The Internet Encyclopedia (Volume 3)

(coco) #1

P1: 35


Mateti WL040/Bidgolio-Vol I WL040-Sample.cls June 20, 2003 13:24 Char Count= 0


426 TCP/IP SUITE

0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ethernet destination address (first 32 bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ethernet dest (last 16 bits) |Ethernet source (first 16 bits)|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ethernet source address (last 32 bits) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type code | Data ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

. ...data ....
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ethernet Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


Figure 2: Ethernet frame.

detected, and the devices wait a random (but short) period
before trying to transmit again.
An Ethernet controller comes with a 48-bit MAC ad-
dress built-in from the factory. Every Ethernet frame has a
14-byte header that includes the Ethernet MAC addresses
of the source and destination, and a 2-byte type code (see
Fig. 2). The type code identifies the protocol family (such
as IP, ARP, NetBEUI). The Data field is from 48 to 1500
bytes in length. Following the data, there is a checksum
computed by the Ethernet controller for the entire frame.
The Ethernet address is written with each byte in
hexadecimal, separating bytes with either a hyphen or
a colon. Every device is expected to listen for Ethernet
frames with their destination address. All devices also lis-
ten for Ethernet frames with a wild-card destination ad-
dress of “FF-FF-FF-FF-FF-FF” (in hexadecimal), called a
“broadcast” address. When these packets are received by
the Ethernet Network Interface Card (NIC), it computes
the checksum, and throws the packet away if an error is
detected by the checksum. If the type code is IP, the Eth-
ernet device driver passes the data portion of the frame
up to the IP layer of the OS. Under OS control, the NIC
can be put into a so-calledpromiscuousstate wherein the
NIC listens to all frames regardless of their destinations.

Asynchronous Transfer Mode (ATM)
Asynchronous transfer mode (ATM) is widely deployed
as a backbone technology. ATM uses 53-byte fixed-length
packets called cells for transport. Information is divided
among these cells, transmitted, and then re-assembled at
their final destination. ATM is connection-oriented. ATM
itself consists of a series of layers. Its physical layer is
based on various transmission media that range in speed
from kilobits per second to gigabits per second. The layer,
known as the adaptation layer, holds the bulk of the trans-
mission. This 48-byte payload divides the data into differ-
ent types. The ATM layer contains 5 bytes of additional
information, referred to as overhead.

Serial Line Internet Protocol (SLIP)
A serial network is a link between two computers over a se-
rial line, which can be a dial-up connection over telephone
lines or a direct connection between the serial ports of two
computers. Serial line IP (SLIP) [Request for Comment
(RFC) 1055, available at http://www.rfc-editor.org/] de-
fines the encapsulation protocol, just as an Ethernet frame
envelopes an IP packet. Unlike Ethernet, SLIP supports

only the IP, and not multiple protocols across a single
link. The serial link is manually connected and configured,
including the specification of the IP address. SLIP does
not provide mechanisms for address negotiation, error
correction, or compression. However, many SLIP imple-
mentations record the states of TCP connections at each
end of the link, and use header compression that reduces
the size of the combined IP and TCP headers from 40 to
8 bytes.

Point-to-Point Protocol (PPP)
Point-to-point protocol (PPP) [RFC 1661, RFC 2153] re-
places the older SLIP, and is an encapsulating protocol for
IP and other protocol datagrams over serial links. The en-
capsulation and framing adds 2, 4, or 8 bytes depending
on the options chosen. PPP includes a link control proto-
col (LCP) that negotiates the encapsulation format, sizes
of packets, authentication methods, and other configu-
ration options. The CCP (compression control protocol)
used by PPP negotiates encryption. TheIP control protocol
(IPCP) included in the PPP configures the IP address, and
enables the IP protocol on both ends of the point-to-point
link.

Point-to-Point Tunneling Protocol (PPTP)
Point-to-point tunneling protocol (PPTP) encapsulates
PPP packets into IP datagrams. Its use is in providing vir-
tual private networks (VPN). After the initial PPP connec-
tion to a PPTP server, a PPTP tunnel and a PPTP control
connection are created.Tunnelingis the process of send-
ing packets of a certain protocol embedded in the pack-
ets of another protocol. PPTP uses an enhanced Generic
Routing Encapsulation (GRE) mechanism to provide a
flow- and congestion-controlled encapsulated datagram
service for carrying PPP packets.

THE INTERNET PROTOCOL
IP [RFC 791] delivers a sequence of bytes from a source
host S to a destination host D, even when the hosts are
on different networks, geographically vastly separated.
The byte sequence and the destination are given to the
IP layer by the upper layer. The IP layer forms an IP data-
gram from the sequence. An IP datagram consists of an IP
header followed by transport layer data. The IP layer soft-
ware discovers routes that the packet must take from S to
various intermediate nodes, known as routers, ultimately
arriving at D. Thus, IP is routable. Each packet travels in-
dependently even when the host S wishes to send several
packets to D; each packet delivery is made independently
of the previous ones. The routes that each packet takes
may change. Thus, IP is connectionless. The IP layer is
designed deliberately not to concern itself with guaran-
teed delivery (i.e., packets may be lost or duplicated), but
instead it is a “best effort” system. The ICMP described
later aids in this effort.

IP Address
An operating system during boot-up assigns a unique 32-
bit numeric ID known as its IP address to each NIC located
in the host system. There is no rigid relationship between
Free download pdf