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
 
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
 
Rtsp
RtspRtsp
Rtsp
 
H.264 nal and RTP
H.264 nal and RTPH.264 nal and RTP
H.264 nal and RTP
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Отзиви от курсовете ни в IMG IT Academy - Пловдив (Софтуерни курсове и графич...
Отзиви от курсовете ни в IMG IT Academy - Пловдив (Софтуерни курсове и графич...Отзиви от курсовете ни в IMG IT Academy - Пловдив (Софтуерни курсове и графич...
Отзиви от курсовете ни в IMG IT Academy - Пловдив (Софтуерни курсове и графич...
 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed Database
 
Ipv4
Ipv4Ipv4
Ipv4
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 

Ähnlich wie 7. protocols

Course on TCP Dynamic Performance
Course on TCP Dynamic PerformanceCourse on TCP Dynamic Performance
Course on TCP Dynamic PerformanceJavier Arauz
 
Troubleshooting TCP/IP
Troubleshooting TCP/IPTroubleshooting TCP/IP
Troubleshooting TCP/IPvijai s
 
Reconsider TCPdump for Modern Troubleshooting
Reconsider TCPdump for Modern TroubleshootingReconsider TCPdump for Modern Troubleshooting
Reconsider TCPdump for Modern TroubleshootingAvi Networks
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)NYversity
 
Fosscon 2012 firewall workshop
Fosscon 2012 firewall workshopFosscon 2012 firewall workshop
Fosscon 2012 firewall workshopjvehent
 
L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)Motonori Shindo
 
Abandon Decades-Old TCPdump for Modern Troubleshooting
Abandon Decades-Old TCPdump for Modern TroubleshootingAbandon Decades-Old TCPdump for Modern Troubleshooting
Abandon Decades-Old TCPdump for Modern TroubleshootingAvi Networks
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)Amazon Web Services
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshopKae Hsu
 
LF_OVS_17_OVS/OVS-DPDK connection tracking for Mobile usecases
LF_OVS_17_OVS/OVS-DPDK connection tracking for Mobile usecasesLF_OVS_17_OVS/OVS-DPDK connection tracking for Mobile usecases
LF_OVS_17_OVS/OVS-DPDK connection tracking for Mobile usecasesLF_OpenvSwitch
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m Agus Awaludin
 
Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsSachidananda Sahu
 
Computer network (11)
Computer network (11)Computer network (11)
Computer network (11)NYversity
 
Jitsi Videobridge, Octopodes, and Kotlin
Jitsi Videobridge, Octopodes, and KotlinJitsi Videobridge, Octopodes, and Kotlin
Jitsi Videobridge, Octopodes, and KotlinBoris Grozev
 
How to convert your Linux box into Security Gateway - Part 1
How to convert your Linux box into Security Gateway - Part 1How to convert your Linux box into Security Gateway - Part 1
How to convert your Linux box into Security Gateway - Part 1n|u - The Open Security Community
 

Ähnlich wie 7. protocols (20)

Course on TCP Dynamic Performance
Course on TCP Dynamic PerformanceCourse on TCP Dynamic Performance
Course on TCP Dynamic Performance
 
Troubleshooting TCP/IP
Troubleshooting TCP/IPTroubleshooting TCP/IP
Troubleshooting TCP/IP
 
Introduction to VOIP
Introduction to VOIPIntroduction to VOIP
Introduction to VOIP
 
Reconsider TCPdump for Modern Troubleshooting
Reconsider TCPdump for Modern TroubleshootingReconsider TCPdump for Modern Troubleshooting
Reconsider TCPdump for Modern Troubleshooting
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
Fosscon 2012 firewall workshop
Fosscon 2012 firewall workshopFosscon 2012 firewall workshop
Fosscon 2012 firewall workshop
 
Chapter 3 - Transport Layer
Chapter 3 - Transport LayerChapter 3 - Transport Layer
Chapter 3 - Transport Layer
 
L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)
 
Abandon Decades-Old TCPdump for Modern Troubleshooting
Abandon Decades-Old TCPdump for Modern TroubleshootingAbandon Decades-Old TCPdump for Modern Troubleshooting
Abandon Decades-Old TCPdump for Modern Troubleshooting
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshop
 
LF_OVS_17_OVS/OVS-DPDK connection tracking for Mobile usecases
LF_OVS_17_OVS/OVS-DPDK connection tracking for Mobile usecasesLF_OVS_17_OVS/OVS-DPDK connection tracking for Mobile usecases
LF_OVS_17_OVS/OVS-DPDK connection tracking for Mobile usecases
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
 
Lec 2.pptx
Lec 2.pptxLec 2.pptx
Lec 2.pptx
 
Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance tools
 
Disney Max 6000 Configurations
Disney Max 6000 ConfigurationsDisney Max 6000 Configurations
Disney Max 6000 Configurations
 
Computer network (11)
Computer network (11)Computer network (11)
Computer network (11)
 
Jitsi Videobridge, Octopodes, and Kotlin
Jitsi Videobridge, Octopodes, and KotlinJitsi Videobridge, Octopodes, and Kotlin
Jitsi Videobridge, Octopodes, and Kotlin
 
TCP-IP PROTOCOL
TCP-IP PROTOCOLTCP-IP PROTOCOL
TCP-IP PROTOCOL
 
How to convert your Linux box into Security Gateway - Part 1
How to convert your Linux box into Security Gateway - Part 1How to convert your Linux box into Security Gateway - Part 1
How to convert your Linux box into Security Gateway - Part 1
 

Mehr von Marian Marinov

Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingMarian Marinov
 
Basic presentation of cryptography mechanisms
Basic presentation of cryptography mechanismsBasic presentation of cryptography mechanisms
Basic presentation of cryptography mechanismsMarian Marinov
 
Microservices: Benefits, drawbacks and are they for me?
Microservices: Benefits, drawbacks and are they for me?Microservices: Benefits, drawbacks and are they for me?
Microservices: Benefits, drawbacks and are they for me?Marian Marinov
 
Introduction and replication to DragonflyDB
Introduction and replication to DragonflyDBIntroduction and replication to DragonflyDB
Introduction and replication to DragonflyDBMarian Marinov
 
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQMessage Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQMarian Marinov
 
How to successfully migrate to DevOps .pdf
How to successfully migrate to DevOps .pdfHow to successfully migrate to DevOps .pdf
How to successfully migrate to DevOps .pdfMarian Marinov
 
How to survive in the work from home era
How to survive in the work from home eraHow to survive in the work from home era
How to survive in the work from home eraMarian Marinov
 
Improve your storage with bcachefs
Improve your storage with bcachefsImprove your storage with bcachefs
Improve your storage with bcachefsMarian Marinov
 
Control your service resources with systemd
 Control your service resources with systemd  Control your service resources with systemd
Control your service resources with systemd Marian Marinov
 
Comparison of-foss-distributed-storage
Comparison of-foss-distributed-storageComparison of-foss-distributed-storage
Comparison of-foss-distributed-storageMarian Marinov
 
Защо и как да обогатяваме знанията си?
Защо и как да обогатяваме знанията си?Защо и как да обогатяваме знанията си?
Защо и как да обогатяваме знанията си?Marian Marinov
 
Securing your MySQL server
Securing your MySQL serverSecuring your MySQL server
Securing your MySQL serverMarian Marinov
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKMarian Marinov
 
Challenges with high density networks
Challenges with high density networksChallenges with high density networks
Challenges with high density networksMarian Marinov
 
SiteGround building automation
SiteGround building automationSiteGround building automation
SiteGround building automationMarian Marinov
 
Preventing cpu side channel attacks with kernel tracking
Preventing cpu side channel attacks with kernel trackingPreventing cpu side channel attacks with kernel tracking
Preventing cpu side channel attacks with kernel trackingMarian Marinov
 
Managing a lot of servers
Managing a lot of serversManaging a lot of servers
Managing a lot of serversMarian Marinov
 
Let's Encrypt failures
Let's Encrypt failuresLet's Encrypt failures
Let's Encrypt failuresMarian Marinov
 

Mehr von Marian Marinov (20)

Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & Logging
 
Basic presentation of cryptography mechanisms
Basic presentation of cryptography mechanismsBasic presentation of cryptography mechanisms
Basic presentation of cryptography mechanisms
 
Microservices: Benefits, drawbacks and are they for me?
Microservices: Benefits, drawbacks and are they for me?Microservices: Benefits, drawbacks and are they for me?
Microservices: Benefits, drawbacks and are they for me?
 
Introduction and replication to DragonflyDB
Introduction and replication to DragonflyDBIntroduction and replication to DragonflyDB
Introduction and replication to DragonflyDB
 
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQMessage Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
 
How to successfully migrate to DevOps .pdf
How to successfully migrate to DevOps .pdfHow to successfully migrate to DevOps .pdf
How to successfully migrate to DevOps .pdf
 
How to survive in the work from home era
How to survive in the work from home eraHow to survive in the work from home era
How to survive in the work from home era
 
Managing sysadmins
Managing sysadminsManaging sysadmins
Managing sysadmins
 
Improve your storage with bcachefs
Improve your storage with bcachefsImprove your storage with bcachefs
Improve your storage with bcachefs
 
Control your service resources with systemd
 Control your service resources with systemd  Control your service resources with systemd
Control your service resources with systemd
 
Comparison of-foss-distributed-storage
Comparison of-foss-distributed-storageComparison of-foss-distributed-storage
Comparison of-foss-distributed-storage
 
Защо и как да обогатяваме знанията си?
Защо и как да обогатяваме знанията си?Защо и как да обогатяваме знанията си?
Защо и как да обогатяваме знанията си?
 
Securing your MySQL server
Securing your MySQL serverSecuring your MySQL server
Securing your MySQL server
 
Sysadmin vs. dev ops
Sysadmin vs. dev opsSysadmin vs. dev ops
Sysadmin vs. dev ops
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDK
 
Challenges with high density networks
Challenges with high density networksChallenges with high density networks
Challenges with high density networks
 
SiteGround building automation
SiteGround building automationSiteGround building automation
SiteGround building automation
 
Preventing cpu side channel attacks with kernel tracking
Preventing cpu side channel attacks with kernel trackingPreventing cpu side channel attacks with kernel tracking
Preventing cpu side channel attacks with kernel tracking
 
Managing a lot of servers
Managing a lot of serversManaging a lot of servers
Managing a lot of servers
 
Let's Encrypt failures
Let's Encrypt failuresLet's Encrypt failures
Let's Encrypt failures
 

Kürzlich hochgeladen

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 

Kürzlich hochgeladen (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

7. protocols

  • 1. 7 – Protocols7 – Protocols Marian MarinovMarian Marinov CEO of 1H Ltd.CEO of 1H Ltd. mm@1h.commm@1h.com Borislav VaradinovBorislav Varadinov System AdministratorSystem Administrator bobi [ at ] itp.bgbobi [ at ] itp.bg
  • 2. ● ARP/RARP ● ICMP ● UDP ● TCP ● TCP Congestion ● SCTP ● DCCP ● DNS
  • 3. Type of requests - Unicast
  • 4. Type of requests - Broadcast
  • 5. Type of requests - Multicast
  • 6. Address Resolution Protocol ● Address resolution – Forward – Reverse ● ARP – Probe – Proxy – Mediation – Stuffing
  • 7. Address Resolution Protocol ● Address resolution – Forward (what is the MAC of this machine) 08:11:96:03:B2:2808:11:96:03:B2:28 FF:FF:FF:FF:FF:FFFF:FF:FF:FF:FF:FF 192.168.2.254192.168.2.254 192.168.2.58192.168.2.58 Request 0x08000x0800 1 - req1 - req 2 - reply2 - reply
  • 8. Address Resolution Protocol ● Address resolution – Forward (what is the MAC of this machine) 40:b3:95:80:c5:aa40:b3:95:80:c5:aa 08:11:96:03:b2:2808:11:96:03:b2:28 192.168.2.58192.168.2.58 192.168.2.254192.168.2.254 Reply
  • 9. Address Resolution Protocol ● Address resolution – Reverse (what is the IP of this machine) 08:11:96:03:B2:2808:11:96:03:B2:28 40:b3:95:80:c5:aa40:b3:95:80:c5:aa 192.168.2.254192.168.2.254 0.0.0.00.0.0.0 Request
  • 10. Address Resolution Protocol ● Address resolution – Reverse (what is the IP of this machine) 40:b3:95:80:c5:aa40:b3:95:80:c5:aa 08:11:96:03:B2:2808:11:96:03:B2:28 192.168.2.58192.168.2.58 192.168.2.254192.168.2.254 Reply
  • 11. Address Resolution Protocol ● How it actually looks 15:12:43.772954 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.2.58 tell 192.168.2.254, length 28 15:12:43.962834 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.2.58 is-at 40:b3:95:80:c5:aa, length 46 ● ARP probe ● ARP proxy ● ARP mediation ● ARP stuffing
  • 12. Internet Control Message Protocol - ICMP
  • 13. Internet Control Message Protocol - ICMP ● ICMP types – 0 – Echo replay – 1,2 – Reserved – 3 – Destination unreachable – 8 – Echo request – 9 –TTL Exceeded – 30 –Traceroute
  • 14. Internet Control Message Protocol - ICMP ● Type codes 3 – Destination unreachable 0 – network unreachable 1 – host unreachable 2 – protocol unreachable 3 – port unreachable 6 – network unknown 7 – host unknown 9 – network prohibited 10 – host prohibited 11 – Time to live exceeded 0 – in transit 1 – in reassembly
  • 15. Protocol Encapsolation Layer 2 Layer 3 Layer 2 Layer 4/5 Ethernet payloadEthernet Header IP Header IP Payload TCP Header IP Payload
  • 16. Machine YMachine Y User Datagram Protocol - UDP 12 3 4 12 3 4 Machine XMachine X UDP (RFC768 Jon Postel 1980)
  • 18. 12 3 4 12 3 4 Machine YMachine Y Transmission Datagram Protocol -TCP 12 3 4 12 3 4 Machine XMachine X UDP TCP TCP (RFC793 Jon Postel 1981)
  • 20. Transmission Datagram Protocol -TCP ● TCP (RFC793 Jon Postel 1981) – Session establishment and tear-down – Window procedure – Slow start and congestion avoidance (Van Jacobson 1988) – Fast open – Syn cookies
  • 21. Transmission Datagram Protocol -TCP TCP Process TCP Process Machine X Machine Y
  • 22. Transmission Datagram Protocol -TCP Flags: ACK Flags: SYN, ACK Seq: Y, Ack: X+1 Flags: SYN, ACK Flags: SYN Seq: X Seq: X + 1, Ack: Y+1 Client Server Three way handshake SYN RCVD Server Established SYN SENT Established
  • 23. Transmission Datagram Protocol -TCP TCP Fast open
  • 24. Transmission Datagram Protocol -TCP TCP Fast open
  • 25. Transmission Datagram Protocol -TCP Flags: ACK Flags: FIN, ACK Seq: Y, Ack: X+1 Flags: FIN Seq: X Seq: X + 1, Ack: Y+1 Client Server Connection Close FIN WAIT 1 CLOSE WAIT FIN WAIT 2 LAST ACK TIME WAIT CLOSE
  • 27. TCP Congestion ➢ Slow start ➢ Congestion avoidance ➢ Fast retransmit ➢ Fast Recovery
  • 28. TCP Congestion – Slow start ➢ The initial window size is initialized to one MSS ➢ Each time a packet is ACKed the congestion window i increased ➢ When the ssthresh is reached, the next phase starts http://en.wikipedia.org/wiki/Slow-starthttp://en.wikipedia.org/wiki/Slow-start
  • 29. TCP Congestion – Congestion avoidance ➢ In this phase window size is increased linearly until timeout occurs or duplicate ACK is received
  • 30. TCP Congestion – Fast retransmit ➢ If more then 3 ACKs are received for the same segmen the sender has to send that particular segment even be its timer has expired http://en.wikipedia.org/wiki/Fast_retransmithttp://en.wikipedia.org/wiki/Fast_retransmit
  • 31. TCP Congestion – Fast Recovery ➢ In this phase window size is decreased to ssthresh rat then the smaller initial value and increase its size line http://histrory.visualland.net/tcp_fast_recovery.htmlhttp://histrory.visualland.net/tcp_fast_recovery.html
  • 32. TCP Congestion Avoidance - Problems ➢ Slow-start assumes that unacknowledged segments a due to network congestion, which is usually NOT the c in wireless networks, where dropped packets are main because of poor data link quality. ➢ The slow-start protocol performs badly for short-lived connections, because it actually slows down the transmission of data. ➢ It is possible to trick the congestion avoidance algorit to think that the pipe is full and slow down all connect originating from that machine.
  • 33. TCP Keepalive ➢ The keepalive packets are packets which contain no d sent at regular interval to confirm that this connection alive ➢ Keepalive time is the duration between two keepalive transmissions in idle condition. TCP keepalive period required to be configurable and by default is set to no than 2 hours. ➢ Keepalive interval is the duration between two succe keepalive retransmissions, if acknowledgement to the previous keepalive transmission is not received. Usual around 75 seconds. ➢ Keepalive retry is the number of retransmissions to b sent out before declaring that remote end is not availa
  • 34. Datagram Congestion Control Protocol ➢ Basically DCCP is UDP with congestion control mechan It features ➢ Unreliable flows of datagrams ➢ Reliable handshakes for connection setup and teardow ➢ Negotiation of a suitable congestion control mechanism ➢ Acknowledgment mechanisms communicating packet lo ➢ Path Maximum Transmission Unit (PMTU) discovery ➢ RFC4340
  • 35. DCCP header (x = 1) 0 1 2 30 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Port | Dest Port || Source Port | Dest Port | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Offset | CCVal | CsCov | Checksum || Data Offset | CCVal | CsCov | Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | |X| | .| | |X| | . | Res | Type |=| Reserved | Sequence Number (high bits) .| Res | Type |=| Reserved | Sequence Number (high bits) . | | |1| | .| | |1| | . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . Sequence Number (low bits) |. Sequence Number (low bits) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ If X is 1 the Sequence Number field is 48 bits longIf X is 1 the Sequence Number field is 48 bits long
  • 36. DCCP header (x = 0) 0 1 2 30 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Port | Dest Port || Source Port | Dest Port | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Offset | CCVal | CsCov | Checksum || Data Offset | CCVal | CsCov | Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | |X| || | |X| | | Res | Type |=| Sequence Number (low bits) || Res | Type |=| Sequence Number (low bits) | | | |0| || | |0| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ If X is 0 the Sequence Number field is 24 bits longIf X is 0 the Sequence Number field is 24 bits long Data Offset - the offset from the start of the packet's DCCP header to thData Offset - the offset from the start of the packet's DCCP header to th start of its application data areastart of its application data area CCVal - Defines the congestion control algorithm usedCCVal - Defines the congestion control algorithm used CCVal = 2 - TCP like congestion avoidanceCCVal = 2 - TCP like congestion avoidance CCVal = 3 - TCP friendly congestion avoidanceCCVal = 3 - TCP friendly congestion avoidance CsCov - Checksum Coverage determines the parts of the packet that areCsCov - Checksum Coverage determines the parts of the packet that are covered by the Checksum field.covered by the Checksum field. Checksum – DCCP header checksumChecksum – DCCP header checksum Type – DCCP packet typeType – DCCP packet type X - Extended Sequence Numbers (may be 0 or 1)X - Extended Sequence Numbers (may be 0 or 1)
  • 37. DCCP header All currently defined packet types except DCCP-Request and DCCP-DataAll currently defined packet types except DCCP-Request and DCCP-Data carry an Acknowledgment Number Subheadercarry an Acknowledgment Number Subheader When X=1, its format is:When X=1, its format is: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved | Acknowledgment Number .| Reserved | Acknowledgment Number . | | (high bits) .| | (high bits) . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . Acknowledgment Number (low bits) |. Acknowledgment Number (low bits) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ When X=0, only the low 24 bits of the Acknowledgment Number areWhen X=0, only the low 24 bits of the Acknowledgment Number are transmitted, giving the Acknowledgment Number Subheader this format:transmitted, giving the Acknowledgment Number Subheader this format: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved | Acknowledgment Number (low bits) || Reserved | Acknowledgment Number (low bits) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  • 38. DCCP packet types Type MeaningType Meaning ---- ----------- ------- 0 DCCP-Request0 DCCP-Request 1 DCCP-Response1 DCCP-Response 2 DCCP-Data2 DCCP-Data 3 DCCP-Ack3 DCCP-Ack 4 DCCP-DataAck4 DCCP-DataAck 5 DCCP-CloseReq5 DCCP-CloseReq 6 DCCP-Close6 DCCP-Close 7 DCCP-Reset7 DCCP-Reset 8 DCCP-Sync8 DCCP-Sync 9 DCCP-SyncAck9 DCCP-SyncAck 10-15 Reserved10-15 Reserved
  • 39. Multihoming ISP xISP x ISP yISP y ISP mISP m ISP jISP j ISP sISP s The InternetThe Internet
  • 40. Stream ControlTransmission Protocol ➢ Multihoming support in which one or both endpoints of aMultihoming support in which one or both endpoints of a connection can consist of more than one IP address,connection can consist of more than one IP address, enabling transparent fail-over between redundant networkenabling transparent fail-over between redundant network paths.paths. ➢ Delivery of chunks within independent streams eliminateDelivery of chunks within independent streams eliminate unnecessary head-of-line blockingunnecessary head-of-line blocking ➢ Path selection and monitoringPath selection and monitoring ➢ Validation and acknowledgment mechanisms protectValidation and acknowledgment mechanisms protect against flooding attacks and provide notification ofagainst flooding attacks and provide notification of duplicated or missing data chunks.duplicated or missing data chunks. ➢ Improved error detection suitable for Ethernet jumboImproved error detection suitable for Ethernet jumbo frames.frames.
  • 41. Stream ControlTransmission Protocol 0 1 2 30 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Common Header || Common Header | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Chunk #1 || Chunk #1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ... || ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Chunk #n || Chunk #n | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ RFC4960RFC4960
  • 42. Stream ControlTransmission Protocol Common HeaderCommon Header 0 1 2 30 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 10 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Port Number | Destination Port Number || Source Port Number | Destination Port Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Verification Tag || Verification Tag | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum || Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ RFC4960RFC4960
  • 43. IP & Domain allocation ➢ IANA – www.iana.org ➢ Number resources ➢ IP Addresses ➢ Autonomous System (AS) ➢ Protocol number assignments ➢ Domain assignments ➢ Root zone management ➢ gTLD database ➢ .int and .arpa domains ➢ IP registrars ➢ ARIN, LACNIC, Africa, APNIC, RIPE
  • 44. IP & Domain allocation ➢ Regional Internet Registrar(RIR) ➢ Local Internet Registrar(LIR) ➢ There are two types of IP addresses that can be reques ➢ Provider dependent ➢ These you get from your ISP ➢ Provider independent ➢ You get them from the local LIR or the regional RIR ➢ These allocations can not be smaller then /24 networ ➢ Autonomous System (AS) ➢ Used for the BGP routing protocol ➢ Aggregated IP route announcements are made from a to them ➢ The corner stone of the Internet routing ➢ Look at http://www.youtube.com/watch?v=oK-lgjJhC4
  • 45. Domain Name System - DNS Everything was 'hosts':Everything was 'hosts': 127.0.0.1127.0.0.1 localhostlocalhost 192.168.0.174192.168.0.174 store1store1 192.168.0.238192.168.0.238 store2store2 192.168.0.244192.168.0.244 store3store3 192.168.155.2192.168.155.2 operationsoperations 192.168.155.149192.168.155.149 zimbra0.siteground.comzimbra0.siteground.com 193.107.36.190193.107.36.190 sapport.bgsapport.bg www.sapport.bgwww.sapport.bg 8.8.8.88.8.8.8 ns.google.comns.google.com 89.25.120.3189.25.120.31 google.comgoogle.com 89.25.120.2489.25.120.24 www.google.comwww.google.com Linux: /etc/hostsLinux: /etc/hosts Windows: C:WindowsSystem32driversetchostsWindows: C:WindowsSystem32driversetchosts
  • 46.
  • 47. DNS ➢ Internet Corporation For Assigned Names and Numbe ➢ IANA is now part of it ➢ Handles ccTLDs ➢ Handles gTLDs ➢ Handles the Root zone ➢ Country level domains ➢ .bg, .co.za, .co.uk, .edu.us ➢ Top-level domains ➢ .com, .net, .org, .edu, .gov, .mil ➢ .biz, .name, .info ➢ Instances of J and L root servers are hosted in Sofia
  • 48. DNS
  • 49. DNS ➢ Internet Corporation For Assigned Names and Numbe ➢ IANA is now part of it ➢ Handles ccTLDs ➢ Handles gTLDs ➢ Handles the Root zone ➢ Internationalized domain name (IDN) ➢ Domain names are encoded using Punycode ➢ .ru = .рф ➢ We are expecting soon .bg = .бг ➢ Country level domains ➢ .bg, .co.za, .co.uk, .edu.us ➢ Top-level domains ➢ .com, .net, .org, .edu, .gov, .mil ➢ .biz, .name, .info
  • 50. DNS➢ Name servers ➢ Authoritative only ➢ Recursive ➢ Authoritative + recursive ➢ .in-addr.arpa ➢ .ip6.arpa
  • 51. DNS - Resolving Default service port TCP/UDP: 53
  • 52. DNS - Resolving ➢ Forward resolving ➢ Host/FQDN to IP ➢ Reverse resolving ➢ IP to Host ➢ Reverse resolver delegation ➢ RIR -> LIR -> Local ISP -> YOU
  • 53. DNS
  • 54. DNS Resource records TYPE value and meaning A 1 a host address NS 2 an authoritative name server CNAME 5 the canonical name for an alias SOA 6 start of a zone of authority WKS 11 a well known service description PTR 12 a domain name pointer HINFO 13 host information MINFO 14 mailbox or mail list information MX 15 mail exchange TXT 16 text strings AXFR 252 A request for a transfer of an entire zone RFC1035
  • 55. DNS Resource records kar-do.cc. 86400 IN SOA ns1.ex1.com. mm.yuhu.biz. ( 2013013106 ;Serial Number 86400 ;refresh 7200 ;retry 3600000 ;expire 86400 ;minimum ) kar-do.cc. IN NS ns1.ex1.com. kar-do.cc. IN NS ns2.ex1.com. kar-do.cc. IN A 134.154.23.12 localhost IN A 127.0.0.1 kar-do.cc. IN MX 0 mail.kar-do.cc. mail IN CNAME mail.yuhu.biz. www IN A 134.154.23.12 www IN A 134.142.65.81 kar-do.cc. IN TXT "v=spf1 +a +mx +ip4:134.154.23.12 ?all"
  • 56. Send MailTransport Protocol - SMTP RFC5321
  • 57. Send Mail Transport Protocol - SMTP S: 220 smtp.example.com ESMTP Postfix C: HELO relay.example.org S: 250 Hello relay.example.org, I am glad to meet you C: MAIL FROM:<bob@example.org> S: 250 Ok C: RCPT TO:<alice@example.com> S: 250 Ok C: RCPT TO:<theboss@example.com> S: 250 Ok C: DATA S: 354 End data with <CR><LF>.<CR><LF> C: From: "Bob Example" <bob@example.org> C: To: "Alice Example" <alice@example.com> C: Cc: theboss@example.com C: Date: Tue, 15 January 2008 16:02:43 -0500 C: Subject: Test message C: C: Hello Alice. C: This is a test message with 5 header fields and 4 lines in the message body. C: Your friend, C: Bob C: . S: 250 Ok: queued as 12345 C: QUIT
  • 58. HTTP ➢ In this phase window size is increased linearly until timeout occurs or duplicate ACK is received
  • 59. 7 - Protocols7 - Protocols http://academy.telerik.com/student-courses/software-technologies/os-windows-linux/http://academy.telerik.com/student-courses/software-technologies/os-windows-linux/
  • 61. FreeTrainings @Telerik Academy  Operating Systems @Telerik Academy  http://telerikacademy.com/Courses/Courses/Details/35  Telerik Software Academy  academy.telerik.com  Telerik Academy @ Facebook  facebook.com/TelerikAcademy  Telerik Software Academy Forums  forums.academy.telerik.com