Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH Lectures notes for 2010 - KTH

20.01.2014 Views

Resource Records (RR)................................................................................................................. 51 Network names .............................................................................................................................. 53 Example: ........................................................................................................................................ 55 MX information ............................................................................................................................. 56 Host names and info....................................................................................................................... 57 Storing other attributes - TXT records........................................................................................... 58 Configuring DNS........................................................................................................................... 59 Root servers ................................................................................................................................... 60 Load leveling [1]............................................................................................................................ 61 F root nameserver nodes ................................................................................................................ 62 Where is f.root-servers.net ? .......................................................................................................... 63 Where is i.root-servers.net ? .......................................................................................................... 64 Dynamic Domain Name System (DDNS) .................................................................................... 65 DDNS............................................................................................................................................. 66 Attacks upon DNS ......................................................................................................................... 67 DNS performance .......................................................................................................................... 68 DNS performance - top 100........................................................................................................... 69 Web performance........................................................................................................................... 70 Web performance - continued........................................................................................................ 71 Public/Commercial DNS services.................................................................................................. 72 Summary........................................................................................................................................ 73 References...................................................................................................................................... 74 Maguire xiii of xlii maguire@kth.se 2010.03.21 Internetworking/Internetteknik

Module 5: TCP, HTTP, RPC, NFS, X...................................................... 1 Lecture 4: Outline ............................................................................................................................ 2 Transport layer protocols ................................................................................................................. 3 Transmission Control Protocol (TCP) ............................................................................................. 4 Applications which use TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 TCP Header...................................................................................................................................... 6 TCP header continued...................................................................................................................... 7 Connection establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 SYN Flooding Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Connection teardown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 TCP options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Maximum Segment Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Sliding window Flow control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Window size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Flow for an rlogin session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Silly Window Syndrome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Nagle Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Disabling the Nagle Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Delayed acknowledgements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Resulting bulk data flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Bandwidth-Delay Product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Congestion Avoidance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Maguire xiv of xlii maguire@kth.se 2010.03.21 Internetworking/Internetteknik

Resource Records (RR)................................................................................................................. 51<br />

Network names .............................................................................................................................. 53<br />

Example: ........................................................................................................................................ 55<br />

MX in<strong>for</strong>mation ............................................................................................................................. 56<br />

Host names and info....................................................................................................................... 57<br />

Storing other attributes - TXT records........................................................................................... 58<br />

Configuring DNS........................................................................................................................... 59<br />

Root servers ................................................................................................................................... 60<br />

Load leveling [1]............................................................................................................................ 61<br />

F root nameserver nodes ................................................................................................................ 62<br />

Where is f.root-servers.net ? .......................................................................................................... 63<br />

Where is i.root-servers.net ? .......................................................................................................... 64<br />

Dynamic Domain Name System (DDNS) .................................................................................... 65<br />

DDNS............................................................................................................................................. 66<br />

Attacks upon DNS ......................................................................................................................... 67<br />

DNS per<strong>for</strong>mance .......................................................................................................................... 68<br />

DNS per<strong>for</strong>mance - top 100........................................................................................................... 69<br />

Web per<strong>for</strong>mance........................................................................................................................... 70<br />

Web per<strong>for</strong>mance - continued........................................................................................................ 71<br />

Public/Commercial DNS services.................................................................................................. 72<br />

Summary........................................................................................................................................ 73<br />

References...................................................................................................................................... 74<br />

Maguire xiii of xlii<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!