SlideShare a Scribd company logo
1 of 25
The Internet Protocol (IP)
Application Services
(Telnet, FTP, e-mail, WWW)
Reliable Transport Service
(TCP)
Connectionless Packet Delivery Service
(IP)
The Internet Protocol (IP)
• Provides a packet delivery service which is:
– Unreliable
– Best-effort
– Connectionless
• Defines the basic unit of data transfer
• Performs the routing function
• Includes a set of rules that embody the idea of
unreliable packet delivery
IP Datagrams
• The basic unit of data transfer
Physical Network Internet
Frame Datagram
Frame Header
Frame
Data
Datagram Header
Datagram
Data
IP Datagram Format
IP Datagram Service Type Field
VERS HLEN SERVICE TYPE TOTAL LENGTH
0 1 2 3 4 5 6 7
PRECEDENCE D T R UNUSED
16 bits
IP Datagram Service Type Field
• In the 1990’s the meaning of the service type field
was redefined:
• For backwards compatibility:
– When the last three codepoint bits are zero, the first
three bits represent 8 classes of service (0 = least
important, …, 7 = most important)
IP Datagram Encapsulation
Frame Header Frame Data
Datagram Header Datagram Data
What if a datagram won’t fit in a frame?
Datagrams must move from machine to machine via
physical networks
Maximum Transfer Unit (MTU)
• Each physical networking technology limits the amount of
data that can fit in a frame
– Ethernet: 1500 octets
– FDDI: 4470 octets
• This is called the network’s MTU
• Limiting datagrams to fit in the smallest possible MTU
would make travelling across networks with a larger MTU
inefficient
• Allowing datagrams to be larger than a network’s MTU
means that datagrams will not always fir in a single frame
Datagram Fragmentation
• Divide datagrams too large to fit in one
frame into pieces called fragments
• Each fragment should fit into one frame
• Transport fragments over physical network
• Reassemble fragments into the complete
datagram
Datagram Fragmentation (cont)
Datagram Fragmentation
Example
Datagram Header Data (4000 octets)
Fragment 1 Header Data (1480 octets)
Fragment 2 Header Data (1480 octets)
Fragment 3 Header Data (1040 octets)
Fragment headers duplicate datagram’s header (except for
FLAGS field)
Datagram Format
Flags = DNF, FRAG, MF
Reassembly of Fragments
• Should fragments be reassembled after
crossing one network or should we wait
until the fragments arrive at their final
destination to reassemble them?
• Advantages?
• Disadvantages?
Internet Datagram Options
• Used for network testing and debugging
• Variable length field (depending on what
options are selected)
• Classes:
– 0: Datagram or network control 1: Reserved for future use
– 2: Debugging and measurement 3: Reserved for future use
0 1 2 3 4 5 6 7
Copy Class Option number
Internet Datagram Options (cont)
• Class 0 option numbers: Class 2 option numbers:
– 0: End of options list - 4: Internet timestamp
– 1: No operation
– 2: Security and handling restrictions
– 3: Loose source routing
– 7: Record route
– 8: Stream identifier
– 9: Strict source routing
0 1 2 3 4 5 6 7
Copy Class Option number
The Record Route Option
• Source creates an empty list of IP addresses
in the header
• Set Record route option
• Each router that handles the datagram
appends its IP address to the list
• Destination machine can extract and process
the route information
Source Route Option
• Sender dictates a path through the internet
over which the datagram must travel
• Sender lists IP addresses (in order) of the
route the datagram should take
• Sender sets the source route option
Source Route Option (cont)
• Strict source routing - the path between two
successive addresses in the list must consist
of a single physical network
• Loose source routing
– The datagram must follow the sequence of IP
addresses in the list
– Allows multiple network hops between
successive addresses on the list
The Timestamp Option
• Sender creates an empty list in the header
• Sender enables the timestamp option
• Each router that handles the datagram
appends to the list its:
– IP address
– Local timestamp (in Universal Time)
Processing Options During
Fragmentation
• Class 0 option numbers: Class 2 option numbers:
– 0: End of options list - 4: Internet timestamp
– 1: No operation
– 2: Security and handling restrictions
– 3: Loose source routing
– 7: Record route
– 8: Stream identifier
– 9: Strict source routing
0 1 2 3 4 5 6 7
Copy Class Option number
Processing Options During
Fragmentation (cont)
• When fragmenting a datagram a router:
– Replicates some IP options in all fragments
• Example?
– Replicates some IP options in only one
fragment
• Example?
IP – Security Issues
• Destination IP address is used to route a datagram to its
final destination
• Source IP address identifies the sender so that the receiver
knows where to send a reply
• IP spoofing – sender of a datagram inserts the address of
another machine (or a nonexistent machine) in the source
address field
– Prevent the receiver from determining the host from which an
attack datagram originated
– Make the message appear to have originated from a trusted
machine
– Want reply sent to a another (victim) host
Teardrop
• Tool enabled attackers to crash vulnerable remote systems
by sending a certain type of fragmented IP datagram
– Normal datagram fragments do not overlap
– Teardrop created fragments that did overlap
– Some implementations of the TCP/IP IP fragmentation re-assembly
code do not properly handle overlapping IP fragments
• Windows and some Linux kernels
– Caused system to crash
– Fixed by software patches
Summary
• The Internet Protocol (IP):
– Provides a packet delivery service which is:
• Unreliable
• Best-effort
• Connectionless
– Defines the basic unit of data transfer
– Performs the routing function
– Includes a set of rules that embody the idea of
unreliable packet delivery
Summary (cont)
Application Services
(Telnet, FTP, e-mail, WWW)
Reliable Transport Service
(TCP)
Connectionless Packet Delivery Service
(IP)

More Related Content

Similar to ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt

Similar to ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt (20)

tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
Introduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking TechnologyIntroduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking Technology
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdf
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ip
 
Dik acn presentation
Dik acn presentationDik acn presentation
Dik acn presentation
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt

  • 1. The Internet Protocol (IP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Transport Service (TCP) Connectionless Packet Delivery Service (IP)
  • 2. The Internet Protocol (IP) • Provides a packet delivery service which is: – Unreliable – Best-effort – Connectionless • Defines the basic unit of data transfer • Performs the routing function • Includes a set of rules that embody the idea of unreliable packet delivery
  • 3. IP Datagrams • The basic unit of data transfer Physical Network Internet Frame Datagram Frame Header Frame Data Datagram Header Datagram Data
  • 5. IP Datagram Service Type Field VERS HLEN SERVICE TYPE TOTAL LENGTH 0 1 2 3 4 5 6 7 PRECEDENCE D T R UNUSED 16 bits
  • 6. IP Datagram Service Type Field • In the 1990’s the meaning of the service type field was redefined: • For backwards compatibility: – When the last three codepoint bits are zero, the first three bits represent 8 classes of service (0 = least important, …, 7 = most important)
  • 7. IP Datagram Encapsulation Frame Header Frame Data Datagram Header Datagram Data What if a datagram won’t fit in a frame? Datagrams must move from machine to machine via physical networks
  • 8. Maximum Transfer Unit (MTU) • Each physical networking technology limits the amount of data that can fit in a frame – Ethernet: 1500 octets – FDDI: 4470 octets • This is called the network’s MTU • Limiting datagrams to fit in the smallest possible MTU would make travelling across networks with a larger MTU inefficient • Allowing datagrams to be larger than a network’s MTU means that datagrams will not always fir in a single frame
  • 9. Datagram Fragmentation • Divide datagrams too large to fit in one frame into pieces called fragments • Each fragment should fit into one frame • Transport fragments over physical network • Reassemble fragments into the complete datagram
  • 11. Datagram Fragmentation Example Datagram Header Data (4000 octets) Fragment 1 Header Data (1480 octets) Fragment 2 Header Data (1480 octets) Fragment 3 Header Data (1040 octets) Fragment headers duplicate datagram’s header (except for FLAGS field)
  • 12. Datagram Format Flags = DNF, FRAG, MF
  • 13. Reassembly of Fragments • Should fragments be reassembled after crossing one network or should we wait until the fragments arrive at their final destination to reassemble them? • Advantages? • Disadvantages?
  • 14. Internet Datagram Options • Used for network testing and debugging • Variable length field (depending on what options are selected) • Classes: – 0: Datagram or network control 1: Reserved for future use – 2: Debugging and measurement 3: Reserved for future use 0 1 2 3 4 5 6 7 Copy Class Option number
  • 15. Internet Datagram Options (cont) • Class 0 option numbers: Class 2 option numbers: – 0: End of options list - 4: Internet timestamp – 1: No operation – 2: Security and handling restrictions – 3: Loose source routing – 7: Record route – 8: Stream identifier – 9: Strict source routing 0 1 2 3 4 5 6 7 Copy Class Option number
  • 16. The Record Route Option • Source creates an empty list of IP addresses in the header • Set Record route option • Each router that handles the datagram appends its IP address to the list • Destination machine can extract and process the route information
  • 17. Source Route Option • Sender dictates a path through the internet over which the datagram must travel • Sender lists IP addresses (in order) of the route the datagram should take • Sender sets the source route option
  • 18. Source Route Option (cont) • Strict source routing - the path between two successive addresses in the list must consist of a single physical network • Loose source routing – The datagram must follow the sequence of IP addresses in the list – Allows multiple network hops between successive addresses on the list
  • 19. The Timestamp Option • Sender creates an empty list in the header • Sender enables the timestamp option • Each router that handles the datagram appends to the list its: – IP address – Local timestamp (in Universal Time)
  • 20. Processing Options During Fragmentation • Class 0 option numbers: Class 2 option numbers: – 0: End of options list - 4: Internet timestamp – 1: No operation – 2: Security and handling restrictions – 3: Loose source routing – 7: Record route – 8: Stream identifier – 9: Strict source routing 0 1 2 3 4 5 6 7 Copy Class Option number
  • 21. Processing Options During Fragmentation (cont) • When fragmenting a datagram a router: – Replicates some IP options in all fragments • Example? – Replicates some IP options in only one fragment • Example?
  • 22. IP – Security Issues • Destination IP address is used to route a datagram to its final destination • Source IP address identifies the sender so that the receiver knows where to send a reply • IP spoofing – sender of a datagram inserts the address of another machine (or a nonexistent machine) in the source address field – Prevent the receiver from determining the host from which an attack datagram originated – Make the message appear to have originated from a trusted machine – Want reply sent to a another (victim) host
  • 23. Teardrop • Tool enabled attackers to crash vulnerable remote systems by sending a certain type of fragmented IP datagram – Normal datagram fragments do not overlap – Teardrop created fragments that did overlap – Some implementations of the TCP/IP IP fragmentation re-assembly code do not properly handle overlapping IP fragments • Windows and some Linux kernels – Caused system to crash – Fixed by software patches
  • 24. Summary • The Internet Protocol (IP): – Provides a packet delivery service which is: • Unreliable • Best-effort • Connectionless – Defines the basic unit of data transfer – Performs the routing function – Includes a set of rules that embody the idea of unreliable packet delivery
  • 25. Summary (cont) Application Services (Telnet, FTP, e-mail, WWW) Reliable Transport Service (TCP) Connectionless Packet Delivery Service (IP)