SlideShare a Scribd company logo
1 of 25
The Internet Protocol (IP)
Application Services
(Telnet, FTP, e-mail, WWW)
Reliable Transport Service
(TCP)
Connectionless Packet Delivery Service
(IP)
The Internet Protocol (IP)
• Provides a packet delivery service which is:
– Unreliable
– Best-effort
– Connectionless
• Defines the basic unit of data transfer
• Performs the routing function
• Includes a set of rules that embody the idea of
unreliable packet delivery
IP Datagrams
• The basic unit of data transfer
Physical Network Internet
Frame Datagram
Frame Header
Frame
Data
Datagram Header
Datagram
Data
IP Datagram Format
IP Datagram Service Type Field
VERS HLEN SERVICE TYPE TOTAL LENGTH
0 1 2 3 4 5 6 7
PRECEDENCE D T R UNUSED
16 bits
IP Datagram Service Type Field
• In the 1990’s the meaning of the service type field
was redefined:
• For backwards compatibility:
– When the last three codepoint bits are zero, the first
three bits represent 8 classes of service (0 = least
important, …, 7 = most important)
IP Datagram Encapsulation
Frame Header Frame Data
Datagram Header Datagram Data
What if a datagram won’t fit in a frame?
Datagrams must move from machine to machine via
physical networks
Maximum Transfer Unit (MTU)
• Each physical networking technology limits the amount of
data that can fit in a frame
– Ethernet: 1500 octets
– FDDI: 4470 octets
• This is called the network’s MTU
• Limiting datagrams to fit in the smallest possible MTU
would make travelling across networks with a larger MTU
inefficient
• Allowing datagrams to be larger than a network’s MTU
means that datagrams will not always fir in a single frame
Datagram Fragmentation
• Divide datagrams too large to fit in one
frame into pieces called fragments
• Each fragment should fit into one frame
• Transport fragments over physical network
• Reassemble fragments into the complete
datagram
Datagram Fragmentation (cont)
Datagram Fragmentation
Example
Datagram Header Data (4000 octets)
Fragment 1 Header Data (1480 octets)
Fragment 2 Header Data (1480 octets)
Fragment 3 Header Data (1040 octets)
Fragment headers duplicate datagram’s header (except for
FLAGS field)
Datagram Format
Flags = DNF, FRAG, MF
Reassembly of Fragments
• Should fragments be reassembled after
crossing one network or should we wait
until the fragments arrive at their final
destination to reassemble them?
• Advantages?
• Disadvantages?
Internet Datagram Options
• Used for network testing and debugging
• Variable length field (depending on what
options are selected)
• Classes:
– 0: Datagram or network control 1: Reserved for future use
– 2: Debugging and measurement 3: Reserved for future use
0 1 2 3 4 5 6 7
Copy Class Option number
Internet Datagram Options (cont)
• Class 0 option numbers: Class 2 option numbers:
– 0: End of options list - 4: Internet timestamp
– 1: No operation
– 2: Security and handling restrictions
– 3: Loose source routing
– 7: Record route
– 8: Stream identifier
– 9: Strict source routing
0 1 2 3 4 5 6 7
Copy Class Option number
The Record Route Option
• Source creates an empty list of IP addresses
in the header
• Set Record route option
• Each router that handles the datagram
appends its IP address to the list
• Destination machine can extract and process
the route information
Source Route Option
• Sender dictates a path through the internet
over which the datagram must travel
• Sender lists IP addresses (in order) of the
route the datagram should take
• Sender sets the source route option
Source Route Option (cont)
• Strict source routing - the path between two
successive addresses in the list must consist
of a single physical network
• Loose source routing
– The datagram must follow the sequence of IP
addresses in the list
– Allows multiple network hops between
successive addresses on the list
The Timestamp Option
• Sender creates an empty list in the header
• Sender enables the timestamp option
• Each router that handles the datagram
appends to the list its:
– IP address
– Local timestamp (in Universal Time)
Processing Options During
Fragmentation
• Class 0 option numbers: Class 2 option numbers:
– 0: End of options list - 4: Internet timestamp
– 1: No operation
– 2: Security and handling restrictions
– 3: Loose source routing
– 7: Record route
– 8: Stream identifier
– 9: Strict source routing
0 1 2 3 4 5 6 7
Copy Class Option number
Processing Options During
Fragmentation (cont)
• When fragmenting a datagram a router:
– Replicates some IP options in all fragments
• Example?
– Replicates some IP options in only one
fragment
• Example?
IP – Security Issues
• Destination IP address is used to route a datagram to its
final destination
• Source IP address identifies the sender so that the receiver
knows where to send a reply
• IP spoofing – sender of a datagram inserts the address of
another machine (or a nonexistent machine) in the source
address field
– Prevent the receiver from determining the host from which an
attack datagram originated
– Make the message appear to have originated from a trusted
machine
– Want reply sent to a another (victim) host
Teardrop
• Tool enabled attackers to crash vulnerable remote systems
by sending a certain type of fragmented IP datagram
– Normal datagram fragments do not overlap
– Teardrop created fragments that did overlap
– Some implementations of the TCP/IP IP fragmentation re-assembly
code do not properly handle overlapping IP fragments
• Windows and some Linux kernels
– Caused system to crash
– Fixed by software patches
Summary
• The Internet Protocol (IP):
– Provides a packet delivery service which is:
• Unreliable
• Best-effort
• Connectionless
– Defines the basic unit of data transfer
– Performs the routing function
– Includes a set of rules that embody the idea of
unreliable packet delivery
Summary (cont)
Application Services
(Telnet, FTP, e-mail, WWW)
Reliable Transport Service
(TCP)
Connectionless Packet Delivery Service
(IP)

More Related Content

Similar to ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt

Similar to ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt (20)

tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
Introduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking TechnologyIntroduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking Technology
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdf
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ip
 
Dik acn presentation
Dik acn presentationDik acn presentation
Dik acn presentation
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt

  • 1. The Internet Protocol (IP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Transport Service (TCP) Connectionless Packet Delivery Service (IP)
  • 2. The Internet Protocol (IP) • Provides a packet delivery service which is: – Unreliable – Best-effort – Connectionless • Defines the basic unit of data transfer • Performs the routing function • Includes a set of rules that embody the idea of unreliable packet delivery
  • 3. IP Datagrams • The basic unit of data transfer Physical Network Internet Frame Datagram Frame Header Frame Data Datagram Header Datagram Data
  • 5. IP Datagram Service Type Field VERS HLEN SERVICE TYPE TOTAL LENGTH 0 1 2 3 4 5 6 7 PRECEDENCE D T R UNUSED 16 bits
  • 6. IP Datagram Service Type Field • In the 1990’s the meaning of the service type field was redefined: • For backwards compatibility: – When the last three codepoint bits are zero, the first three bits represent 8 classes of service (0 = least important, …, 7 = most important)
  • 7. IP Datagram Encapsulation Frame Header Frame Data Datagram Header Datagram Data What if a datagram won’t fit in a frame? Datagrams must move from machine to machine via physical networks
  • 8. Maximum Transfer Unit (MTU) • Each physical networking technology limits the amount of data that can fit in a frame – Ethernet: 1500 octets – FDDI: 4470 octets • This is called the network’s MTU • Limiting datagrams to fit in the smallest possible MTU would make travelling across networks with a larger MTU inefficient • Allowing datagrams to be larger than a network’s MTU means that datagrams will not always fir in a single frame
  • 9. Datagram Fragmentation • Divide datagrams too large to fit in one frame into pieces called fragments • Each fragment should fit into one frame • Transport fragments over physical network • Reassemble fragments into the complete datagram
  • 11. Datagram Fragmentation Example Datagram Header Data (4000 octets) Fragment 1 Header Data (1480 octets) Fragment 2 Header Data (1480 octets) Fragment 3 Header Data (1040 octets) Fragment headers duplicate datagram’s header (except for FLAGS field)
  • 12. Datagram Format Flags = DNF, FRAG, MF
  • 13. Reassembly of Fragments • Should fragments be reassembled after crossing one network or should we wait until the fragments arrive at their final destination to reassemble them? • Advantages? • Disadvantages?
  • 14. Internet Datagram Options • Used for network testing and debugging • Variable length field (depending on what options are selected) • Classes: – 0: Datagram or network control 1: Reserved for future use – 2: Debugging and measurement 3: Reserved for future use 0 1 2 3 4 5 6 7 Copy Class Option number
  • 15. Internet Datagram Options (cont) • Class 0 option numbers: Class 2 option numbers: – 0: End of options list - 4: Internet timestamp – 1: No operation – 2: Security and handling restrictions – 3: Loose source routing – 7: Record route – 8: Stream identifier – 9: Strict source routing 0 1 2 3 4 5 6 7 Copy Class Option number
  • 16. The Record Route Option • Source creates an empty list of IP addresses in the header • Set Record route option • Each router that handles the datagram appends its IP address to the list • Destination machine can extract and process the route information
  • 17. Source Route Option • Sender dictates a path through the internet over which the datagram must travel • Sender lists IP addresses (in order) of the route the datagram should take • Sender sets the source route option
  • 18. Source Route Option (cont) • Strict source routing - the path between two successive addresses in the list must consist of a single physical network • Loose source routing – The datagram must follow the sequence of IP addresses in the list – Allows multiple network hops between successive addresses on the list
  • 19. The Timestamp Option • Sender creates an empty list in the header • Sender enables the timestamp option • Each router that handles the datagram appends to the list its: – IP address – Local timestamp (in Universal Time)
  • 20. Processing Options During Fragmentation • Class 0 option numbers: Class 2 option numbers: – 0: End of options list - 4: Internet timestamp – 1: No operation – 2: Security and handling restrictions – 3: Loose source routing – 7: Record route – 8: Stream identifier – 9: Strict source routing 0 1 2 3 4 5 6 7 Copy Class Option number
  • 21. Processing Options During Fragmentation (cont) • When fragmenting a datagram a router: – Replicates some IP options in all fragments • Example? – Replicates some IP options in only one fragment • Example?
  • 22. IP – Security Issues • Destination IP address is used to route a datagram to its final destination • Source IP address identifies the sender so that the receiver knows where to send a reply • IP spoofing – sender of a datagram inserts the address of another machine (or a nonexistent machine) in the source address field – Prevent the receiver from determining the host from which an attack datagram originated – Make the message appear to have originated from a trusted machine – Want reply sent to a another (victim) host
  • 23. Teardrop • Tool enabled attackers to crash vulnerable remote systems by sending a certain type of fragmented IP datagram – Normal datagram fragments do not overlap – Teardrop created fragments that did overlap – Some implementations of the TCP/IP IP fragmentation re-assembly code do not properly handle overlapping IP fragments • Windows and some Linux kernels – Caused system to crash – Fixed by software patches
  • 24. Summary • The Internet Protocol (IP): – Provides a packet delivery service which is: • Unreliable • Best-effort • Connectionless – Defines the basic unit of data transfer – Performs the routing function – Includes a set of rules that embody the idea of unreliable packet delivery
  • 25. Summary (cont) Application Services (Telnet, FTP, e-mail, WWW) Reliable Transport Service (TCP) Connectionless Packet Delivery Service (IP)