1 04-NetworkData


1.1 Audio-recording

1.2 Opening thoughts

04-NetworkData/address.png
Port number is a form of address from the the layer just above,
that we just finished (the transport layer).
https://en.wikipedia.org/wiki/Port_(computer_networking)

IP address (those above in image) is the layer we’re doing now (the network layer)
https://en.wikipedia.org/wiki/IP_address

MAC address (the hex address last sent in image above)
is the next layer down that we will do next (the link layer).
https://en.wikipedia.org/wiki/MAC_address

Reminder (look back at section on encapsulation and layering after completing every layer):
01-Overview.html

1.3 More reading

https://www.computer-networking.info/1st/html/network/network.html
https://www.computer-networking.info/2nd/html/protocols/ipv6.html
https://www.computer-networking.info/2nd/html/protocols/ipv6b.html

http://intronetworks.cs.luc.edu/current/uhtml/intro.html#ip-internet-protocol
http://intronetworks.cs.luc.edu/current/uhtml/ipv4.html
http://intronetworks.cs.luc.edu/current/uhtml/ipv6a.html
http://intronetworks.cs.luc.edu/current/uhtml/ipv6b.html

https://en.wikipedia.org/wiki/Network_layer
https://en.wikipedia.org/wiki/Internet_layer
https://en.wikipedia.org/wiki/Internet_Protocol
https://en.wikipedia.org/wiki/IP_address

1.4 Introduction

04-NetworkData/frame.png
Previous-Previous: Application headers (data from this perspective)
Previous: transport header (Example is UDP in diagram, but could be TCP)
Now: IP header
Next: Data link framing
Next-Next: Physical layer

1.4.1 Scope

Network layer is hard to upgrade or change (it’s everywhere)!
04-NetworkData/kurose_ch4_00.png

1.4.1.1 Forwarding and routing

Role of the network layer is simple, to move packets from a sending host to a receiving host.

Two important network-layer functions can be identified:

1.4.1.1.1 1. Forwarding
04-NetworkData/kurose_ch4_01.png
1.4.1.1.2 2. Routing

+++++++++++++++++++++ Cahoot-04-1

1.4.1.2 Data plane and control plane

We divide the network layer based on these functions.

1.4.1.2.1 Data plane
1.4.1.2.2 Control plane

+++++++++++++++++++++ Cahoot-04-2

A quick forward-reference:
ARP (Address Resolution Protocol) queries use a know IP address to lookup a MAC address (link layer address),
so that a switch (data-link layer 2 device that routes based on MAC address) can send directly to an interface by saying:

“Hey all on the mac layer, whoever has this IP address, what is their MAC address?”

1.4.3 IPv4 address (more to come below)

04-NetworkData/IPv4_address.png

1.4.4 Routing algorithms build forwarding tables

Every router has a forwarding table.
A router forwards a packet by examining the value of the IP field in the arriving packet’s header,
and then using this header value to index into the router’s forwarding table.
The value stored in the forwarding table entry for that header indicates the router’s outgoing link interface,
to which that packet is to be forwarded.
Note: the diagram immediately below is idealized to have a short bit chunk, but the principles are the same for real IP addresses:
04-NetworkData/kurose_ch4_01.png

Routing sets up these forwarding tables.
The routing algorithm to determine tables may be centralized (e.g., with an algorithm executing on a central site and downloading routing information to each of the routers) or decentralized (i.e., with a piece of the distributed routing algorithm running in each router).
In either case, a router receives routing protocol messages, which are used to configure its forwarding table.

1.4.4.1 Classic vs. Software defined network (SDN)

1.4.4.1.1 Classic

04-NetworkData/pasted_image.png
Individual routing algorithm components in each and every router interact in the control plane.

1.4.4.1.2 SDN

04-NetworkData/pasted_image001.png
A distinct (typically remote) controller interacts with local control agents (CAs).

1.4.5 Datagram networks

04-NetworkData/kurose_ch4_02.png
In a datagram network, each time an end system wants to send a packet, it stamps the packet with the address of the destination end system, and then pops the packet into the network.

1.4.5.1 Datagram packet routing

1.4.5.2 Routing tables

Suppose that our router has four links, numbered 0 through 3, and that packets are to be forwarded to the link interfaces as follows:
04-NetworkData/kurose_ch4_03.png

Important points to ponder:
If IP addresses are sold in blocks, where might ranges end up, geographically?
If ranges of addresses are re-sold, where might they end up?
Why can a match in the routing table be shorter than an IP address itself?
Why should it be?
Why do we match the longest prefix?

1.4.5.2.1 Longest prefix match

When there are multiple matches, the router uses the longest prefix matching rule.
That is, it finds the longest matching entry in the table and forwards the packet to the link interface associated with the longest prefix match.
04-NetworkData/kurose_ch4_04.png

+++++++++++++++++++++ Cahoot-04-3

1.5 Router internals

04-NetworkData/kurose_ch4_05.png

1.5.1 Input ports

04-NetworkData/kurose_ch4_05.png

1.5.2 Switching fabric

04-NetworkData/kurose_ch4_05.png
The switching fabric connects the router’s input ports to its output ports.
This switching fabric is completely contained within the router,
a network inside of a network router!

1.5.3 Output ports

04-NetworkData/kurose_ch4_05.png

1.5.4 Routing processor

04-NetworkData/kurose_ch4_05.png
The routing processor executes the routing protocols,
maintains routing tables and attached link state information,
and computes the forwarding table for the router.
It also performs the network management functions.

1.5.5 Input processing

The lookup performed in the input port is central to the router’s operation.
It is here that the router uses the forwarding table, to look up the output port,
to which an arriving packet will be forwarded via the switching fabric.
The forwarding table is computed and updated by the routing processor,
with a shadow copy typically stored at each input port.
Each input port searches through the forwarding table looking for the longest prefix match
Once a packet’s output port has been determined via the lookup,
the packet can be sent into the switching fabric.

04-NetworkData/kurose_ch4_06.png

1.5.6 Switching

Switching architecture variations:
04-NetworkData/kurose_ch4_07.png
Which is fastest?

1.5.7 Output processing

04-NetworkData/kurose_ch4_08.png
Takes packets that have been stored in the output port’s memory and transmits them over the output link.
This includes selecting and de-queueing packets for transmission,
and performing the needed link-layer to physical-layer transmission functions.

1.5.8 Queuing

As queues grow large, the router’s memory can eventually be exhausted and packet loss will occur when no memory is available to store arriving packets.

Output port queuing:
04-NetworkData/kurose_ch4_09.png

Head of line (HOL) blocking in input queuing
04-NetworkData/kurose_ch4_10.png

1.5.9 Router control plane (more to come)

04-NetworkData/kurose_ch4_05.png

1.5.10 Queuing

1.5.10.0.1 FIFO

first-in-first out
04-NetworkData/pasted_image002.png
04-NetworkData/pasted_image003.png

1.5.10.0.2 Priority queue

04-NetworkData/pasted_image004.png
04-NetworkData/pasted_image005.png
Who determines priority?

1.5.10.0.3 Round-robin and weighted fair queuing

04-NetworkData/pasted_image006.png
04-NetworkData/pasted_image007.png

1.6 Architecture

Network layer components
04-NetworkData/kurose_ch4_11.png

1.6.1 IP addresses in routers

Show some virtual interfaces.
What does Wireshark do with these?

+++++++++++++++++++++ Cahoot-04-4

1.7 IPv4 datagram

https://en.m.wikipedia.org/wiki/IPv4

I tried to come up with an IPv4 joke,
but the good ones were all already exhausted.

1.7.1 IPv4 address

04-NetworkData/IPv4_address.png

1.7.2 Examples

1.2.3.4 corresponds to 00000001 00000010 00000011 00000100
127.0.0.1 corresponds to 01111111 00000000 00000000 00000001
255.255.255.255 corresponds to 11111111 11111111 11111111 11111111

1.7.3 IPv4 Datagram header

04-NetworkData/kurose_ch4_12.png

IPv4 Datagram header details
04-NetworkData/ipv4_header.png

04-NetworkData/detail_ip_header.png

+++++++++++++++ Cahoot-04-5

1.7.4 IPv4 fragmentation

https://lwn.net/Articles/960913/
Identification is the same per-segment.
Offset identifies the fragments for each segment.
04-NetworkData/kurose_ch4_13.png
04-NetworkData/kurose_ch4_14.png

1.7.5 IPv4 address

04-NetworkData/IPv4_address.png
232 = 4,294,967,296

…about 4.3 billion addresses is not that many.

1.8 Interface addresses and sub-nets

Three separate sub-networks (sub-nets) each has it’s own block of IP addresses:
04-NetworkData/kurose_ch4_15.png
04-NetworkData/subnet_slice.png

Put more routers in the middle, and it’s like the internet:
04-NetworkData/kurose_ch4_17.png

1.8.1 Sub-net addressing

Hierarchically divide IP addresses and networks:
To determine the sub-nets, detach each interface from its host or router,
creating islands of isolated networks,
with interfaces terminating the end points of the isolated networks.
Each of these isolated networks is called a sub-net.

1.8.1.1 Sub-networks

https://en.wikipedia.org/wiki/sub-network
04-NetworkData/subnet_slice.png

The old way of hierarchically dividing up IP addresses:
https://en.wikipedia.org/wiki/Classful_network
where the IP address is divided up into:
n is the network portion
H is the host portion
04-NetworkData/class-addr2.png
Above, the general pattern is illustrated with the n and H, but the particular ranges of IP addresses are those arbitrarily actually assigned to the world by ICANN.
04-NetworkData/class-addr.png
Above, this table not only illustrates the general pattern, but also the specific more arbitrary ranges assigned to the world by ICANN.

Columns that are general:

Columns that are particular to the actual arbitrary real assignment

1.8.1.2 CIDR

because it was too classy and stiff…

++++++++++++++++++++++++++ Cahoot-04-6

04-NetworkData/subnet_slice.png
04-NetworkData/subnet_basic.png
04-NetworkData/subnets.png
04-NetworkData/subnet_color.png

1.8.1.3 Sub-net mask

You may have understood this in integer encoding:
04-NetworkData/subnet_divide.jpg
Sub-net masks are often expressed in dot-decimal notation like an address.
For example, 255.255.255.0 is the sub-net mask for the prefix 198.51.100.0/24.

But, sub-net masks really make sense when you think about IP addresses in binary encoding:
For IPv4, a network may also be characterized by its sub-net mask or netmask.
This is a binary trick, to illustrate the h.N pattern.
Functionally, it ends up cleaving the IP address into two parts, the leading network portion, and the trailing host portion.

Specifically, it is a bitmask applied by a bitwise AND operation,
to any IP address in the network, yielding the routing prefix (see below).

Example 1 on a full class sub-net:
04-NetworkData/subnet0.png

Example 2 on a partial CIDR sub-net.
04-NetworkData/subnet01.png

In summary:
04-NetworkData/subnet_Network.gif

https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing#IPv4_CIDR_blocks
04-NetworkData/subnet_cidr_bin.png

++++++++++++++++++++++++++++++++ Cahoot-04-7

1.8.1.4 Special addresses

https://en.wikipedia.org/wiki/IPv4#Special-use_addresses
(check this out in class)

1.8.1.4.1 Loopback / localhost

There is no place like 127.0.0.1

https://en.wikipedia.org/wiki/Localhost

vim /etc/hosts
127.0.0.1 localhost
::1 localhost

Last row above is IPv6 shorthand (more below).

1.8.1.4.2 Broadcast and addresses ending in 0 or 255
1.8.1.4.3 Private addresses

192.168.0.1 jokes are best told in private…

You can do whatever you want with these on your private network, e.g., at home.

+++++++++++++++++++ Cahoot-04-8

1.9 Obtaining IP addresses

An IPv4 address walks into a bar and yells,
“Bartender! Give me a cidr, I’m exhausted!”

04-NetworkData/kurose_ch4_18.png
There are eight /23 sub-nets in one /20 sub-net (3 bits consumed, 2**3=8)

1.9.1 Allocation

https://en.wikipedia.org/wiki/ICANN
The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA),
and by five regional Internet registries (RIR) responsible in their designated territories,
for assignment to end users and local Internet registries, such as Internet service providers.
ICANN assigns blocks to ISPs, regions, countries, etc.
Companies (including ISPs) buy and sell them.
ISPs assign them to consumers or other businesses.

1.9.1.1 Hierarchy in practice

04-NetworkData/pasted_image008.png
After a company re-selling a block:
04-NetworkData/pasted_image009.png
Ask: What happens when the ranges are not nicely divided?

Didn’t we run out of IPv4 jokes?

1.9.1.2 IPv4 space exhaustion

https://en.wikipedia.org/wiki/IPv4_address_exhaustion
04-NetworkData/ipv4-timeline.png
The top-level exhaustion occurred on 31 January 2011.
04-NetworkData/Ipv4-exhaust.svg

04-NetworkData/Rir-rate.svg

The consequence of the above, with longest-prefix matching is:

Evolution of the size of the routing tables on the Internet (Jul 1988- Dec 1992 - source : RFC 1518)
04-NetworkData/network-fig-162-c.png
and more modern:
04-NetworkData/bgp-figure11.png

1.9.1.2.1 Solutions

Some mitigation efforts and technologies include:

1.9.2 Dynamic Host Configuration Protocol (DHCP)

https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
* [ ] https://www.homenethowto.com/basics/giving-the-computer-an-ip-address/

Client-server
When logging into a network, how does an interface get an IP address?

Either:
1. Hard coded by sys-admin
2. DHCP

04-NetworkData/kurose_ch4_19.png
Goal: Allow host to dynamically obtain its IP address from network server when it joins network.
Host can also renew its lease on an address in use.
Allows reuse of retired addresses (only hold address while connected/“on”).

DHCP is a client-server protocol:

1.9.2.1 DHCP process

  1. DHCP discover message, which a client sends within a UDP packet to port 67, broadcast
  2. A DHCP server receiving a DHCP discover message responds to the client with a DHCP offer message that is broadcast to all nodes on the sub-net, again using the IP broadcast address of 255.255.255.255.
  3. DHCP request. The newly arriving client will choose from among one or more server offers and respond to its selected offer with a DHCP request message, echoing back the configuration parameters.
  4. DHCP ACK. The server responds to the DHCP request message with a DHCP ACK message, confirming the requested parameters.

DHCP query response
04-NetworkData/kurose_ch4_20.png
In addition to host IP address assignment,
DHCP also allows a host to learn additional information, such as its:
subnet mask (indicating network versus host portion of address),
the address of its first-hop router (often called the default gateway), and
the address of its local DNS server.

1.9.2.2 Example

DHCP provides an IP address, and also usually more, including:

1.10 MiddleBoxes

https://en.wikipedia.org/wiki/Middlebox#Criticism_and_challenges
“Middleboxes have generated technical challenges for application development and have incurred scorn and dismay in the network architecture community for violating the end-to-end principle of computer system design.”

Some types of middlebox covered here:

  1. Firewall, IPS, IDS
  2. NAT
  3. Remote generalized SDN / Deep Packet Inspectors (DPI)
  4. Load balancers

1.10.1 (1) Firewall, IPS, IDS

The first middlebox is:

1.10.1.0.1 Firewall (more later)
1.10.1.0.2 IDS
1.10.1.0.3 IPS

1.10.2 (2) Network address translation (NAT)

The second middlebox is:

https://en.m.wikipedia.org/wiki/Network_address_translation

Network Address Translation (NAT) was proposed in [TE1993] and RFC 3022 as a short term solution to deal with the expected shortage of IPv4 addresses in the late 1980s - early 1990s.

1.10.2.1 Motivation

Local network uses just one IP address as far as outside world is concerned:

1.10.2.2 Process

NAT router must:

1.10.2.3 Details

1.10.2.4 Summary

1.10.2.4.1 Wireshark NAT

1.10.3 (3) Generalized forwarding and software defined networking (SDN)

The third middlebox is:
https://en.wikipedia.org/wiki/Software-defined_networking
For example:
https://en.wikipedia.org/wiki/OpenFlow

Packets can be routed based on arbitrary header content (think firewalls above).
SDN can route packets based on application, data-link, transport, or any layer data,
for managing traffic, security, payment, or whatever else desired.

1.10.4 (4) Load balancers

https://en.wikipedia.org/wiki/Load_balancing_(computing)#Internet-based_services

+++++++++++++++++++++++ Cahoot-04-9

1.11 IPv6

https://en.m.wikipedia.org/wiki/IPv6

I heard this really great IPv6 joke,
but I just don’t think you’re ready for it.

IPv6 streamlined the protocol, eliminating work for core routers, deferring that work to the periphery.
For example, IPv6 does not calculate checksums or fragmentation.
This supports the:
https://en.wikipedia.org/wiki/End-to-end_principle

1.11.1 IPv6 address format

04-NetworkData/IPv6_address.png

The sad thing about IPv6 jokes,
is that almost no one understands them,
and no one is using them yet.

Examples
2001:db8:0:0:8:800:200c:417a is represented as 2001:db8::8:800:200c:417a
ff01:0:0:0:0:0:0:101 is represented as ff01::101
0:0:0:0:0:0:0:1 is represented as ::1
0:0:0:0:0:0:0:0 is represented as ::

1.11.1.1 But the “:” is used for port number!

For example, an IPv6 address typed into your web browser:
http://[2001:db8:85a3:8d3:1319:8a2e:370:7348]/

When the URL also contains a port number the notation is:
https://[2001:db8:85a3:8d3:1319:8a2e:370:7348]:443/
where the trailing 443 is the example’s port number.

1.11.2 IPv6 Datagram header

https://en.wikipedia.org/wiki/IPv6_packet

1.11.2.1 Expanded addressing capabilities:

Size and type of addresses were updated.

1.11.2.1.1 Size of address
1.11.2.1.2 Addressing methods (scope of address)

Unicast:

Multicast:

Anycast

1.11.2.2 A streamlined 40-byte header:

1.11.2.3 Flow labeling and priority:

04-NetworkData/kurose_ch4_23.png
The following fields are defined in IPv6:

Version

Flow label

Payload length

Next header

Hop limit

Source and destination addresses

Data

IPv6 Datagram header details
04-NetworkData/ipv6_header.png

1.11.3 IPv6 sub-net addressing

Structure of IPv6 unicast addresses:
04-NetworkData/network-fig-073-c.png
An IPv6 unicast address is composed of three chunks:
1. A global routing prefix that is assigned to the Internet Service Provider that owns this block of addresses
2. A subnet identifier that identifies a customer of the ISP
3. An interface identifier that identifies a particular interface on an endsystem

Example of dividing up subnets:
04-NetworkData/IPv6_Prefix_Assignment_Example-en.svg
Each “site” would have 216 subnets, where each subnet is 264 large.

1.11.4 Obtaining an address

1.11.4.1 Allocation?

Same as with IPv4 above: super-governmental agencies and companies assign them, and they are re-sold.

1.11.4.2 When joining a network?

https://en.wikipedia.org/wiki/IPv6_address#Stateless_address_autoconfiguration

1.11.4.2.2 DHCP vs Neighbor discover protocol

https://en.wikipedia.org/wiki/Neighbor_Discovery_Protocol
https://en.wikipedia.org/wiki/DHCPv6

In IPv4, typical “configuration protocols” include DHCP or PPP.

For IPv6, DHCPv6 exists, but IPv6 hosts normally use the Neighbor Discovery Protocol (NDP) to create a globally routable unicast address.

1.11.4.2.3 Modified EUI-64 addresses

+++++++++++++++ Cahoot-04-10

1.11.5 Interfaces and addresses

We assign each interface in IPv6 multiple IP addresses:
That is, each interface is multi-homed.

1.11.5.0.1 Scope

https://en.wikipedia.org/wiki/IPv6_address#Address_scopes
Each IPv6 address has a scope, which specifies in which part of the network it is valid and unique.
Some addresses are assumed to be unique, and are only routeable on the local (sub-)network.
Others must be globally unique, and are globally routeable.

IPv6 addresses are classified by three types of networking methodologies:
1. unicast addresses identify each network interface,
2. anycast addresses identify a group of interfaces, usually at different locations of which the nearest one is automatically selected, and
3. multicast addresses are used to deliver one packet to many interfaces (e.g., only need to hit one of google’s servers)

The broadcast method is not implemented in IPv6.

1.11.5.0.2 Standard unicast

Globally addressable unique address.
04-NetworkData/network-fig-073-c.png

https://en.wikipedia.org/wiki/IPv6_address#Unicast_and_anycast_address_format
Unicast and anycast addresses are typically composed of two logical parts:
1. a 64-bit network prefix used for routing, and
2. a 64-bit interface identifier used to identify a host’s network interface.

The typical size of the IPv6 anycast address blocks give out are:
/32 for an Internet Service Provider
/48 for a single company
/56 for small user sites (organizations)
/64 for a single user (e.g. a home user connected via ADSL)
/128 in the rare case when it is known that no more than one end-host will be attached

1.11.5.0.4 Localhost (type of unicast)

Like 127.0.0.1,

::1 localhost

1.11.5.0.5 Unique local (type of unicast)

https://en.wikipedia.org/wiki/Unique_local_address

1.11.5.0.6 Multicast

IPv6 has moved away from LAN-layer broadcast, instead providing a wide range of LAN-layer multicast groups.
04-NetworkData/network-fig-075-c.png
The low order 112 bits of an IPv6 multicast address are the group’s identifier.
The high order bits are used as a marker to distinguish multicast addresses from unicast addresses.
Notably, the 4 bits flag field indicates whether the address is temporary or permanent.
Finally, the scope field indicates the boundaries of the forwarding of packets destined to a particular address.
A link-local scope indicates that a router should not forward a packet destined to such a multicast address.
An organization local-scope indicates that a packet sent to such a multicast destination address should not leave the organization.
Finally the global scope is intended for multicast groups spanning the global Internet.

1.11.5.0.7 Anycast

++++++++++++++++++ Cahoot-04-11

1.11.6 Adoption / deployment

https://en.wikipedia.org/wiki/IPv6_deployment
IPv6 was designed as a replacement for IPv4 which has been in use since 1982, and is in the final stages of exhausting its unallocated address space, but still carries most Internet traffic.
By 2011, all major operating systems in use on personal computers and server systems had production-quality IPv6 implementations.
04-NetworkData/IPv6-as.svg
Number of IPv6 prefixes and AS on the Internet since 2003
04-NetworkData/Rir-ipv6-allocation-rate.svg
Monthly IPv6 allocations per RIR.

Demo: actually check these out in class (interesting).
https://www.google.com/intl/en/ipv6/statistics.html#tab=ipv6-adoption
https://www.google.com/intl/en/ipv6/statistics.html#tab=per-country-ipv6-adoption

1.11.7 Backwards compatibility

https://en.wikipedia.org/wiki/IPv6_transition_mechanism

The bad thing about IPv6 jokes is that nobody wants to tell them first.

This section can be broken down into a several different situations:
1. IPv6-only end-machine to IPv6-only end-machine connections, which must pass through IPv4-only core.
2. IPv4-only end-machine to IPv4 end-machine connections, which must pass through IPv6-only core (more rare in USA).
3. IPv6 and IPv4 co-existence, and prioritization when both are available.
4. IPv6-only end-machine connecting to an IPv4-only end-machine, and vice-versa.

1.11.7.1 Backwards compatibility via dual-stack

https://en.wikipedia.org/wiki/IPv6_transition_mechanism#DNS64
04-NetworkData/kurose_ch4_24.png

DNS review:

Dual-stack

1.11.7.2 Backwards compatibility via tunneling

https://en.wikipedia.org/wiki/Tunnel_broker
https://en.wikipedia.org/wiki/6in4

A tunnel broker provides IPv6 connectivity by encapsulating IPv6 traffic in IPv4 Internet transit links, typically using 6in4.
This establishes pseudo-end-to-end IPv6 tunnels within the IPv4 Internet.
04-NetworkData/kurose_ch4_25.png

1.11.7.3 A number of other methods exists

https://en.wikipedia.org/wiki/IPv6_transition_mechanism

An IPv6 packet walks into a bar.
Nobody talks to him.

1.12 IPsec

https://en.wikipedia.org/wiki/IPsec

While TLS or SSH secure application layer, IPsec can end-to-end encrypt the network layer:

Cryptographic agreement.
Two communicating hosts to agree on cryptographic algorithms and keys.

Encryption of IP datagram payloads.
When the sending host receives a segment from the transport layer, IPsec encrypts the payload.
The payload can only be decrypted by IPsec in the receiving host.

Data integrity.
Allows the receiving host to verify that the datagram’s header fields and encrypted payload were not modified,
while the datagram was en route from source to destination.

Origin authentication.
When a host receives an IPsec datagram from a trusted source (with a trusted key see), the host is assured that the source IP address in the datagram is the actual source of the datagram.
When two hosts have an IPsec session established between them, all TCP and UDP segments sent between them will be encrypted and authenticated.
IPsec therefore provides blanket coverage, securing all communication between the two hosts for all network applications.

1.12.0.1 Modes

Two major modes of operation
04-NetworkData/ipsec-modes.png

1.12.0.1.1 Transport mode
1.12.0.1.2 Tunnel mode

1.12.1 Functions

IPsec uses the following protocols to perform various functions:

Authentication Headers (AH)
Provides connectionless data integrity and data origin authentication for IP datagrams and provides protection against replay attacks.
04-NetworkData/ipsec-ah.png

Encapsulating Security Payloads (ESP)
Provides confidentiality, connectionless data integrity, data origin authentication, an anti-replay service (a form of partial sequence integrity), and limited traffic-flow confidentiality.
04-NetworkData/ipsec-esp.png

Internet Security Association and Key Management Protocol (ISAKMP)
Provides a framework for authentication and key exchange, with actual authenticated keying material provided either by manual configuration with pre-shared keys, Internet Key Exchange (IKE and IKEv2), Kerberized Internet Negotiation of Keys (KINK), or IPSECKEY DNS records.
The purpose is to generate the Security Associations (SA) with the bundle of algorithms and parameters necessary for AH and/or ESP operations.

For more, see latter section (coming up).

https://en.wikipedia.org/wiki/IP_over_Avian_Carriers
04-NetworkData/ip_over_avian.jpg

1.14 IP-layer status and error messages

Some of this stuff is not quite data, not quite control…
ICMP differs from transport protocols such as TCP and UDP, in that:
it is not typically used to exchange data between systems,
nor is it regularly employed by end-user network applications,
with the exception of some diagnostic tools like ping and traceroute.
ICMP uses the basic support of IP as if it were a higher level protocol,
however, ICMP is actually an integral part of IP.
Although ICMP messages are contained within standard IP packets,
ICMP messages are usually processed as a special case,
distinguished from normal IP processing.
It is often necessary to inspect the contents of the ICMP message,
and deliver an appropriate error message,
to the application responsible for transmission of the IP packet,
that prompted the sending of the ICMP message.
ICMP is a network layer protocol.
There is no TCP or UDP port number associated with ICMP packets,
as these numbers are associated with the transport layer above.
ICMP is often considered part of IP,
but architecturally it lies just above IP,
as ICMP messages are carried inside IP datagrams.
That is, ICMP messages are carried as IP payload,
just as TCP or UDP segments are carried as IP payload.
When a host receives an IP datagram,
with ICMP specified as the upper-layer protocol,
it demultiplexes the datagram’s contents to ICMP,
just as it would demultiplex a datagram’s content to TCP or UDP.

1.14.1 ICMP

Wikipedia
https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol_for_IPv6

V1-computer-networking
https://www.computer-networking.info/1st/html/network/network.html#icmp-version-4
https://www.computer-networking.info/1st/html/network/network.html#icmp-version-6

V2-computer-networking
https://www.computer-networking.info/2nd/html/protocols/ipv6.html#icmp-version-6

Intronetworks
http://intronetworks.cs.luc.edu/current2/uhtml/ipv4.html#internet-control-message-protocol
http://intronetworks.cs.luc.edu/current2/uhtml/ipv6b.html#icmpv6

1.14.1.1 IPv4 ICMP

ICMP messages are typically used for diagnostic or control purposes,
or generated in response to errors in IP operations (as specified in RFC 1122).
ICMP errors are directed to the source IP address of the originating packet.
It is sometimes necessary for intermediate routers, or the destination host,
to inform the sender of the packet of a problem,
that occurred while processing a packet.
Reporting is done by the Internet Control Message Protocol (ICMP).
ICMP is defined in RFC 792.
ICMP messages are carried as the payload of IP packets
(the protocol value reserved for ICMP is 1).
An ICMP message is composed of an 8 byte header, and a variable length payload,
that usually contains the first bytes of the erroneous packet,
that triggered the transmission of the ICMP message.
ICMP is, like IP, host-to-host,
and so its packets are never delivered to a specific port,
even if they are sent in response to an error,
related to something sent from a port.
Individual UDP and TCP connections do not receive ICMP messages,
even when it would be helpful to get them.
ICMP messages are identified by an 8-bit type field,
followed by an 8-bit subtype, or code.
The ICMP packet is encapsulated in an IPv4 packet.
The packet consists of header and data sections.
Only part of this diagram is the ICMP header:
04-NetworkData/icmpv4.png
The Type and Code fields indicate the type of problem,
that was detected by the sender of the ICMP message.
The Checksum protects the entire ICMP message against transmission errors.
The Data field contains additional information for some ICMP messages.

1.14.1.1.1 Notable ICMP types in IPv4

ICMP packets come in a variety of types (see these in class):
https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol#Control_messages

echo request/reply
https://en.wikipedia.org/wiki/Ping_(networking_utility)

https://en.wikipedia.org/wiki/ICMP_Time_Exceeded
https://en.wikipedia.org/wiki/ICMP_Router_Discovery_Protocol

04-NetworkData/detail_icmp_header.png

1.14.1.2 IPv6 ICMP

ICMPv6 specifies two classes of messages : error messages that indicate a problem in handling a packet and informational messages. Four types of error messages are defined in RFC 4443:

1: Destination Unreachable. Such an ICMPv6 message is sent when the destination address of a packet is unreachable. The code field of the ICMP header contains additional information about the type of unreachability. The following codes are specified in RFC 4443
0: No route to destination. This indicates that the router that sent the ICMPv6 message did not have a route towards the packet’s destination
1: Communication with destination administratively prohibited. This indicates that a firewall has refused to forward the packet towards its destination.
2: Beyond scope of source address. This message can be sent if the source is using link-local addresses to reach a global unicast address outside its subnet.
3: Address unreachable. This message indicates that the packet reached the subnet of the destination, but the host that owns this destination address cannot be reached.
4: Port unreachable. This message indicates that the IPv6 packet was received by the destination, but there was no application listening to the specified port.

2: Packet Too Big. The router that was to send the ICMPv6 message received an IPv6 packet that is larger than the MTU of the outgoing link. The ICMPv6 message contains the MTU of this link in bytes. This allows the sending host to implement Path MTU discovery RFC 1981

3: Time Exceeded. This error message can be sent either by a router or by a host. A router would set code to 0 to report the reception of a packet whose Hop Limit reached 0. A host would set code to 1 to report that it was unable to reassemble received IPv6 fragments.

4: Parameter Problem. This ICMPv6 message is used to report either the reception of an IPv6 packet with an erroneous header field (type 0) or an unknown Next Header or IP option (types 1 and 2). In this case, the message body contains the erroneous IPv6 packet and the first 32 bits of the message body contain a pointer to the error.

Two types of informational ICMPv6 messages are defined in RFC 4443 : echo request and echo reply, which are used to test the reachability of a destination by using ping6(8).

1.14.1.3 Applications based on ICMP

Use ICMP messages for user-space purpose.

1.14.1.3.1 Ping
$ man ping
$ man ping6

In class: check out wireshark of ping packets

https://en.wikipedia.org/wiki/Ping_(networking_utility)

1.14.1.3.2 Traceroute
$ man traceroute
$ man traceroute6

In class: check out wireshark of traceroute packets

https://en.wikipedia.org/wiki/Traceroute

1.14.1.4 Exploits

https://en.wikipedia.org/wiki/Ping_of_death
A correctly formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered, and 84 bytes including Internet Protocol version 4 header.
However, any IPv4 packet (including pings) may be as large as 65,535 bytes.
Some computer systems were never designed to properly handle a ping packet larger than the maximum packet size because it violates the Internet Protocol.
Like other large but well-formed packets, a ping of death is fragmented into groups of 8 octets before transmission.
However, when the target computer reassembles the malformed packet, a buffer overflow can occur, causing a system crash and potentially allowing the injection of malicious code.

https://en.wikipedia.org/wiki/Ping_flood
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP “echo request” (ping) packets.
This is most effective by using the flood option of ping which sends ICMP packets as fast as possible without waiting for replies.

https://en.wikipedia.org/wiki/ICMP_tunnel
An ICMP tunnel establishes a covert connection between two remote computers (a client and proxy), using ICMP echo requests and reply packets.
An example of this technique is tunneling complete TCP traffic over ping requests and replies.
ICMP tunneling can be used to bypass firewalls rules through obfuscation of the actual traffic.
Depending on the implementation of the ICMP tunneling software, this type of connection can also be categorized as an encrypted communication channel between two computers. Without proper deep packet inspection or log review, network administrators will not be able to detect this type of traffic through their network.
ICMP-tunnels are sometimes used to circumvent firewalls that block traffic between the LAN and the outside world.

Data storage exploit
https://www.youtube.com/watch?v=JcJSW7Rprio

1.14.1.4.1 Code

In class:

Check out ICMP-ping python code:
(user@vm-wnet: ../CS3610/pa04_icmp_grader/background_reading/ICMP-ping)

introduce traceroute python code for next week:
(user@vm-wnet: ../CS3610/pa04_icmp_grader/background_reading/ICMP-traceroute)

1.14.1.4.2 Wireshark demo

1.14.2 ARP

Will cover during data-link layer, though it’s the glue between network and data-link layers.

1.14.3 Default gateways

(a preview of datalink / MAC / LAN layer)
https://www.homenethowto.com/basics/default-gateway-finding-other-ip-networks/
https://en.wikipedia.org/wiki/Default_gateway

Q:
When a computer wants to send an IP packet,
how does it know to send it on the LAN, or to the internet,
though it’s gateway router?

A:
Using the IP address and its sub-net information,
either in the form of the sub-net mask or CIDR notation.

1.15 Other network-layer protocols

IP is not the only network layer protocol, with others for complementary purposes, and full alternatives (not popular).

https://en.wikipedia.org/wiki/Network_layer#Protocols
https://en.wikipedia.org/wiki/Internet_layer

Next: 05-Security.html