| ==Phrack Inc.== |
|
|
| Volume Three, Issue 28, File #3 of 12 |
|
|
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> |
| <> <> |
| <> Introduction to the Internet Protocols <> |
| <> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ <> |
| <> Chapter Eight Of The Future Transcendent Saga <> |
| <> <> |
| <> Part One of Two Files <> |
| <> <> |
| <> Presented by Knight Lightning <> |
| <> July 3, 1989 <> |
| <> <> |
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> |
|
|
|
|
| Prologue |
| ~~~~~~~~ |
| Much of the material in this file comes from "Introduction to the |
| Internet Protocols" by Charles L. Hedrick of Rutgers University. |
| That material is copyrighted and is used in this file by |
| permission. Time differention and changes in the wide area |
| networks have made it necessary for some details of the file to |
| updated and in some cases reworded for better understanding of |
| our readers. Also, Unix is a trademark of AT&T Technologies, |
| Inc. -- Just thought I'd let you know. |
|
|
| If you are not already familiar with TCP/IP, I would suggest that |
| you read "Introduction to MIDNET" (Phrack Inc., Volume Three, |
| Issue 27, File 3 of 12) for more information. That file is |
| Chapter Seven of The Future Transcendent Saga and contains |
| information about TCP/IP and how it is used within the National |
| Science Foundation Network (NSFnet). |
|
|
|
|
| Table of Contents - Part One |
| ~~~~~~~~~~~~~~~~~ |
| * Introduction |
| * What Is TCP/IP? |
| * General Description Of The TCP/IP Protocols |
| The TCP Level |
| The IP Level |
| The Ethernet Level |
|
|
|
|
| Introduction |
| ~~~~~~~~~~~~ |
| This article is a brief introduction to TCP/IP, followed by |
| suggestions on what to read for more information. This is not |
| intended to be a complete description, but it can give you a |
| reasonable idea of the capabilities of the protocols. However, |
| if you need to know any details of the technology, you will want |
| to read the standards yourself. |
|
|
| Throughout the article, you will find references to the |
| standards, in the form of "RFC" (Request For Comments) or "IEN" |
| (Internet Engineering Notes) numbers -- these are document |
| numbers. The final section (in Part Two) explains how you can |
| get copies of those standards. |
|
|
|
|
| What Is TCP/IP? |
| ~~~~~~~~~~~~~~~ |
| TCP/IP is a set of protocols developed to allow cooperating |
| computers to share resources across a network. It was developed |
| by a community of researchers centered around the ARPAnet. |
|
|
| First some basic definitions; The most accurate name for the set |
| of protocols I am describing is the "Internet protocol suite." |
| TCP and IP are two of the protocols in this suite (they will be |
| described below). Because TCP and IP are the best known of the |
| protocols, it has become common to use the term TCP/IP to refer |
| to the whole family. |
|
|
| The Internet is a collection of networks, including the Arpanet, |
| NSFnet, regional networks such as MIDnet (described in Chapter |
| Seven of the Future Transcendent Saga), local networks at a |
| number of University and research institutions, and a number of |
| military networks. The term "Internet" applies to this entire |
| set of networks. |
|
|
| The subset of them that is managed by the Department of Defense |
| is referred to as the "DDN" (Defense Data Network). This |
| includes some research-oriented networks, such as the ARPAnet, as |
| well as more strictly military ones (because much of the funding |
| for Internet protocol developments is done via the DDN |
| organization, the terms Internet and DDN can sometimes seem |
| equivalent). |
|
|
| All of these networks are connected to each other. Users can |
| send messages from any of them to any other, except where there |
| are security or other policy restrictions on access. Officially |
| speaking, the Internet protocol documents are simply standards |
| adopted by the Internet community for its own use. The |
| Department of Defense once issued a MILSPEC definition of TCP/IP |
| that was intended to be a more formal definition, appropriate for |
| use in purchasing specifications. However most of the TCP/IP |
| community continues to use the Internet standards. The MILSPEC |
| version is intended to be consistent with it. |
|
|
| Whatever it is called, TCP/IP is a family of protocols. A few |
| provide "low-level" functions needed for many applications. |
| These include IP, TCP, and UDP (all of which will be described in |
| a bit more detail later in this file). Others are protocols for |
| doing specific tasks, e.g. transferring files between computers, |
| sending mail, or finding out who is logged in on another |
| computer. |
|
|
| Initially TCP/IP was used mostly between minicomputers or |
| mainframes. These machines had their own disks, and generally |
| were self-contained. Thus the most important "traditional" |
| TCP/IP services are: |
|
|
| - File Transfer -- The file transfer protocol (FTP) allows a |
| user on any computer to get files from another computer, or |
| to send files to another computer. Security is handled by |
| requiring the user to specify a user name and password for |
| the other computer. |
|
|
| Provisions are made for handling file transfer between |
| machines with different character set, end of line |
| conventions, etc. This is not quite the same as "network |
| file system" or "netbios" protocols, which will be |
| described later. Instead, FTP is a utility that you run |
| any time you want to access a file on another system. You |
| use it to copy the file to your own system. You then can |
| work with the local copy. (See RFC 959 for specifications |
| for FTP.) |
|
|
| - Remote Login -- The network terminal protocol (TELNET) |
| allows a user to log in on any other computer on the |
| network. You start a remote session by specifying a |
| computer to connect to. From that time until you finish |
| the session, anything you type is sent to the other |
| computer. Note that you are really still talking to your |
| own computer, but the telnet program effectively makes your |
| computer invisible while it is running. Every character |
| you type is sent directly to the other system. Generally, |
| the connection to the remote computer behaves much like a |
| dialup connection. That is, the remote system will ask you |
| to log in and give a password, in whatever manner it would |
| normally ask a user who had just dialed it up. |
|
|
| When you log off of the other computer, the telnet program |
| exits, and you will find yourself talking to your own |
| computer. Microcomputer implementations of telnet |
| generally include a terminal emulator for some common type |
| of terminal. (See RFCs 854 and 855 for specifications for |
| telnet. By the way, the telnet protocol should not be |
| confused with Telenet, a vendor of commercial network |
| services.) |
|
|
| - Computer Mail -- This allows you to send messages to users |
| on other computers. Originally, people tended to use only |
| one or two specific computers and they would maintain "mail |
| files" on those machines. The computer mail system is |
| simply a way for you to add a message to another user's |
| mail file. There are some problems with this in an |
| environment where microcomputers are used. |
|
|
| The most serious is that a micro is not well suited to |
| receive computer mail. When you send mail, the mail |
| software expects to be able to open a connection to the |
| addressee's computer, in order to send the mail. If this |
| is a microcomputer, it may be turned off, or it may be |
| running an application other than the mail system. For |
| this reason, mail is normally handled by a larger system, |
| where it is practical to have a mail server running all the |
| time. Microcomputer mail software then becomes a user |
| interface that retrieves mail from the mail server. (See |
| RFC 821 and 822 for specifications for computer mail. See |
| RFC 937 for a protocol designed for microcomputers to use |
| in reading mail from a mail server.) |
|
|
| These services should be present in any implementation of TCP/IP, |
| except that micro-oriented implementations may not support |
| computer mail. These traditional applications still play a very |
| important role in TCP/IP-based networks. However more recently, |
| the way in which networks are used has been changing. The older |
| model of a number of large, self-sufficient computers is |
| beginning to change. Now many installations have several kinds |
| of computers, including microcomputers, workstations, |
| minicomputers, and mainframes. These computers are likely to be |
| configured to perform specialized tasks. Although people are |
| still likely to work with one specific computer, that computer |
| will call on other systems on the net for specialized services. |
| This has led to the "server/client" model of network services. A |
| server is a system that provides a specific service for the rest |
| of the network. A client is another system that uses that |
| service. Note that the server and client need not be on |
| different computers. They could be different programs running on |
| the same computer. Here are the kinds of servers typically |
| present in a modern computer setup. Also note that these |
| computer services can all be provided within the framework of |
| TCP/IP. |
|
|
| - Network file systems. This allows a system to access files on |
| another computer in a somewhat more closely integrated fashion |
| than FTP. A network file system provides the illusion that |
| disks or other devices from one system are directly connected |
| to other systems. There is no need to use a special network |
| utility to access a file on another system. Your computer |
| simply thinks it has some extra disk drives. These extra |
| "virtual" drives refer to the other system's disks. This |
| capability is useful for several different purposes. It lets |
| you put large disks on a few computers, but still give others |
| access to the disk space. Aside from the obvious economic |
| benefits, this allows people working on several computers to |
| share common files. It makes system maintenance and backup |
| easier, because you don't have to worry about updating and |
| backing up copies on lots of different machines. A number of |
| vendors now offer high-performance diskless computers. These |
| computers have no disk drives at all. They are entirely |
| dependent upon disks attached to common "file servers". (See |
| RFC's 1001 and 1002 for a description of PC-oriented NetBIOS |
| over TCP. In the workstation and minicomputer area, Sun's |
| Network File System is more likely to be used. Protocol |
| specifications for it are available from Sun Microsystems.) - |
| remote printing. This allows you to access printers on other |
| computers as if they were directly attached to yours. (The |
| most commonly used protocol is the remote lineprinter protocol |
| from Berkeley Unix. Unfortunately, there is no protocol |
| document for this. However the C code is easily obtained from |
| Berkeley, so implementations are common.) |
|
|
| - Remote execution. This allows you to request that a |
| particular program be run on a different computer. This is |
| useful when you can do most of your work on a small computer, |
| but a few tasks require the resources of a larger system. |
| There are a number of different kinds of remote execution. |
| Some operate on a command by command basis. That is, you |
| request that a specific command or set of commands should run |
| on some specific computer. (More sophisticated versions will |
| choose a system that happens to be free.) However there are |
| also "remote procedure call" systems that allow a program to |
| call a subroutine that will run on another computer. (There |
| are many protocols of this sort. Berkeley Unix contains two |
| servers to execute commands remotely: rsh and rexec. The |
| Unix "man" pages describe the protocols that they use. The |
| user-contributed software with Berkeley 4.3 contains a |
| "distributed shell" that will distribute tasks among a set of |
| systems, depending upon load. |
|
|
| - Name servers. In large installations, there are a number of |
| different collections of names that have to be managed. This |
| includes users and their passwords, names and network |
| addresses for computers, and accounts. It becomes very |
| tedious to keep this data up to date on all of the computers. |
| Thus the databases are kept on a small number of systems. |
| Other systems access the data over the network. (RFC 822 and |
| 823 describe the name server protocol used to keep track of |
| host names and Internet addresses on the Internet. This is |
| now a required part of any TCP/IP implementation. IEN 116 |
| describes an older name server protocol that is used by a few |
| terminal servers and other products to look up host names. |
| Sun's Yellow Pages system is designed as a general mechanism |
| to handle user names, file sharing groups, and other databases |
| commonly used by Unix systems. It is widely available |
| commercially. Its protocol definition is available from Sun.) |
|
|
| - Terminal servers. Many installations no longer connect |
| terminals directly to computers. Instead they connect them to |
| terminal servers. A terminal server is simply a small |
| computer that only knows how to run telnet (or some other |
| protocol to do remote login). If your terminal is connected |
| to one of these, you simply type the name of a computer, and |
| you are connected to it. Generally it is possible to have |
| active connections to more than one computer at the same time. |
| The terminal server will have provisions to switch between |
| connections rapidly, and to notify you when output is waiting |
| for another connection. (Terminal servers use the telnet |
| protocol, already mentioned. However any real terminal server |
| will also have to support name service and a number of other |
| protocols.) |
|
|
| - Network-oriented window systems. Until recently, |
| high-performance graphics programs had to execute on a |
| computer that had a bit-mapped graphics screen directly |
| attached to it. Network window systems allow a program to use |
| a display on a different computer. Full-scale network window |
| systems provide an interface that lets you distribute jobs to |
| the systems that are best suited to handle them, but still |
| give you a single graphically-based user interface. (The most |
| widely-implemented window system is X. A protocol description |
| is available from MIT's Project Athena. A reference |
| implementation is publically available from MIT. A number of |
| vendors are also supporting NeWS, a window system defined by |
| Sun. Both of these systems are designed to use TCP/IP.) |
|
|
| Note that some of the protocols described above were designed by |
| Berkeley, Sun, or other organizations. Thus they are not |
| officially part of the Internet protocol suite. However they are |
| implemented using TCP/IP, just as normal TCP/IP application |
| protocols are. Since the protocol definitions are not considered |
| proprietary, and since commercially-supported implementations are |
| widely available, it is reasonable to think of these protocols as |
| being effectively part of the Internet suite. |
|
|
| Note that the list above is simply a sample of the sort of |
| services available through TCP/IP. However it does contain the |
| majority of the "major" applications. The other commonly-used |
| protocols tend to be specialized facilities for getting |
| information of various kinds, such as who is logged in, the time |
| of day, etc. However if you need a facility that is not listed |
| here, I encourage you to look through the current edition of |
| Internet Protocols (currently RFC 1011), which lists all of the |
| available protocols, and also to look at some of the major TCP/IP |
| implementations to see what various vendors have added. |
|
|
|
|
| General Description Of The TCP/IP Protocols |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| TCP/IP is a layered set of protocols. In order to understand |
| what this means, it is useful to look at an example. A typical |
| situation is sending mail. First, there is a protocol for mail. |
| This defines a set of commands which one machine sends to |
| another, e.g. commands to specify who the sender of the message |
| is, who it is being sent to, and then the text of the message. |
| However this protocol assumes that there is a way to communicate |
| reliably between the two computers. Mail, like other application |
| protocols, simply defines a set of commands and messages to be |
| sent. It is designed to be used together with TCP and IP. |
|
|
| TCP is responsible for making sure that the commands get through |
| to the other end. It keeps track of what is sent, and |
| retransmitts anything that did not get through. If any message |
| is too large for one datagram, e.g. the text of the mail, TCP |
| will split it up into several datagrams, and make sure that they |
| all arrive correctly. Since these functions are needed for many |
| applications, they are put together into a separate protocol, |
| rather than being part of the specifications for sending mail. |
| You can think of TCP as forming a library of routines that |
| applications can use when they need reliable network |
| communications with another computer. |
|
|
| Similarly, TCP calls on the services of IP. Although the |
| services that TCP supplies are needed by many applications, there |
| are still some kinds of applications that don't need them. |
| However there are some services that every application needs. So |
| these services are put together into IP. As with TCP, you can |
| think of IP as a library of routines that TCP calls on, but which |
| is also available to applications that don't use TCP. This |
| strategy of building several levels of protocol is called |
| "layering." I like to think of the applications programs such as |
| mail, TCP, and IP, as being separate "layers," each of which |
| calls on the services of the layer below it. Generally, TCP/IP |
| applications use 4 layers: |
|
|
| - An application protocol such as mail. |
|
|
| - A protocol such as TCP that provides services need by many |
| applications. |
|
|
| - IP, which provides the basic service of getting datagrams to |
| their destination. |
|
|
| - The protocols needed to manage a specific physical medium, such |
| as Ethernet or a point to point line. |
|
|
| TCP/IP is based on the "catenet model." (This is described in |
| more detail in IEN 48.) This model assumes that there are a |
| large number of independent networks connected together by |
| gateways. The user should be able to access computers or other |
| resources on any of these networks. Datagrams will often pass |
| through a dozen different networks before getting to their final |
| destination. The routing needed to accomplish this should be |
| completely invisible to the user. As far as the user is |
| concerned, all he needs to know in order to access another system |
| is an "Internet address." This is an address that looks like |
| 128.6.4.194. It is actually a 32-bit number. However it is |
| normally written as 4 decimal numbers, each representing 8 bits |
| of the address. (The term "octet" is used by Internet |
| documentation for such 8-bit chunks. The term "byte" is not |
| used, because TCP/IP is supported by some computers that have |
| byte sizes other than 8 bits.) |
|
|
| Generally the structure of the address gives you some information |
| about how to get to the system. For example, 128.6 is a network |
| number assigned by a central authority to Rutgers University. |
| Rutgers uses the next octet to indicate which of the campus |
| Ethernets is involved. 128.6.4 happens to be an Ethernet used by |
| the Computer Science Department. The last octet allows for up to |
| 254 systems on each Ethernet. (It is 254 because 0 and 255 are |
| not allowed, for reasons that will be discussed later.) Note |
| that 128.6.4.194 and 128.6.5.194 would be different systems. The |
| structure of an Internet address is described in a bit more |
| detail later. |
|
|
| Of course I normally refer to systems by name, rather than by |
| Internet address. When I specify a name, the network software |
| looks it up in a database, and comes up with the corresponding |
| Internet address. Most of the network software deals strictly in |
| terms of the address. (RFC 882 describes the name server |
| technology used to handle this lookup.) |
|
|
| TCP/IP is built on "connectionless" technology. Information is |
| transfered as a sequence of "datagrams." A datagram is a |
| collection of data that is sent as a single message. Each of |
| these datagrams is sent through the network individually. There |
| are provisions to open connections (i.e. to start a conversation |
| that will continue for some time). However at some level, |
| information from those connections is broken up into datagrams, |
| and those datagrams are treated by the network as completely |
| separate. For example, suppose you want to transfer a 15000 |
| octet file. Most networks can't handle a 15000 octet datagram. |
| So the protocols will break this up into something like 30 |
| 500-octet datagrams. Each of these datagrams will be sent to the |
| other end. At that point, they will be put back together into |
| the 15000-octet file. However while those datagrams are in |
| transit, the network doesn't know that there is any connection |
| between them. It is perfectly possible that datagram 14 will |
| actually arrive before datagram 13. It is also possible that |
| somewhere in the network, an error will occur, and some datagram |
| won't get through at all. In that case, that datagram has to be |
| sent again. |
|
|
| Note by the way that the terms "datagram" and "packet" often seem |
| to be nearly interchangable. Technically, datagram is the right |
| word to use when describing TCP/IP. A datagram is a unit of |
| data, which is what the protocols deal with. A packet is a |
| physical thing, appearing on an Ethernet or some wire. In most |
| cases a packet simply contains a datagram, so there is very |
| little difference. However they can differ. When TCP/IP is used |
| on top of X.25, the X.25 interface breaks the datagrams up into |
| 128-byte packets. This is invisible to IP, because the packets |
| are put back together into a single datagram at the other end |
| before being processed by TCP/IP. So in this case, one IP |
| datagram would be carried by several packets. However with most |
| media, there are efficiency advantages to sending one datagram |
| per packet, and so the distinction tends to vanish. |
|
|
|
|
| * The TCP level |
|
|
| Two separate protocols are involved in handling TCP/IP datagrams. |
| TCP (the "transmission control protocol") is responsible for |
| breaking up the message into datagrams, reassembling them at the |
| other end, resending anything that gets lost, and putting things |
| back in the right order. IP (the "internet protocol") is |
| responsible for routing individual datagrams. It may seem like |
| TCP is doing all the work. However in the Internet, simply |
| getting a datagram to its destination can be a complex job. A |
| connection may require the datagram to go through several |
| networks at Rutgers, a serial line to the John von Neuman |
| Supercomputer Center, a couple of Ethernets there, a series of |
| 56Kbaud phone lines to another NSFnet site, and more Ethernets on |
| another campus. Keeping track of the routes to all of the |
| destinations and handling incompatibilities among different |
| transport media turns out to be a complex job. Note that the |
| interface between TCP and IP is fairly simple. TCP simply hands |
| IP a datagram with a destination. IP doesn't know how this |
| datagram relates to any datagram before it or after it. |
|
|
| It may have occurred to you that something is missing here. I |
| have talked about Internet addresses, but not about how you keep |
| track of multiple connections to a given system. Clearly it |
| isn't enough to get a datagram to the right destination. TCP has |
| to know which connection this datagram is part of. This task is |
| referred to as "demultiplexing." In fact, there are several |
| levels of demultiplexing going on in TCP/IP. The information |
| needed to do this demultiplexing is contained in a series of |
| "headers." A header is simply a few extra octets tacked onto the |
| beginning of a datagram by some protocol in order to keep track |
| of it. It's a lot like putting a letter into an envelope and |
| putting an address on the outside of the envelope. Except with |
| modern networks it happens several times. It's like you put the |
| letter into a little envelope, your secretary puts that into a |
| somewhat bigger envelope, the campus mail center puts that |
| envelope into a still bigger one, etc. Here is an overview of |
| the headers that get stuck on a message that passes through a |
| typical TCP/IP network: |
|
|
| It starts with a single data stream, say a file you are trying to |
| send to some other computer: |
|
|
| ...................................................... |
|
|
| TCP breaks it up into manageable chunks. (In order to do this, |
| TCP has to know how large a datagram your network can handle. |
| Actually, the TCP's at each end say how big a datagram they can |
| handle, and then they pick the smallest size.) |
|
|
| .... .... .... .... .... .... .... .... |
|
|
| TCP puts a header at the front of each datagram. This header |
| actually contains at least 20 octets, but the most important ones |
| are a source and destination "port number" and a "sequence |
| number." The port numbers are used to keep track of different |
| conversations. Suppose 3 different people are transferring |
| files. Your TCP might allocate port numbers 1000, 1001, and 1002 |
| to these transfers. When you are sending a datagram, this |
| becomes the "source" port number, since you are the source of the |
| datagram. Of course the TCP at the other end has assigned a port |
| number of its own for the conversation. Your TCP has to know the |
| port number used by the other end as well. (It finds out when |
| the connection starts, as I will explain below.) It puts this in |
| the "destination" port field. Of course if the other end sends a |
| datagram back to you, the source and destination port numbers |
| will be reversed, since then it will be the source and you will |
| be the destination. Each datagram has a sequence number. This |
| is used so that the other end can make sure that it gets the |
| datagrams in the right order, and that it hasn't missed any. |
| (See the TCP specification for details.) TCP doesn't number the |
| datagrams, but the octets. So if there are 500 octets of data in |
| each datagram, the first datagram might be numbered 0, the second |
| 500, the next 1000, the next 1500, etc. Finally, I will mention |
| the Checksum. This is a number that is computed by adding up all |
| the octets in the datagram (more or less - see the TCP spec). |
| The result is put in the header. TCP at the other end computes |
| the checksum again. If they disagree, then something bad |
| happened to the datagram in transmission, and it is thrown away. |
| So here's what the datagram looks like now. |
|
|
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Source Port | Destination Port | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Sequence Number | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Acknowledgment Number | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Data | |U|A|P|R|S|F| | |
| | Offset| Reserved |R|C|S|S|Y|I| Window | |
| | | |G|K|H|T|N|N| | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Checksum | Urgent Pointer | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | your data ... next 500 octets | |
| | ...... | |
|
|
| If you abbreviate the TCP header as "T", the whole file now looks like this: |
|
|
| T.... T.... T.... T.... T.... T.... T.... |
|
|
| You will note that there are items in the header that I have not |
| described above. They are generally involved with managing the |
| connection. In order to make sure the datagram has arrived at |
| its destination, the recipient has to send back an |
| "acknowledgement." This is a datagram whose "Acknowledgement |
| number" field is filled in. For example, sending a packet with |
| an acknowledgement of 1500 indicates that you have received all |
| the data up to octet number 1500. If the sender doesn't get an |
| acknowledgement within a reasonable amount of time, it sends the |
| data again. The window is used to control how much data can be |
| in transit at any one time. It is not practical to wait for each |
| datagram to be acknowledged before sending the next one. That |
| would slow things down too much. On the other hand, you can't |
| just keep sending, or a fast computer might overrun the capacity |
| of a slow one to absorb data. Thus each end indicates how much |
| new data it is currently prepared to absorb by putting the number |
| of octets in its "Window" field. As the computer receives data, |
| the amount of space left in its window decreases. When it goes |
| to zero, the sender has to stop. As the receiver processes the |
| data, it increases its window, indicating that it is ready to |
| accept more data. Often the same datagram can be used to |
| acknowledge receipt of a set of data and to give permission for |
| additional new data (by an updated window). The "Urgent" field |
| allows one end to tell the other to skip ahead in its processing |
| to a particular octet. This is often useful for handling |
| asynchronous events, for example when you type a control |
| character or other command that interrupts output. The other |
| fields are not pertinent to understanding what I am trying to |
| explain in this article. |
|
|
|
|
| * The IP Level |
|
|
| TCP sends each datagram to IP. Of course it has to tell IP the |
| Internet address of the computer at the other end. Note that |
| this is all IP is concerned about. It doesn't care about what is |
| in the datagram, or even in the TCP header. IP's job is simply |
| to find a route for the datagram and get it to the other end. In |
| order to allow gateways or other intermediate systems to forward |
| the datagram, it adds its own header. The main things in this |
| header are the source and destination Internet address (32-bit |
| addresses, like 128.6.4.194), the protocol number, and another |
| checksum. The source Internet address is simply the address of |
| your machine. (This is necessary so the other end knows where |
| the datagram came from.) The destination Internet address is the |
| address of the other machine. (This is necessary so any gateways |
| in the middle know where you want the datagram to go.) The |
| protocol number tells IP at the other end to send the datagram to |
| TCP. |
|
|
| Although most IP traffic uses TCP, there are other protocols that |
| can use IP, so you have to tell IP which protocol to send the |
| datagram to. Finally, the checksum allows IP at the other end to |
| verify that the header wasn't damaged in transit. Note that TCP |
| and IP have separate checksums. IP needs to be able to verify |
| that the header didn't get damaged in transit, or it could send a |
| message to the wrong place. It is both more efficient and safer |
| to have TCP compute a separate checksum for the TCP header and |
| data. Once IP has tacked on its header, here's what the message |
| looks like: |
|
|
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| |Version| IHL |Type of Service| Total Length | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Identification |Flags| Fragment Offset | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Time to Live | Protocol | Header Checksum | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Source Address | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Destination Address | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | TCP header, then your data ...... | |
| | | |
|
|
| If you represent the IP header by an "I", your file now looks like this: |
|
|
| IT.... IT.... IT.... IT.... IT.... IT.... IT.... |
|
|
| Again, the header contains some additional fields that will not |
| be discussed in this article because they are not relevent to |
| understanding the process. The flags and fragment offset are |
| used to keep track of the pieces when a datagram has to be split |
| up. This can happen when datagrams are forwarded through a |
| network for which they are too big. (This will be discussed a |
| bit more below.) The time to live is a number that is decremented |
| whenever the datagram passes through a system. When it goes to |
| zero, the datagram is discarded. This is done in case a loop |
| develops in the system somehow. Of course this should be |
| impossible, but well-designed networks are built to cope with |
| "impossible" conditions. |
|
|
| At this point, it's possible that no more headers are needed. If |
| your computer happens to have a direct phone line connecting it |
| to the destination computer, or to a gateway, it may simply send |
| the datagrams out on the line (though likely a synchronous |
| protocol such as HDLC would be used, and it would add at least a |
| few octets at the beginning and end). |
|
|
|
|
| * The Ethernet Level |
|
|
| Most networks these days use Ethernet which has its own |
| addresses. The people who designed Ethernet wanted to make sure |
| that no two machines would end up with the same Ethernet address. |
| Furthermore, they didn't want the user to have to worry about |
| assigning addresses. So each Ethernet controller comes with an |
| address built-in from the factory. In order to make sure that |
| they would never have to reuse addresses, the Ethernet designers |
| allocated 48 bits for the Ethernet address. People who make |
| Ethernet equipment have to register with a central authority, to |
| make sure that the numbers they assign don't overlap any other |
| manufacturer. Ethernet is a "broadcast medium." That is, it is |
| in effect like an old party line telephone. When you send a |
| packet out on the Ethernet, every machine on the network sees the |
| packet. So something is needed to make sure that the right |
| machine gets it. As you might guess, this involves the Ethernet |
| header. |
|
|
| Every Ethernet packet has a 14-octet header that includes the |
| source and destination Ethernet address, and a type code. Each |
| machine is supposed to pay attention only to packets with its own |
| Ethernet address in the destination field. (It's perfectly |
| possible to cheat, which is one reason that Ethernet |
| communications are not terribly secure.) Note that there is no |
| connection between the Ethernet address and the Internet address. |
| Each machine has to have a table of what Ethernet address |
| corresponds to what Internet address. (I will describe how this |
| table is constructed a bit later.) In addition to the addresses, |
| the header contains a type code. The type code is to allow for |
| several different protocol families to be used on the same |
| network. So you can use TCP/IP, DECnet, Xerox NS, etc. at the |
| same time. Each of them will put a different value in the type |
| field. Finally, there is a checksum. The Ethernet controller |
| computes a checksum of the entire packet. When the other end |
| receives the packet, it recomputes the checksum, and throws the |
| packet away if the answer disagrees with the original. The |
| checksum is put on the end of the packet, not in the header. The |
| final result is that your message looks like this: |
|
|
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Ethernet destination address (first 32 bits) | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Ethernet dest (last 16 bits) |Ethernet source (first 16 bits)| |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Ethernet source address (last 32 bits) | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Type code | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | IP header, then TCP header, then your data | |
| | | |
| ... |
| | | |
| | end of your data | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| | Ethernet Checksum | |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
|
|
| If you represent the Ethernet header with "E", and the Ethernet |
| checksum with "C", your file now looks like this: |
|
|
| EIT....C EIT....C EIT....C EIT....C EIT....C |
|
|
| When these packets are received by the other end, of course all |
| the headers are removed. The Ethernet interface removes the |
| Ethernet header and the checksum. It looks at the type code. |
| Since the type code is the one assigned to IP, the Ethernet |
| device driver passes the datagram up to IP. IP removes the IP |
| header. It looks at the IP protocol field. Since the protocol |
| type is TCP, it passes the datagram up to TCP. TCP now looks at |
| the sequence number. It uses the sequence numbers and other |
| information to combine all the datagrams into the original file. |
|
|
| This ends my initial summary of TCP/IP. There are still some |
| crucial concepts I have not gotten to, so in part two, I will go |
| back and add details in several areas. (For detailed |
| descriptions of the items discussed here see, RFC 793 for TCP, |
| RFC 791 for IP, and RFC's 894 and 826 for sending IP over |
| Ethernet.) |
| __________________________________________________________________ |
|
|