SlideShare uma empresa Scribd logo
1 de 25
The Internet Protocol (IP)
Application Services
(Telnet, FTP, e-mail, WWW)
Reliable Transport Service
(TCP)
Connectionless Packet Delivery Service
(IP)
The Internet Protocol (IP)
• Provides a packet delivery service which is:
– Unreliable
– Best-effort
– Connectionless
• Defines the basic unit of data transfer
• Performs the routing function
• Includes a set of rules that embody the idea of
unreliable packet delivery
IP Datagrams
• The basic unit of data transfer
Physical Network Internet
Frame Datagram
Frame Header
Frame
Data
Datagram Header
Datagram
Data
IP Datagram Format
IP Datagram Service Type Field
VERS HLEN SERVICE TYPE TOTAL LENGTH
0 1 2 3 4 5 6 7
PRECEDENCE D T R UNUSED
16 bits
IP Datagram Service Type Field
• In the 1990’s the meaning of the service type field
was redefined:
• For backwards compatibility:
– When the last three codepoint bits are zero, the first
three bits represent 8 classes of service (0 = least
important, …, 7 = most important)
IP Datagram Encapsulation
Frame Header Frame Data
Datagram Header Datagram Data
What if a datagram won’t fit in a frame?
Datagrams must move from machine to machine via
physical networks
Maximum Transfer Unit (MTU)
• Each physical networking technology limits the amount of
data that can fit in a frame
– Ethernet: 1500 octets
– FDDI: 4470 octets
• This is called the network’s MTU
• Limiting datagrams to fit in the smallest possible MTU
would make travelling across networks with a larger MTU
inefficient
• Allowing datagrams to be larger than a network’s MTU
means that datagrams will not always fir in a single frame
Datagram Fragmentation
• Divide datagrams too large to fit in one
frame into pieces called fragments
• Each fragment should fit into one frame
• Transport fragments over physical network
• Reassemble fragments into the complete
datagram
Datagram Fragmentation (cont)
Datagram Fragmentation
Example
Datagram Header Data (4000 octets)
Fragment 1 Header Data (1480 octets)
Fragment 2 Header Data (1480 octets)
Fragment 3 Header Data (1040 octets)
Fragment headers duplicate datagram’s header (except for
FLAGS field)
Datagram Format
Flags = DNF, FRAG, MF
Reassembly of Fragments
• Should fragments be reassembled after
crossing one network or should we wait
until the fragments arrive at their final
destination to reassemble them?
• Advantages?
• Disadvantages?
Internet Datagram Options
• Used for network testing and debugging
• Variable length field (depending on what
options are selected)
• Classes:
– 0: Datagram or network control 1: Reserved for future use
– 2: Debugging and measurement 3: Reserved for future use
0 1 2 3 4 5 6 7
Copy Class Option number
Internet Datagram Options (cont)
• Class 0 option numbers: Class 2 option numbers:
– 0: End of options list - 4: Internet timestamp
– 1: No operation
– 2: Security and handling restrictions
– 3: Loose source routing
– 7: Record route
– 8: Stream identifier
– 9: Strict source routing
0 1 2 3 4 5 6 7
Copy Class Option number
The Record Route Option
• Source creates an empty list of IP addresses
in the header
• Set Record route option
• Each router that handles the datagram
appends its IP address to the list
• Destination machine can extract and process
the route information
Source Route Option
• Sender dictates a path through the internet
over which the datagram must travel
• Sender lists IP addresses (in order) of the
route the datagram should take
• Sender sets the source route option
Source Route Option (cont)
• Strict source routing - the path between two
successive addresses in the list must consist
of a single physical network
• Loose source routing
– The datagram must follow the sequence of IP
addresses in the list
– Allows multiple network hops between
successive addresses on the list
The Timestamp Option
• Sender creates an empty list in the header
• Sender enables the timestamp option
• Each router that handles the datagram
appends to the list its:
– IP address
– Local timestamp (in Universal Time)
Processing Options During
Fragmentation
• Class 0 option numbers: Class 2 option numbers:
– 0: End of options list - 4: Internet timestamp
– 1: No operation
– 2: Security and handling restrictions
– 3: Loose source routing
– 7: Record route
– 8: Stream identifier
– 9: Strict source routing
0 1 2 3 4 5 6 7
Copy Class Option number
Processing Options During
Fragmentation (cont)
• When fragmenting a datagram a router:
– Replicates some IP options in all fragments
• Example?
– Replicates some IP options in only one
fragment
• Example?
IP – Security Issues
• Destination IP address is used to route a datagram to its
final destination
• Source IP address identifies the sender so that the receiver
knows where to send a reply
• IP spoofing – sender of a datagram inserts the address of
another machine (or a nonexistent machine) in the source
address field
– Prevent the receiver from determining the host from which an
attack datagram originated
– Make the message appear to have originated from a trusted
machine
– Want reply sent to a another (victim) host
Teardrop
• Tool enabled attackers to crash vulnerable remote systems
by sending a certain type of fragmented IP datagram
– Normal datagram fragments do not overlap
– Teardrop created fragments that did overlap
– Some implementations of the TCP/IP IP fragmentation re-assembly
code do not properly handle overlapping IP fragments
• Windows and some Linux kernels
– Caused system to crash
– Fixed by software patches
Summary
• The Internet Protocol (IP):
– Provides a packet delivery service which is:
• Unreliable
• Best-effort
• Connectionless
– Defines the basic unit of data transfer
– Performs the routing function
– Includes a set of rules that embody the idea of
unreliable packet delivery
Summary (cont)
Application Services
(Telnet, FTP, e-mail, WWW)
Reliable Transport Service
(TCP)
Connectionless Packet Delivery Service
(IP)

Mais conteúdo relacionado

Semelhante a ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt

Introduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking TechnologyIntroduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking Technologyroykousik2020
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22Techvilla
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdfhelloraja
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdfhelloraja
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.pptjayvagasiya136
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IPaibad ahmed
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfPeterOwenje1
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferenceCengage Learning
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ipPalanivel Kuppusamy
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 

Semelhante a ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt (20)

tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
Introduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking TechnologyIntroduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking Technology
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdf
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ip
 
Dik acn presentation
Dik acn presentationDik acn presentation
Dik acn presentation
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 

Último

Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdfKamal Acharya
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Lect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptxLect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptxHamzaKhawar4
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5T.D. Shashikala
 
Online book store management system project.pdf
Online book store management system project.pdfOnline book store management system project.pdf
Online book store management system project.pdfKamal Acharya
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Krakówbim.edu.pl
 
Lecture_8-Digital implementation of analog controller design.pdf
Lecture_8-Digital implementation of analog controller design.pdfLecture_8-Digital implementation of analog controller design.pdf
Lecture_8-Digital implementation of analog controller design.pdfmohamedsamy9878
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfKamal Acharya
 
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfKamal Acharya
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdfKamal Acharya
 
Roushan Kumar Java oracle certificate
Roushan Kumar Java oracle certificate Roushan Kumar Java oracle certificate
Roushan Kumar Java oracle certificate RaushanKumar452467
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamDr. Radhey Shyam
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationDr. Radhey Shyam
 
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单tuuww
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edgePaco Orozco
 

Último (20)

Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Lect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptxLect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptx
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
 
Online book store management system project.pdf
Online book store management system project.pdfOnline book store management system project.pdf
Online book store management system project.pdf
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Lecture_8-Digital implementation of analog controller design.pdf
Lecture_8-Digital implementation of analog controller design.pdfLecture_8-Digital implementation of analog controller design.pdf
Lecture_8-Digital implementation of analog controller design.pdf
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
 
Roushan Kumar Java oracle certificate
Roushan Kumar Java oracle certificate Roushan Kumar Java oracle certificate
Roushan Kumar Java oracle certificate
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 

ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt

  • 1. The Internet Protocol (IP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Transport Service (TCP) Connectionless Packet Delivery Service (IP)
  • 2. The Internet Protocol (IP) • Provides a packet delivery service which is: – Unreliable – Best-effort – Connectionless • Defines the basic unit of data transfer • Performs the routing function • Includes a set of rules that embody the idea of unreliable packet delivery
  • 3. IP Datagrams • The basic unit of data transfer Physical Network Internet Frame Datagram Frame Header Frame Data Datagram Header Datagram Data
  • 5. IP Datagram Service Type Field VERS HLEN SERVICE TYPE TOTAL LENGTH 0 1 2 3 4 5 6 7 PRECEDENCE D T R UNUSED 16 bits
  • 6. IP Datagram Service Type Field • In the 1990’s the meaning of the service type field was redefined: • For backwards compatibility: – When the last three codepoint bits are zero, the first three bits represent 8 classes of service (0 = least important, …, 7 = most important)
  • 7. IP Datagram Encapsulation Frame Header Frame Data Datagram Header Datagram Data What if a datagram won’t fit in a frame? Datagrams must move from machine to machine via physical networks
  • 8. Maximum Transfer Unit (MTU) • Each physical networking technology limits the amount of data that can fit in a frame – Ethernet: 1500 octets – FDDI: 4470 octets • This is called the network’s MTU • Limiting datagrams to fit in the smallest possible MTU would make travelling across networks with a larger MTU inefficient • Allowing datagrams to be larger than a network’s MTU means that datagrams will not always fir in a single frame
  • 9. Datagram Fragmentation • Divide datagrams too large to fit in one frame into pieces called fragments • Each fragment should fit into one frame • Transport fragments over physical network • Reassemble fragments into the complete datagram
  • 11. Datagram Fragmentation Example Datagram Header Data (4000 octets) Fragment 1 Header Data (1480 octets) Fragment 2 Header Data (1480 octets) Fragment 3 Header Data (1040 octets) Fragment headers duplicate datagram’s header (except for FLAGS field)
  • 12. Datagram Format Flags = DNF, FRAG, MF
  • 13. Reassembly of Fragments • Should fragments be reassembled after crossing one network or should we wait until the fragments arrive at their final destination to reassemble them? • Advantages? • Disadvantages?
  • 14. Internet Datagram Options • Used for network testing and debugging • Variable length field (depending on what options are selected) • Classes: – 0: Datagram or network control 1: Reserved for future use – 2: Debugging and measurement 3: Reserved for future use 0 1 2 3 4 5 6 7 Copy Class Option number
  • 15. Internet Datagram Options (cont) • Class 0 option numbers: Class 2 option numbers: – 0: End of options list - 4: Internet timestamp – 1: No operation – 2: Security and handling restrictions – 3: Loose source routing – 7: Record route – 8: Stream identifier – 9: Strict source routing 0 1 2 3 4 5 6 7 Copy Class Option number
  • 16. The Record Route Option • Source creates an empty list of IP addresses in the header • Set Record route option • Each router that handles the datagram appends its IP address to the list • Destination machine can extract and process the route information
  • 17. Source Route Option • Sender dictates a path through the internet over which the datagram must travel • Sender lists IP addresses (in order) of the route the datagram should take • Sender sets the source route option
  • 18. Source Route Option (cont) • Strict source routing - the path between two successive addresses in the list must consist of a single physical network • Loose source routing – The datagram must follow the sequence of IP addresses in the list – Allows multiple network hops between successive addresses on the list
  • 19. The Timestamp Option • Sender creates an empty list in the header • Sender enables the timestamp option • Each router that handles the datagram appends to the list its: – IP address – Local timestamp (in Universal Time)
  • 20. Processing Options During Fragmentation • Class 0 option numbers: Class 2 option numbers: – 0: End of options list - 4: Internet timestamp – 1: No operation – 2: Security and handling restrictions – 3: Loose source routing – 7: Record route – 8: Stream identifier – 9: Strict source routing 0 1 2 3 4 5 6 7 Copy Class Option number
  • 21. Processing Options During Fragmentation (cont) • When fragmenting a datagram a router: – Replicates some IP options in all fragments • Example? – Replicates some IP options in only one fragment • Example?
  • 22. IP – Security Issues • Destination IP address is used to route a datagram to its final destination • Source IP address identifies the sender so that the receiver knows where to send a reply • IP spoofing – sender of a datagram inserts the address of another machine (or a nonexistent machine) in the source address field – Prevent the receiver from determining the host from which an attack datagram originated – Make the message appear to have originated from a trusted machine – Want reply sent to a another (victim) host
  • 23. Teardrop • Tool enabled attackers to crash vulnerable remote systems by sending a certain type of fragmented IP datagram – Normal datagram fragments do not overlap – Teardrop created fragments that did overlap – Some implementations of the TCP/IP IP fragmentation re-assembly code do not properly handle overlapping IP fragments • Windows and some Linux kernels – Caused system to crash – Fixed by software patches
  • 24. Summary • The Internet Protocol (IP): – Provides a packet delivery service which is: • Unreliable • Best-effort • Connectionless – Defines the basic unit of data transfer – Performs the routing function – Includes a set of rules that embody the idea of unreliable packet delivery
  • 25. Summary (cont) Application Services (Telnet, FTP, e-mail, WWW) Reliable Transport Service (TCP) Connectionless Packet Delivery Service (IP)