Lectures notes for 2010 - KTH
Lectures notes for 2010 - KTH Lectures notes for 2010 - KTH
other identification information about a client. Servers not equipped to interpret the class-specific information sent by a client must ignore it (although it may be reported). (tag=60) • Client-identifier - used by DHCP clients to specify their unique identifier. DHCP servers use this value to index their database of address bindings. This value is expected to be unique for all clients in an administrative domain. (tag=61) Maguire DHCP: Dynamic Host Configuration Protocol (RFC 1531) 4: 36 of 74 maguire@kth.se 2010.03.21 Internetworking/Internetteknik
DHCP’s importance • allows reuse of address, which avoids having to tie up addresses for systems which are not currently connected to the Internet • avoids user configuration of IP address (avoids mistakes and effort) • allows recycling of an IP address when devices are scrapped • … How big a problem is manual configuration? A large site (such as DuPont Co. - a large chemical company) has over 65,000 IP addressable devices; or consider what happens if each of the 815,000 Wal-Mart employees has an IP device Address management software Product Vendor URL Network Registrar Cisco http://www.cisco.com NetID Nortel Networks http://www.nortelnetworks.com Meta IP 4.1 CheckPoint http://www.metaip.checkpoint.com QIP Enterprise 5.0 Lucent Technologies http://qip.lucent.com Maguire DHCP’s importance 4: 37 of 74 maguire@kth.se 2010.03.21 Internetworking/Internetteknik
- Page 217 and 218: TTL field Time To Live (TTL) (8 bit
- Page 219 and 220: IPv4 Options • IPv4 options were
- Page 221 and 222: Categories of IP Options • Single
- Page 223 and 224: ICMP Port Unreachable Error Example
- Page 225 and 226: PING: Packet InterNet Groper or son
- Page 227 and 228: On a HP-UX 11.0 machine: ping -ov w
- Page 229 and 230: Useful Tool: Traceroute Programs De
- Page 231 and 232: This lecture we have discussed: •
- Page 233 and 234: IK1550 Internetworking/Internettekn
- Page 235 and 236: Transport layer protocols The trans
- Page 237 and 238: User Datagram Protocol (UDP) • Da
- Page 239 and 240: UDP Checksum and Pseudo-Header •
- Page 241 and 242: Port numbers in three groups Range
- Page 243 and 244: Fragmentation Required If datagram
- Page 245 and 246: • on a BSDI system: • each of t
- Page 247 and 248: With an even larger UDP packet I re
- Page 249 and 250: Datagram truncation What if the app
- Page 251 and 252: Learning about Socket programming F
- Page 253 and 254: UDP server design Stevens, Vol, 1,
- Page 255 and 256: Changed the client Changing the fol
- Page 257 and 258: if (!(proto = getprotobyname("raw")
- Page 259 and 260: ICMP Source Quench Error Since UDP
- Page 261 and 262: No error control Since UDP has no e
- Page 263 and 264: BOOTP continued When a request is s
- Page 265 and 266: DHCP: Dynamic Host Configuration Pr
- Page 267: • Message - used by a server to p
- Page 271 and 272: Example of dhcpd.conf ### Managed b
- Page 273 and 274: Trivial File Transfer Procotol (TFT
- Page 275 and 276: Mapping names to IP addresses Host
- Page 277 and 278: Zones A zone is a subtree of the DN
- Page 279 and 280: (see Stevens, Vol. 1, figure 14.2,
- Page 281 and 282: Domain registrars Internet Corporat
- Page 283 and 284: Resource Records (RR) See Stevens,
- Page 285 and 286: Network names Conventions: • it.k
- Page 287 and 288: Example: $ORIGIN it.kth.se. @ 1D IN
- Page 289 and 290: How to give your host a name? Host
- Page 291 and 292: Configuring DNS • Configuring the
- Page 293 and 294: Load leveling [1] For example, f.ro
- Page 295 and 296: Where is f.root-servers.net ? trace
- Page 297 and 298: Dynamic Domain Name System (DDNS) R
- Page 299 and 300: Attacks upon DNS • Denial of serv
- Page 301 and 302: DNS performance - top 100 From www.
- Page 303 and 304: Web performance - continued Using P
- Page 305 and 306: This lecture we have discussed: •
- Page 307 and 308: IK1550 Internetworking/Internettekn
- Page 309 and 310: Transport layer protocols • User
- Page 311 and 312: Applications which use TCP Lots of
- Page 313 and 314: TCP header continued Reliability is
- Page 315 and 316: time client SYN, seq=x SYN, seq=y,
- Page 317 and 318: client active close ACKs from clien
other identification in<strong>for</strong>mation about a client. Servers not equipped to<br />
interpret the class-specific in<strong>for</strong>mation sent by a client must ignore it<br />
(although it may be reported). (tag=60)<br />
• Client-identifier - used by DHCP clients to specify their unique<br />
identifier. DHCP servers use this value to index their database of<br />
address bindings. This value is expected to be unique <strong>for</strong> all clients in<br />
an administrative domain. (tag=61)<br />
Maguire DHCP: Dynamic Host Configuration Protocol (RFC 1531) 4: 36 of 74<br />
maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik