Lectures notes for 2010 - KTH
Lectures notes for 2010 - KTH Lectures notes for 2010 - KTH
Resource Records (RR)................................................................................................................. 51 Network names .............................................................................................................................. 53 Example: ........................................................................................................................................ 55 MX information ............................................................................................................................. 56 Host names and info....................................................................................................................... 57 Storing other attributes - TXT records........................................................................................... 58 Configuring DNS........................................................................................................................... 59 Root servers ................................................................................................................................... 60 Load leveling [1]............................................................................................................................ 61 F root nameserver nodes ................................................................................................................ 62 Where is f.root-servers.net ? .......................................................................................................... 63 Where is i.root-servers.net ? .......................................................................................................... 64 Dynamic Domain Name System (DDNS) .................................................................................... 65 DDNS............................................................................................................................................. 66 Attacks upon DNS ......................................................................................................................... 67 DNS performance .......................................................................................................................... 68 DNS performance - top 100........................................................................................................... 69 Web performance........................................................................................................................... 70 Web performance - continued........................................................................................................ 71 Public/Commercial DNS services.................................................................................................. 72 Summary........................................................................................................................................ 73 References...................................................................................................................................... 74 Maguire xiii of xlii maguire@kth.se 2010.03.21 Internetworking/Internetteknik
Module 5: TCP, HTTP, RPC, NFS, X...................................................... 1 Lecture 4: Outline ............................................................................................................................ 2 Transport layer protocols ................................................................................................................. 3 Transmission Control Protocol (TCP) ............................................................................................. 4 Applications which use TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 TCP Header...................................................................................................................................... 6 TCP header continued...................................................................................................................... 7 Connection establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 SYN Flooding Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Connection teardown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 TCP options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Maximum Segment Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Sliding window Flow control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Window size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Flow for an rlogin session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Silly Window Syndrome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Nagle Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Disabling the Nagle Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Delayed acknowledgements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Resulting bulk data flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Bandwidth-Delay Product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Congestion Avoidance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Maguire xiv of xlii maguire@kth.se 2010.03.21 Internetworking/Internetteknik
- Page 1 and 2: IK1550 Internetworking/Internettekn
- Page 3 and 4: Internetworking....................
- Page 5 and 6: Virtual Interface (VIF)............
- Page 7 and 8: Module 2: IP Basics: Routing, ARP,
- Page 9 and 10: Wireshark’s IO Graph functionalit
- Page 11 and 12: ICMP Redirect .....................
- Page 13: Building a UDP packet from scratch
- Page 17 and 18: Problems with multiple connections.
- Page 19 and 20: Module 6: SCTP ....................
- Page 21 and 22: Module 7: Dynamic Routing .........
- Page 23 and 24: BGP Open Message ..................
- Page 25 and 26: IGMP Implementation Details........
- Page 27 and 28: Capacity Assignment ...............
- Page 29 and 30: Network Management Systems ........
- Page 31 and 32: Module 10: IPv6 ...................
- Page 33 and 34: Why IPv6? .........................
- Page 35 and 36: Wireless WANs . . . . . . . . . . .
- Page 37 and 38: Module 12: IPSec, VPNs, Firewalls,
- Page 39 and 40: Module 13: Future and Summary......
- Page 41 and 42: Peer to peer networking ...........
- Page 43 and 44: Module 14: Some exercises..........
- Page 45 and 46: Welcome to the Internetworking cour
- Page 47 and 48: Goals, Scope and Method Goals of th
- Page 49 and 50: Learning Outcomes Following this co
- Page 51 and 52: Prerequisites • Datorkommunikatio
- Page 53 and 54: Topics • What an internet is and
- Page 55 and 56: Grades: A..F (ECTS grades) • To g
- Page 57 and 58: Written Assignment Goal: to gain an
- Page 59 and 60: Literature The course will mainly b
- Page 61 and 62: Lecture Plan Subject to revision!
- Page 63 and 64: Context of the module Communication
Resource Records (RR)................................................................................................................. 51<br />
Network names .............................................................................................................................. 53<br />
Example: ........................................................................................................................................ 55<br />
MX in<strong>for</strong>mation ............................................................................................................................. 56<br />
Host names and info....................................................................................................................... 57<br />
Storing other attributes - TXT records........................................................................................... 58<br />
Configuring DNS........................................................................................................................... 59<br />
Root servers ................................................................................................................................... 60<br />
Load leveling [1]............................................................................................................................ 61<br />
F root nameserver nodes ................................................................................................................ 62<br />
Where is f.root-servers.net ? .......................................................................................................... 63<br />
Where is i.root-servers.net ? .......................................................................................................... 64<br />
Dynamic Domain Name System (DDNS) .................................................................................... 65<br />
DDNS............................................................................................................................................. 66<br />
Attacks upon DNS ......................................................................................................................... 67<br />
DNS per<strong>for</strong>mance .......................................................................................................................... 68<br />
DNS per<strong>for</strong>mance - top 100........................................................................................................... 69<br />
Web per<strong>for</strong>mance........................................................................................................................... 70<br />
Web per<strong>for</strong>mance - continued........................................................................................................ 71<br />
Public/Commercial DNS services.................................................................................................. 72<br />
Summary........................................................................................................................................ 73<br />
References...................................................................................................................................... 74<br />
Maguire xiii of xlii<br />
maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik