当前位置:网站首页>IP packet header analysis and static routing
IP packet header analysis and static routing
2022-07-05 13:54:00 【Cwxh0125】
IP Baotou analysis
IP Number of header bytes (20-60) It's usually 20
edition : Declare this ip Baotou is ipv4 still ipv6
The length of the first : identification IP baotou The length of How many bytes
Priority and service type : Not commonly used , When using differentiated services , This field only works
Total length : Whole IP package ( message ) The length of
identifier : The data from the upper layer arrives IP layer ( The network layer ) Will be sliced , Each segment is the same byte , And it will produce a ID It is used to identify that these pieces belong to the same ip package , Used for classification and segmentation , After segmentation, all data grams can be reinstalled correctly
The following figure 1 2 
sign : There are three The first bit is not enabled For ever 0 Second 1 It means not divided 0 It's for fragmentation The last one said Is this segment the last segment If 1 Represents not the last fragment Such as 001 It stands for segmentation And there are subsequent slices
In the picture above 0 1480 2960 Segment bias
TTL: Time to live , Every time you go through a router, it's going to decrease 1,TTL Reduced to 0, Packets will be discarded ,TTL The function of value is to prevent packets from permanently circulating on the network , commonly TTL value 100 Here is Linux System ,100 The above is windows System
Agreement No : Identify the upper layer protocol , The encapsulated data used to identify the upper layer is UDP still TCP
Head check sum : Verify the three layers IP baotou
Teardrop attack is to target i The computer sending is damaged ip The package is then identified by the computer , sign , Slice offset , The computer crashed due to the failure of the reorganization
Firewall on ip The packet is forbidden to pass in pieces, and only 010 adopt , Then the network layer at the sending end will not be responsible for fragmentation , Instead, the software at the application layer splits the data and sends it , In order to achieve the purpose of no partition
route
route : Router is IP The process of Baotou selecting the path ( Select by routing table )

Routing table
- A collection of routing entries maintained in a router
- The router chooses the route according to the routing table
The formation of routing table
- Direct connection network segment
To configure IP Address , port UP state , Form a direct route - Non direct network segment
The following figure shows the routing tables of the two routers 
c Representative direct connection s It's static
Optimize routing tables Use default routing s*0.0.0.0/0 When the router cannot find the routing entry of the target network in the routing table , The router forwards the request to the default routing interface
For example, the routing table on the left of the above figure You can replace the last five lines with s*0.0.0.0/0
Multiple lines can also be connected between routers 
Static routing
conf t
ip route Target segment Subnet mask Next jump IP
Such as ip route 70.1.1.0 255.255.255.0 20.1.1.2
Default route
conf t
ip route 0.0.0.0 0.0.0.0 Next jump IP
Such as :
ip route 0.0.0.0 0.0.0.0 20.1.1.2
Floating route :
Add a space after the static or default route + Numbers ( Positive integer )
ip route 0.0.0.0 0.0.0.0 20.1.1.2
ip route 0.0.0.0 0.0.0.0 30.1.1.2 2
边栏推荐
- Liar report query collection network PHP source code
- uplad_ Labs first three levels
- 蓝桥杯学习2022.7.5(上午)
- Pancake Bulldog robot V2 (code optimized)
- LeetCode_69(x 的平方根 )
- 锚点导航小demo
- Summit review | baowanda - an integrated data security protection system driven by compliance and security
- 网络安全-HSRP协议
- LeetCode_2(两数相加)
- Comparison of several distributed databases
猜你喜欢

The development of speech recognition app with uni app is simple and fast.
![[cloud resources] what software is good for cloud resource security management? Why?](/img/c2/85d6b4a956afc99c2dc195a1ac3938.png)
[cloud resources] what software is good for cloud resource security management? Why?

Network security - Novice introduction

金融壹账通香港上市:市值63亿港元 叶望春称守正笃实,久久为功
![[machine learning notes] several methods of splitting data into training sets and test sets](/img/f6/eca239bb4b1764a1495ccd9a868ec1.jpg)
[machine learning notes] several methods of splitting data into training sets and test sets

常见问题之PHP——Fatal error: Allowed memory size of 314572800 bytes exhausted...

Attack and defense world crypto WP

Laravel框架运行报错:No application encryption key has been specified

【公开课预告】:视频质量评价基础与实践

Set up a website with a sense of ceremony, and post it to the public 2/2 through the intranet
随机推荐
基于微信小程序的订餐系统
Xampp configuring multiple items
嵌入式软件架构设计-消息交互
Liar report query collection network PHP source code
什么叫做信息安全?包含哪些内容?与网络安全有什么区别?
Kafaka log collection
[machine learning notes] how to solve over fitting and under fitting
UE源码阅读[1]---由问题入手UE中的延迟渲染
When using Tencent cloud for the first time, you can only use webshell connection instead of SSH connection.
redis6数据类型及操作总结
::ffff:192.168.31.101 是一个什么地址?
几款分布式数据库的对比
Attack and defense world crypto WP
Zibll theme external chain redirection go page beautification tutorial
Laravel框架运行报错:No application encryption key has been specified
matlab学习2022.7.4
Scientific running robot pancakeswap clip robot latest detailed tutorial
Comparison of several distributed databases
The real king of caching, Google guava is just a brother
蓝桥杯学习2022.7.5(上午)
