| ==Phrack Inc.== | |
| Volume Three, Issue 29, File #3 of 12 | |
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> | |
| <> <> | |
| <> Introduction to the Internet Protocols <> | |
| <> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ <> | |
| <> Chapter Nine Of The Future Transcendent Saga <> | |
| <> <> | |
| <> Part Two of Two Files <> | |
| <> <> | |
| <> Presented by Knight Lightning <> | |
| <> September 27, 1989 <> | |
| <> <> | |
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> | |
| Prologue - Part Two | |
| ~~~~~~~~ | |
| A great deal of the material in this file comes from "Introduction to the | |
| Internet Protocols" by Charles L. Hedrick of Rutgers University. That material | |
| is copyrighted and is used in this file by permission. Time differention and | |
| changes in the wide area networks have made it neccessary for some details of | |
| the file to updated and in some cases reworded for better understanding by our | |
| readers. Also, Unix is a trademark of AT&T Technologies, Inc. -- Again, just | |
| thought I'd let you know. | |
| Table of Contents - Part Two | |
| ~~~~~~~~~~~~~~~~~ | |
| * Introduction - Part Two | |
| * Well Known Sockets And The Applications Layer | |
| * Protocols Other Than TCP: UDP and ICMP | |
| * Keeping Track Of Names And Information: The Domain System | |
| * Routing | |
| * Details About The Internet Addresses: Subnets And Broadcasting | |
| * Datagram Fragmentation And Reassembly | |
| * Ethernet Encapsulation: ARP | |
| * Getting More Information | |
| Introduction - Part Two | |
| ~~~~~~~~~~~~ | |
| This article is a brief introduction to TCP/IP, followed by suggestions on | |
| what to read for more information. This is not intended to be a complete | |
| description, but it can give you a reasonable idea of the capabilities of the | |
| protocols. However, if you need to know any details of the technology, you | |
| will want to read the standards yourself. | |
| Throughout this file, you will find references to the standards, in the form of | |
| "RFC" (Request For Comments) or "IEN" (Internet Engineering Notes) numbers -- | |
| these are document numbers. The final section (Getting More Information) | |
| explains how you can get copies of those standards. | |
| Well-Known Sockets And The Applications Layer | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| In part one of this series, I described how a stream of data is broken up into | |
| datagrams, sent to another computer, and put back together. However something | |
| more is needed in order to accomplish anything useful. There has to be a way | |
| for you to open a connection to a specified computer, log into it, tell it what | |
| file you want, and control the transmission of the file. (If you have a | |
| different application in mind, e.g. computer mail, some analogous protocol is | |
| needed.) This is done by "application protocols." The application protocols | |
| run "on top" of TCP/IP. That is, when they want to send a message, they give | |
| the message to TCP. TCP makes sure it gets delivered to the other end. | |
| Because TCP and IP take care of all the networking details, the applications | |
| protocols can treat a network connection as if it were a simple byte stream, | |
| like a terminal or phone line. | |
| Before going into more details about applications programs, we have to describe | |
| how you find an application. Suppose you want to send a file to a computer | |
| whose Internet address is 128.6.4.7. To start the process, you need more than | |
| just the Internet address. You have to connect to the FTP server at the other | |
| end. In general, network programs are specialized for a specific set of tasks. | |
| Most systems have separate programs to handle file transfers, remote terminal | |
| logins, mail, etc. When you connect to 128.6.4.7, you have to specify that you | |
| want to talk to the FTP server. This is done by having "well-known sockets" | |
| for each server. Recall that TCP uses port numbers to keep track of individual | |
| conversations. User programs normally use more or less random port numbers. | |
| However specific port numbers are assigned to the programs that sit waiting for | |
| requests. For example, if you want to send a file, you will start a program | |
| called "ftp." It will open a connection using some random number, say 1234, | |
| for the port number on its end. However it will specify port number 21 for the | |
| other end. This is the official port number for the FTP server. Note that | |
| there are two different programs involved. You run ftp on your side. This is | |
| a program designed to accept commands from your terminal and pass them on to | |
| the other end. The program that you talk to on the other machine is the FTP | |
| server. It is designed to accept commands from the network connection, rather | |
| than an interactive terminal. There is no need for your program to use a | |
| well-known socket number for itself. Nobody is trying to find it. However the | |
| servers have to have well-known numbers, so that people can open connections to | |
| them and start sending them commands. The official port numbers for each | |
| program are given in "Assigned Numbers." | |
| Note that a connection is actually described by a set of 4 numbers: The | |
| Internet address at each end, and the TCP port number at each end. Every | |
| datagram has all four of those numbers in it. (The Internet addresses are in | |
| the IP header, and the TCP port numbers are in the TCP header.) In order to | |
| keep things straight, no two connections can have the same set of numbers. | |
| However it is enough for any one number to be different. For example, it is | |
| perfectly possible for two different users on a machine to be sending files to | |
| the same other machine. This could result in connections with the following | |
| parameters: | |
| Internet addresses TCP ports | |
| connection 1 128.6.4.194, 128.6.4.7 1234, 21 | |
| connection 2 128.6.4.194, 128.6.4.7 1235, 21 | |
| Since the same machines are involved, the Internet addresses are the same. | |
| Since they are both doing file transfers, one end of the connection involves | |
| the well-known port number for FTP. The only thing that differs is the port | |
| number for the program that the users are running. That's enough of a | |
| difference. Generally, at least one end of the connection asks the network | |
| software to assign it a port number that is guaranteed to be unique. Normally, | |
| it's the user's end, since the server has to use a well-known number. | |
| Now that we know how to open connections, let's get back to the applications | |
| programs. As mentioned earlier, once TCP has opened a connection, we have | |
| something that might as well be a simple wire. All the hard parts are handled | |
| by TCP and IP. However we still need some agreement as to what we send over | |
| this connection. In effect this is simply an agreement on what set of commands | |
| the application will understand, and the format in which they are to be sent. | |
| Generally, what is sent is a combination of commands and data. They use | |
| context to differentiate. For example, the mail protocol works like this: | |
| Your mail program opens a connection to the mail server at the other end. Your | |
| program gives it your machine's name, the sender of the message, and the | |
| recipients you want it sent to. It then sends a command saying that it is | |
| starting the message. At that point, the other end stops treating what it sees | |
| as commands, and starts accepting the message. Your end then starts sending | |
| the text of the message. At the end of the message, a special mark is sent (a | |
| dot in the first column). After that, both ends understand that your program | |
| is again sending commands. This is the simplest way to do things, and the one | |
| that most applications use. | |
| File transfer is somewhat more complex. The file transfer protocol involves | |
| two different connections. It starts out just like mail. The user's program | |
| sends commands like "log me in as this user," "here is my password," "send me | |
| the file with this name." However once the command to send data is sent, a | |
| second connection is opened for the data itself. It would certainly be | |
| possible to send the data on the same connection, as mail does. However file | |
| transfers often take a long time. The designers of the file transfer protocol | |
| wanted to allow the user to continue issuing commands while the transfer is | |
| going on. For example, the user might make an inquiry, or he might abort the | |
| transfer. Thus the designers felt it was best to use a separate connection for | |
| the data and leave the original command connection for commands. (It is also | |
| possible to open command connections to two different computers, and tell them | |
| to send a file from one to the other. In that case, the data couldn't go over | |
| the command connection.) | |
| Remote terminal connections use another mechanism still. For remote logins, | |
| there is just one connection. It normally sends data. When it is necessary to | |
| send a command (e.g. to set the terminal type or to change some mode), a | |
| special character is used to indicate that the next character is a command. If | |
| the user happens to type that special character as data, two of them are sent. | |
| I am not going to describe the application protocols in detail in this file. | |
| It is better to read the RFCs yourself. However there are a couple of common | |
| conventions used by applications that will be described here. First, the | |
| common network representation: TCP/IP is intended to be usable on any | |
| computer. Unfortunately, not all computers agree on how data is represented. | |
| There are differences in character codes (ASCII vs. EBCDIC), in end of line | |
| conventions (carriage return, line feed, or a representation using counts), and | |
| in whether terminals expect characters to be sent individually or a line at a | |
| time. In order to allow computers of different kinds to communicate, each | |
| applications protocol defines a standard representation. Note that TCP and IP | |
| do not care about the representation. TCP simply sends octets. However the | |
| programs at both ends have to agree on how the octets are to be interpreted. | |
| The RFC for each application specifies the standard representation for that | |
| application. Normally it is "net ASCII." This uses ASCII characters, with end | |
| of line denoted by a carriage return followed by a line feed. For remote | |
| login, there is also a definition of a "standard terminal," which turns out to | |
| be a half-duplex terminal with echoing happening on the local machine. Most | |
| applications also make provisions for the two computers to agree on other | |
| representations that they may find more convenient. For example, PDP-10's have | |
| 36-bit words. There is a way that two PDP-10's can agree to send a 36-bit | |
| binary file. Similarly, two systems that prefer full-duplex terminal | |
| conversations can agree on that. However each application has a standard | |
| representation, which every machine must support. | |
| So that you might get a better idea of what is involved in the application | |
| protocols, here is an imaginary example of SMTP (the simple mail transfer | |
| protocol.) Assume that a computer called FTS.PHRACK.EDU wants to send the | |
| following message. | |
| Date: Fri, 17 Nov 89 15:42:06 EDT | |
| From: knight@fts.phrack.edu | |
| To: taran@msp.phrack.edu | |
| Subject: Anniversary | |
| Four years is quite a long time to be around. Happy Anniversary! | |
| Note that the format of the message itself is described by an Internet standard | |
| (RFC 822). The standard specifies the fact that the message must be | |
| transmitted as net ASCII (i.e. it must be ASCII, with carriage return/linefeed | |
| to delimit lines). It also describes the general structure, as a group of | |
| header lines, then a blank line, and then the body of the message. Finally, it | |
| describes the syntax of the header lines in detail. Generally they consist of | |
| a keyword and then a value. | |
| Note that the addressee is indicated as TARAN@MSP.PHRACK.EDU. Initially, | |
| addresses were simply "person at machine." Today's standards are much more | |
| flexible. There are now provisions for systems to handle other systems' mail. | |
| This can allow automatic forwarding on behalf of computers not connected to the | |
| Internet. It can be used to direct mail for a number of systems to one central | |
| mail server. Indeed there is no requirement that an actual computer by the | |
| name of FTS.PHRACK.EDU even exist (and it doesn't). The name servers could be | |
| set up so that you mail to department names, and each department's mail is | |
| routed automatically to an appropriate computer. It is also possible that the | |
| part before the @ is something other than a user name. It is possible for | |
| programs to be set up to process mail. There are also provisions to handle | |
| mailing lists, and generic names such as "postmaster" or "operator." | |
| The way the message is to be sent to another system is described by RFCs 821 | |
| and 974. The program that is going to be doing the sending asks the name | |
| server several queries to determine where to route the message. The first | |
| query is to find out which machines handle mail for the name FTS.PHRACK.EDU. | |
| In this case, the server replies that FTS.PHRACK.EDU handles its own mail. The | |
| program then asks for the address of FTS.PHRACK.EDU, which for the sake of this | |
| example is is 269.517.724.5. Then the the mail program opens a TCP connection | |
| to port 25 on 269.517.724.5. Port 25 is the well-known socket used for | |
| receiving mail. Once this connection is established, the mail program starts | |
| sending commands. Here is a typical conversation. Each line is labelled as to | |
| whether it is from FTS or MSP. Note that FTS initiated the connection: | |
| MSP 220 MSP.PHRACK.EDU SMTP Service at 17 Nov 89 09:35:24 EDT | |
| FTS HELO fts.phrack.edu | |
| MSP 250 MSP.PHRACK.EDU - Hello, FTS.PHRACK.EDU | |
| FTS MAIL From:<knight@fts.phrack.edu> | |
| MSP 250 MAIL accepted | |
| FTS RCPT To:<taran@msp.phrack.edu> | |
| MSP 250 Recipient accepted | |
| FTS DATA | |
| MSP 354 Start mail input; end with <CRLF>.<CRLF> | |
| FTS Date: Fri, 17 Nov 89 15:42:06 EDT | |
| FTS From: knight@fts.phrack.edu | |
| FTS To: taran@msp.phrack.edu | |
| FTS Subject: Anniversary | |
| FTS | |
| FTS Four years is quite a long time to be around. Happy Anniversary! | |
| FTS . | |
| MSP 250 OK | |
| FTS QUIT | |
| MSP 221 MSP.PHRACK.EDU Service closing transmission channel | |
| The commands all use normal text. This is typical of the Internet standards. | |
| Many of the protocols use standard ASCII commands. This makes it easy to watch | |
| what is going on and to diagnose problems. The mail program keeps a log of | |
| each conversation so if something goes wrong, the log file can simply be mailed | |
| to the postmaster. Since it is normal text, he can see what was going on. It | |
| also allows a human to interact directly with the mail server, for testing. | |
| The responses all begin with numbers. This is also typical of Internet | |
| protocols. The allowable responses are defined in the protocol. The numbers | |
| allow the user program to respond unambiguously. The rest of the response is | |
| text, which is normally for use by any human who may be watching or looking at | |
| a log. It has no effect on the operation of the programs. The commands | |
| themselves simply allow the mail program on one end to tell the mail server the | |
| information it needs to know in order to deliver the message. In this case, | |
| the mail server could get the information by looking at the message itself. | |
| Every session must begin with a HELO, which gives the name of the system that | |
| initiated the connection. Then the sender and recipients are specified. There | |
| can be more than one RCPT command, if there are several recipients. Finally | |
| the data itself is sent. Note that the text of the message is terminated by a | |
| line containing just a period, but if such a line appears in the message, the | |
| period is doubled. After the message is accepted, the sender can send another | |
| message, or terminate the session as in the example above. | |
| Generally, there is a pattern to the response numbers. The protocol defines | |
| the specific set of responses that can be sent as answers to any given command. | |
| However programs that don't want to analyze them in detail can just look at the | |
| first digit. In general, responses that begin with a 2 indicate success. | |
| Those that begin with 3 indicate that some further action is needed, as shown | |
| above. 4 and 5 indicate errors. 4 is a "temporary" error, such as a disk | |
| filling. The message should be saved, and tried again later. 5 is a permanent | |
| error, such as a non-existent recipient. The message should be returned to the | |
| sender with an error message. | |
| For more details about the protocols mentioned in this section, see RFCs | |
| 821/822 for mail, RFC 959 for file transfer, and RFCs 854/855 for remote | |
| logins. For the well-known port numbers, see the current edition of Assigned | |
| Numbers, and possibly RFC 814. | |
| Protocols Other Than TCP: UDP and ICMP | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Thus far only connections that use TCP have been described. Remember that TCP | |
| is responsible for breaking up messages into datagrams, and reassembling them | |
| properly. However in many applications, there are messages that will always | |
| fit in a single datagram. An example is name lookup. When a user attempts to | |
| make a connection to another system, he will generally specify the system by | |
| name, rather than Internet address. His system has to translate that name to | |
| an address before it can do anything. Generally, only a few systems have the | |
| database used to translate names to addresses. So the user's system will want | |
| to send a query to one of the systems that has the database. | |
| This query is going to be very short. It will certainly fit in one datagram. | |
| So will the answer. Thus it seems silly to use TCP. Of course TCP does more | |
| than just break things up into datagrams. It also makes sure that the data | |
| arrives, resending datagrams where necessary. But for a question that fits in | |
| a single datagram, all of the complexity of TCP is not needed. If there is not | |
| an answer after a few seconds, you can just ask again. For applications like | |
| this, there are alternatives to TCP. | |
| The most common alternative is UDP ("user datagram protocol"). UDP is designed | |
| for applications where you don't need to put sequences of datagrams together. | |
| It fits into the system much like TCP. There is a UDP header. The network | |
| software puts the UDP header on the front of your data, just as it would put a | |
| TCP header on the front of your data. Then UDP sends the data to IP, which | |
| adds the IP header, putting UDP's protocol number in the protocol field instead | |
| of TCP's protocol number. | |
| UDP doesn't do as much as TCP does. It does not split data into multiple | |
| datagrams and it does not keep track of what it has sent so it can resend if | |
| necessary. About all that UDP provides is port numbers so that several | |
| programs can use UDP at once. UDP port numbers are used just like TCP port | |
| numbers. There are well-known port numbers for servers that use UDP. | |
| The UDP header is shorter than a TCP header. It still has source and | |
| destination port numbers, and a checksum, but that's about it. UDP is used by | |
| the protocols that handle name lookups (see IEN 116, RFC 882, and RFC 883) and | |
| a number of similar protocols. | |
| Another alternative protocol is ICMP ("Internet control message protocol"). | |
| ICMP is used for error messages, and other messages intended for the TCP/IP | |
| software itself, rather than any particular user program. For example, if you | |
| attempt to connect to a host, your system may get back an ICMP message saying | |
| "host unreachable." ICMP can also be used to find out some information about | |
| the network. See RFC 792 for details of ICMP. | |
| ICMP is similar to UDP, in that it handles messages that fit in one datagram. | |
| However it is even simpler than UDP. It does not even have port numbers in its | |
| header. Since all ICMP messages are interpreted by the network software | |
| itself, no port numbers are needed to say where an ICMP message is supposed to | |
| go. | |
| Keeping Track Of Names And Information: The Domain System | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| As we indicated earlier, the network software generally needs a 32-bit Internet | |
| address in order to open a connection or send a datagram. However users prefer | |
| to deal with computer names rather than numbers. Thus there is a database that | |
| allows the software to look up a name and find the corresponding number. | |
| When the Internet was small, this was easy. Each system would have a file that | |
| listed all of the other systems, giving both their name and number. There are | |
| now too many computers for this approach to be practical. Thus these files | |
| have been replaced by a set of name servers that keep track of host names and | |
| the corresponding Internet addresses. (In fact these servers are somewhat more | |
| general than that. This is just one kind of information stored in the domain | |
| system.) A set of interlocking servers are used rather than a single central | |
| one. | |
| There are now so many different institutions connected to the Internet that it | |
| would be impractical for them to notify a central authority whenever they | |
| installed or moved a computer. Thus naming authority is delegated to | |
| individual institutions. The name servers form a tree, corresponding to | |
| institutional structure. The names themselves follow a similar structure. A | |
| typical example is the name BORAX.LCS.MIT.EDU. This is a computer at the | |
| Laboratory for Computer Science (LCS) at MIT. In order to find its Internet | |
| address, you might potentially have to consult 4 different servers. | |
| First, you would ask a central server (called the root) where the EDU server | |
| is. EDU is a server that keeps track of educational institutions. The root | |
| server would give you the names and Internet addresses of several servers for | |
| EDU. You would then ask EDU where the server for MIT is. It would give you | |
| names and Internet addresses of several servers for MIT. Then you would ask | |
| MIT where the server for LCS is, and finally you would ask one of the LCS | |
| servers about BORAX. The final result would be the Internet address for | |
| BORAX.LCS.MIT.EDU. Each of these levels is referred to as a "domain." The | |
| entire name, BORAX.LCS.MIT.EDU, is called a "domain name." (So are the names | |
| of the higher-level domains, such as LCS.MIT.EDU, MIT.EDU, and EDU.) | |
| Fortunately, you don't really have to go through all of this most of the time. | |
| First of all, the root name servers also happen to be the name servers for the | |
| top-level domains such as EDU. Thus a single query to a root server will get | |
| you to MIT. Second, software generally remembers answers that it got before. | |
| So once we look up a name at LCS.MIT.EDU, our software remembers where to find | |
| servers for LCS.MIT.EDU, MIT.EDU, and EDU. It also remembers the translation | |
| of BORAX.LCS.MIT.EDU. Each of these pieces of information has a "time to live" | |
| associated with it. Typically this is a few days. After that, the information | |
| expires and has to be looked up again. This allows institutions to change | |
| things. | |
| The domain system is not limited to finding out Internet addresses. Each | |
| domain name is a node in a database. The node can have records that define a | |
| number of different properties. Examples are Internet address, computer type, | |
| and a list of services provided by a computer. A program can ask for a | |
| specific piece of information, or all information about a given name. It is | |
| possible for a node in the database to be marked as an "alias" (or nickname) | |
| for another node. It is also possible to use the domain system to store | |
| information about users, mailing lists, or other objects. | |
| There is an Internet standard defining the operation of these databases as well | |
| as the protocols used to make queries of them. Every network utility has to be | |
| able to make such queries since this is now the official way to evaluate host | |
| names. Generally utilities will talk to a server on their own system. This | |
| server will take care of contacting the other servers for them. This keeps | |
| down the amount of code that has to be in each application program. | |
| The domain system is particularly important for handling computer mail. There | |
| are entry types to define what computer handles mail for a given name to | |
| specify where an individual is to receive mail and to define mailing lists. | |
| See RFCs 882, 883, and 973 for specifications of the domain system. RFC 974 | |
| defines the use of the domain system in sending mail. | |
| Routing | |
| ~~~~~~~ | |
| The task of finding how to get a datagram to its destination is referred to as | |
| "routing." Many of the details depend upon the particular implementation. | |
| However some general things can be said. | |
| It is necessary to understand the model on which IP is based. IP assumes that | |
| a system is attached to some local network. It is assumed that the system can | |
| send datagrams to any other system on its own network. (In the case of | |
| Ethernet, it simply finds the Ethernet address of the destination system, and | |
| puts the datagram out on the Ethernet.) The problem comes when a system is | |
| asked to send a datagram to a system on a different network. This problem is | |
| handled by gateways. | |
| A gateway is a system that connects a network with one or more other networks. | |
| Gateways are often normal computers that happen to have more than one network | |
| interface. The software on a machine must be set up so that it will forward | |
| datagrams from one network to the other. That is, if a machine on network | |
| 128.6.4 sends a datagram to the gateway, and the datagram is addressed to a | |
| machine on network 128.6.3, the gateway will forward the datagram to the | |
| destination. Major communications centers often have gateways that connect a | |
| number of different networks. | |
| Routing in IP is based entirely upon the network number of the destination | |
| address. Each computer has a table of network numbers. For each network | |
| number, a gateway is listed. This is the gateway to be used to get to that | |
| network. The gateway does not have to connect directly to the network, it just | |
| has to be the best place to go to get there. | |
| When a computer wants to send a datagram, it first checks to see if the | |
| destination address is on the system's own local network. If so, the datagram | |
| can be sent directly. Otherwise, the system expects to find an entry for the | |
| network that the destination address is on. The datagram is sent to the | |
| gateway listed in that entry. This table can get quite big. For example, the | |
| Internet now includes several hundred individual networks. Thus various | |
| strategies have been developed to reduce the size of the routing table. One | |
| strategy is to depend upon "default routes." There is often only one gateway | |
| out of a network. | |
| This gateway might connect a local Ethernet to a campus-wide backbone network. | |
| In that case, it is not neccessary to have a separate entry for every network | |
| in the world. That gateway is simply defined as a "default." When no specific | |
| route is found for a datagram, the datagram is sent to the default gateway. A | |
| default gateway can even be used when there are several gateways on a network. | |
| There are provisions for gateways to send a message saying "I'm not the best | |
| gateway -- use this one instead." (The message is sent via ICMP. See RFC | |
| 792.) Most network software is designed to use these messages to add entries | |
| to their routing tables. Suppose network 128.6.4 has two gateways, 128.6.4.59 | |
| and 128.6.4.1. 128.6.4.59 leads to several other internal Rutgers networks. | |
| 128.6.4.1 leads indirectly to the NSFnet. Suppose 128.6.4.59 is set as a | |
| default gateway, and there are no other routing table entries. Now what | |
| happens when you need to send a datagram to MIT? MIT is network 18. Since | |
| there is no entry for network 18, the datagram will be sent to the default, | |
| 128.6.4.59. This gateway is the wrong one. So it will forward the datagram to | |
| 128.6.4.1. It will also send back an error saying in effect: "to get to | |
| network 18, use 128.6.4.1." The software will then add an entry to the routing | |
| table. Any future datagrams to MIT will then go directly to 128.6.4.1. (The | |
| error message is sent using the ICMP protocol. The message type is called | |
| "ICMP redirect.") | |
| Most IP experts recommend that individual computers should not try to keep | |
| track of the entire network. Instead, they should start with default gateways | |
| and let the gateways tell them the routes as just described. However this | |
| doesn't say how the gateways should find out about the routes. The gateways | |
| can't depend upon this strategy. They have to have fairly complete routing | |
| tables. For this, some sort of routing protocol is needed. A routing protocol | |
| is simply a technique for the gateways to find each other and keep up to date | |
| about the best way to get to every network. RFC 1009 contains a review of | |
| gateway design and routing. | |
| Details About Internet Addresses: Subnets And Broadcasting | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Internet addresses are 32-bit numbers, normally written as 4 octets (in | |
| decimal), e.g. 128.6.4.7. There are actually 3 different types of address. | |
| The problem is that the address has to indicate both the network and the host | |
| within the network. It was felt that eventually there would be lots of | |
| networks. Many of them would be small, but probably 24 bits would be needed to | |
| represent all the IP networks. It was also felt that some very big networks | |
| might need 24 bits to represent all of their hosts. This would seem to lead to | |
| 48 bit addresses. But the designers really wanted to use 32 bit addresses. So | |
| they adopted a kludge. The assumption is that most of the networks will be | |
| small. So they set up three different ranges of address. | |
| Addresses beginning with 1 to 126 use only the first octet for the network | |
| number. The other three octets are available for the host number. Thus 24 | |
| bits are available for hosts. These numbers are used for large networks, but | |
| there can only be 126 of these. The ARPAnet is one and there are a few large | |
| commercial networks. But few normal organizations get one of these "class A" | |
| addresses. | |
| For normal large organizations, "class B" addresses are used. Class B | |
| addresses use the first two octets for the network number. Thus network | |
| numbers are 128.1 through 191.254. (0 and 255 are avoided for reasons to be | |
| explained below. Addresses beginning with 127 are also avoided because they | |
| are used by some systems for special purposes.) The last two octets are | |
| available for host addesses, giving 16 bits of host address. This allows for | |
| 64516 computers, which should be enough for most organizations. Finally, class | |
| C addresses use three octets in the range 192.1.1 to 223.254.254. These allow | |
| only 254 hosts on each network, but there can be lots of these networks. | |
| Addresses above 223 are reserved for future use as class D and E (which are | |
| currently not defined). | |
| 0 and 255 have special meanings. 0 is reserved for machines that do not know | |
| their address. In certain circumstances it is possible for a machine not to | |
| know the number of the network it is on, or even its own host address. For | |
| example, 0.0.0.23 would be a machine that knew it was host number 23, but | |
| didn't know on what network. | |
| 255 is used for "broadcast." A broadcast is a message that you want every | |
| system on the network to see. Broadcasts are used in some situations where you | |
| don't know who to talk to. For example, suppose you need to look up a host | |
| name and get its Internet address. Sometimes you don't know the address of the | |
| nearest name server. In that case, you might send the request as a broadcast. | |
| There are also cases where a number of systems are interested in information. | |
| It is then less expensive to send a single broadcast than to send datagrams | |
| individually to each host that is interested in the information. In order to | |
| send a broadcast, you use an address that is made by using your network | |
| address, with all ones in the part of the address where the host number goes. | |
| For example, if you are on network 128.6.4, you would use 128.6.4.255 for | |
| broadcasts. How this is actually implemented depends upon the medium. It is | |
| not possible to send broadcasts on the ARPAnet, or on point to point lines, but | |
| it is possible on an Ethernet. If you use an Ethernet address with all its | |
| bits on (all ones), every machine on the Ethernet is supposed to look at that | |
| datagram. | |
| Because 0 and 255 are used for unknown and broadcast addresses, normal hosts | |
| should never be given addresses containing 0 or 255. Addresses should never | |
| begin with 0, 127, or any number above 223. | |
| Datagram Fragmentation And Reassembly | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| TCP/IP is designed for use with many different kinds of networks. | |
| Unfortunately, network designers do not agree about how big packets can be. | |
| Ethernet packets can be 1500 octets long. ARPAnet packets have a maximum of | |
| around 1000 octets. Some very fast networks have much larger packet sizes. | |
| You might think that IP should simply settle on the smallest possible size, but | |
| this would cause serious performance problems. When transferring large files, | |
| big packets are far more efficient than small ones. So it is best to be able | |
| to use the largest packet size possible, but it is also necessary to be able to | |
| handle networks with small limits. There are two provisions for this. | |
| TCP has the ability to "negotiate" about datagram size. When a TCP connection | |
| first opens, both ends can send the maximum datagram size they can handle. The | |
| smaller of these numbers is used for the rest of the connection. This allows | |
| two implementations that can handle big datagrams to use them, but also lets | |
| them talk to implementations that cannot handle them. This does not completely | |
| solve the problem. The most serious problem is that the two ends do not | |
| necessarily know about all of the steps in between. For this reason, there are | |
| provisions to split datagrams up into pieces. This is referred to as | |
| "fragmentation." | |
| The IP header contains fields indicating that a datagram has been split and | |
| enough information to let the pieces be put back together. If a gateway | |
| connects an Ethernet to the Arpanet, it must be prepared to take 1500-octet | |
| Ethernet packets and split them into pieces that will fit on the Arpanet. | |
| Furthermore, every host implementation of TCP/IP must be prepared to accept | |
| pieces and put them back together. This is referred to as "reassembly." | |
| TCP/IP implementations differ in the approach they take to deciding on datagram | |
| size. It is fairly common for implementations to use 576-byte datagrams | |
| whenever they can't verify that the entire path is able to handle larger | |
| packets. This rather conservative strategy is used because of the number of | |
| implementations with bugs in the code to reassemble fragments. Implementors | |
| often try to avoid ever having fragmentation occur. Different implementors | |
| take different approaches to deciding when it is safe to use large datagrams. | |
| Some use them only for the local network. Others will use them for any network | |
| on the same campus. 576 bytes is a "safe" size which every implementation must | |
| support. | |
| Ethernet Encapsulation: ARP | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| In Part One of Introduction to the Internet Protocols (Phrack Inc., Volume | |
| Three, Issue 28, File #3 of 12) there was a brief description about what IP | |
| datagrams look like on an Ethernet. The discription showed the Ethernet header | |
| and checksum, but it left one hole: It did not say how to figure out what | |
| Ethernet address to use when you want to talk to a given Internet address. | |
| There is a separate protocol for this called ARP ("address resolution | |
| protocol") and it is not an IP protocal as ARP datagrams do not have IP | |
| headers. | |
| Suppose you are on system 128.6.4.194 and you want to connect to system | |
| 128.6.4.7. Your system will first verify that 128.6.4.7 is on the same | |
| network, so it can talk directly via Ethernet. Then it will look up 128.6.4.7 | |
| in its ARP table to see if it already knows the Ethernet address. If so, it | |
| will stick on an Ethernet header and send the packet. Now suppose this system | |
| is not in the ARP table. There is no way to send the packet because you need | |
| the Ethernet address. So it uses the ARP protocol to send an ARP request. | |
| Essentially an ARP request says "I need the Ethernet address for 128.6.4.7". | |
| Every system listens to ARP requests. When a system sees an ARP request for | |
| itself, it is required to respond. So 128.6.4.7 will see the request and will | |
| respond with an ARP reply saying in effect "128.6.4.7 is 8:0:20:1:56:34". Your | |
| system will save this information in its ARP table so future packets will go | |
| directly. | |
| ARP requests must be sent as "broadcasts." There is no way that an ARP request | |
| can be sent directly to the right system because the whole reason for sending | |
| an ARP request is that you do not know the Ethernet address. So an Ethernet | |
| address of all ones is used, i.e. ff:ff:ff:ff:ff:ff. By convention, every | |
| machine on the Ethernet is required to pay attention to packets with this as an | |
| address. So every system sees every ARP requests. They all look to see | |
| whether the request is for their own address. If so, they respond. If not, | |
| they could just ignore it, although some hosts will use ARP requests to update | |
| their knowledge about other hosts on the network, even if the request is not | |
| for them. Packets whose IP address indicates broadcast (e.g. 255.255.255.255 | |
| or 128.6.4.255) are also sent with an Ethernet address that is all ones. | |
| Getting More Information | |
| ~~~~~~~~~~~~~~~~~~~~~~~~ | |
| This directory contains documents describing the major protocols. There are | |
| hundreds of documents, so I have chosen the ones that seem most important. | |
| Internet standards are called RFCs (Request for Comments). A proposed standard | |
| is initially issued as a proposal, and given an RFC number. When it is finally | |
| accepted, it is added to Official Internet Protocols, but it is still referred | |
| to by the RFC number. I have also included two IENs (Internet Engineering | |
| Notes). IENs used to be a separate classification for more informal | |
| documents, but this classification no longer exists and RFCs are now used for | |
| all official Internet documents with a mailing list being used for more | |
| informal reports. | |
| The convention is that whenever an RFC is revised, the revised version gets a | |
| new number. This is fine for most purposes, but it causes problems with two | |
| documents: Assigned Numbers and Official Internet Protocols. These documents | |
| are being revised all the time and the RFC number keeps changing. You will | |
| have to look in rfc-index.txt to find the number of the latest edition. Anyone | |
| who is seriously interested in TCP/IP should read the RFC describing IP (791). | |
| RFC 1009 is also useful as it is a specification for gateways to be used by | |
| NSFnet and it contains an overview of a lot of the TCP/IP technology. | |
| Here is a list of the documents you might want: | |
| rfc-index List of all RFCs | |
| rfc1012 Somewhat fuller list of all RFCs | |
| rfc1011 Official Protocols. It's useful to scan this to see what tasks | |
| protocols have been built for. This defines which RFCs are | |
| actual standards, as opposed to requests for comments. | |
| rfc1010 Assigned Numbers. If you are working with TCP/IP, you will | |
| probably want a hardcopy of this as a reference. It lists all | |
| the offically defined well-known ports and lots of other | |
| things. | |
| rfc1009 NSFnet gateway specifications. A good overview of IP routing | |
| and gateway technology. | |
| rfc1001/2 NetBIOS: Networking for PCs | |
| rfc973 Update on domains | |
| rfc959 FTP (file transfer) | |
| rfc950 Subnets | |
| rfc937 POP2: Protocol for reading mail on PCs | |
| rfc894 How IP is to be put on Ethernet, see also rfc825 | |
| rfc882/3 Domains (the database used to go from host names to Internet | |
| address and back -- also used to handle UUCP these days). See | |
| also rfc973 | |
| rfc854/5 Telnet - Protocol for remote logins | |
| rfc826 ARP - Protocol for finding out Ethernet addresses | |
| rfc821/2 Mail | |
| rfc814 Names and ports - General concepts behind well-known ports | |
| rfc793 TCP | |
| rfc792 ICMP | |
| rfc791 IP | |
| rfc768 UDP | |
| rip.doc Details of the most commonly-used routing protocol | |
| ien-116 Old name server (still needed by several kinds of systems) | |
| ien-48 The Catenet model, general description of the philosophy behind | |
| TCP/IP | |
| The following documents are somewhat more specialized. | |
| rfc813 Window and acknowledgement strategies in TCP | |
| rfc815 Datagram reassembly techniques | |
| rfc816 Fault isolation and resolution techniques | |
| rfc817 Modularity and efficiency in implementation | |
| rfc879 The maximum segment size option in TCP | |
| rfc896 Congestion control | |
| rfc827,888,904,975,985 EGP and related issues | |
| The most important RFCs have been collected into a three-volume set, the DDN | |
| Protocol Handbook. It is available from the DDN Network Information Center at | |
| SRI International. You should be able to get them via anonymous FTP from | |
| SRI-NIC.ARPA. The file names are: | |
| RFCs: | |
| rfc:rfc-index.txt | |
| rfc:rfcxxx.txt | |
| IENs: | |
| ien:ien-index.txt | |
| ien:ien-xxx.txt | |
| Sites with access to UUCP, but not FTP may be able to retreive them via | |
| UUCP from UUCP host rutgers. The file names would be | |
| RFCs: | |
| /topaz/pub/pub/tcp-ip-docs/rfc-index.txt | |
| /topaz/pub/pub/tcp-ip-docs/rfcxxx.txt | |
| IENs: | |
| /topaz/pub/pub/tcp-ip-docs/ien-index.txt | |
| /topaz/pub/pub/tcp-ip-docs/ien-xxx.txt | |
| >--------=====END=====--------< | |