Download Mod10Chap19TCPIP

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Large numbers wikipedia , lookup

Addition wikipedia , lookup

Elementary mathematics wikipedia , lookup

Transcript
© 2002, Cisco Systems, Inc. All rights reserved.
Module 10: Intermediate TCP/IP
Frank Mann CCAI-CCNA
2
10.1.1 TCP operation
IP addresses allow for the routing of packets between
networks. However, IP makes no guarantees about delivery.
The transport layer is responsible for the reliable transport of and
regulation of data flow from source to destination. This is
accomplished using sliding windows and sequencing numbers along
with a synchronization process that ensures each host is ready and
willing to communicate
10.1.2 TCP Segment Format
10.1.2 Synchronization or 3-way
handshake
Prior to data
transmission, the two
communicating hosts
go through a
synchronization
process to establish a
virtual connection.
This synchronization
process insures that
both sides are ready for
data transmission and
allows the devices to
determine the initial
sequence numbers.
Sequence Numbers
It is important to understand that sequence
numbers are a part of initiating
communication between the two devices.
Sequence numbers act as reference starting
numbers between the two devices.
The sequence numbers give each host a
way to ACK the SYN so that the receiver
knows the sender is responding to the
proper connection request
10.1.3 Denial of service attacks
Denial of service (DoS) attacks are designed
to deny services to legitimate hosts
attempting to establish connections.
DoS attacks are a common method that
hackers utilize to halt system response.
One type of DoS is known as SYN flooding.
SYN flooding exploits the normal threeway handshake and causes targeted
devices to ACK to source addresses that
will not complete the handshake.
SYN Flooding
In a DoS attack, the hacker
initiates a synchronization
but spoofs the source IP
address
To defend
against these
attacks,
system
administrators
may decrease
the connection
timeout period
and increase
the connection
queue size.
10.1.4 Windowing and window size
This sliding window also allows the destination device to indicate to the source a
need to decrease or increase the amount of data being sent because it is
incapable at that time of dealing with that much data.
10.1.5 Sequencing numbers
10.1.6 Positive acknowledgment and
retransmission (PAR)
With PAR, the source sends
a packet, starts a timer, and
waits for an ACK before
sending the next packet.
If the timer expires before
the source receives an
acknowledgment, the source
retransmits the packet and
starts the timer over again.
TCP uses expectational
acknowledgments in which
the acknowledgment
number refers to the next
octet that is expected.
10.1.7 UDP operation
Not all applications need to guarantee delivery of
the data packet, so they use the faster,
connectionless delivery mechanism afforded by
UDP.
The UDP protocol standard, described in RFC 768,
is a simple protocol that exchanges segments
without acknowledgments or guaranteed delivery.
UDP does not use windowing or acknowledgments
so application layer protocols must provide error
detection
10.2 Overview of Transport
Layer Ports
Frank Mann CCAI-CCNA
13
10.2.1 Multiple conversations between
hosts
A port number must be associated with the conversation between
hosts to ensure that the packet reaches the appropriate service on the
server
Without a way to distinguish between different conversations, the client
would be unable to send both an email and browse a web page, using one
server at the same time.
10.2.2 Ports for services
10.2.2 Ports for services
10.2.3 Ports for clients
Destination ports, or ports for services, are
normally defined using the well-known ports.
Source ports set by the client are determined
dynamically.
In general, a client determines the source port by
randomly assigning a number above 1023
10.2.4 Port numbering and well-known
port numbers
Port numbers are represented by 2 bytes in
the header of a TCP or UDP segment. This
16-bit value can result in port numbers
ranging from 0 to 65535.
These port numbers are divided into three
different categories:
• The first 1023 ports are well-known ports
• Registered ports range from 1024 to 49151
• Ports between 49152 and 65535 are defined as
dynamic or private ports
10.2.5 Example of multiple sessions
between hosts
A pair of sockets, one on each host, forms a
unique connection.
• For instance, a host might have a telnet connection, port
23, while at the same time be surfing the net, port 80. The
IP and the MAC addresses would be the same because
the packets are coming from the same host.
Sockets
These three methods of addressing are
often confusing, but this can be avoided if
the addresses are explained in reference to
the OSI model.
• Port numbers are located at the transport layer
and are serviced by the network layer. The
network layer assigns the logical address (IP
address) and is then serviced by the data link
layer which assigns the physical address (MAC
address).
10.2.6 Comparison of MAC addresses,
IP addresses, and port numbers
Labs Module 10: Intermediate TCP/IP
Labs:
10.1.6 Multiple Active Host Sessions
10.2.5 Well-known Port Numbers and Multiple Sessions