MC9241- Network programming notes

Tuesday 27 September 2011

UNIT – I
Process termination
command line arguments
Environment of a UNIX process
Process Times
Process relationships terminal logins
Message Queues
Shared Memory
Semaphores



Creation of a process
A unique pid is assigned to the new process
Space is allocated for all the elements of the process image.
The process control block is initialized. Inherit info from parent
The appropriate linkages are set: for scheduling, state queues
Create and initialize other data structures (file tables, IO table etc
Process Interruption
Two kinds of process interruptions: interrupt and trap
Interrupt: Caused by some event external to and asynchronous
Trap : Error or exception condition generated within the currently running process. Ex: illegal access to a file, arithmetic exception
(supervisor call) : explicit interruption

Unix system VProcess controlUNIX

Every process, except process 0, is created by the fork() system call

fork() allocates entry in process table and assigns a unique PID to the child process

child gets a copy of process image of parent: both child and parent are executing the same code following fork()

but fork() returns the PID of the child to the parent process and returns 0 to the child process

fork and exec

Child process may choose to execute some other program than the parent by using exec call.

Exec overlays a new program on the existing process.

Child will not return to the old program unless exec fails. This is an important point to remember.

Why does fork need to clone?

Why do we need to separate fork and exec?

Why can’t we have a single call that fork a new program?

Race conditions

race = shared data + outcome depends on order that processes run

e.g., parent or child runs first?

waiting for parent to terminate

generally, need some signaling mechanism

signals

stream pipes

THREADS

process: address space + single thread of control

sometimes want multiple threads of control (flow) in same address space

quasi-parallel

threads separate resource grouping & execution

thread: program counter, registers, stack

also called lightweight processes

multithreading: avoid blocking when waiting for resources

multiple services running in parallel

state: running, blocked, ready, terminated

Pthreads

POSIX standard for threads.

POSIX standard (IEEE 1003.1c) : The standard defines an API for creating and manipulating threads.

Pthreads defines a set of C programming language types and procedure calls.

It is implemented with a pthread.h header and a thread library

Data types

pthread_t: handle to a thread

pthread_attr_t: thread attributes

System V IPC

The System V IPC consists of three types of IPC :

Message Queues,

Semaphores and

shared memory

Similarities between the three IPC

Identifiers and keys

Permission structure

Configuration Limits

Identifiers and keys

Each of the three structures is referred to the kernel by a nonnegative identifier.

Whenever an IPC structure is being created, key must be specified.

The data type of this key is key_t(defined in sys/types.h)

This key is converted to the identifier by the kernel.

Permission Structure.

Every IPC structure has an associates ipc_perm structure.This structure is used to define the permission and the owners.

struct ipc_perm {

uid uid; /* owner’s effective user id */

gid_t gid ; /* owner’s effective group id */

uid_t cuid; /* creator’s effective user id */

gid_t cgid; /* creator’s effective group id */

mode_t mode; /* access mode */

ulong seq; /* slot usage sequence number */

key_t key; /* key */

}

Disadvantages

IPC structures are system wide and do not have a reference count.

IPC structure are known by names in the file system. We can’t access and modify their properties

It is hard to use more than one IPC structure at a time, because we can’t use multiplexed I/O functions.

Message Queues

These are linked list of messages stored within the kernel and identified by a message queue identifier called queue ID.

msgget : is used to create a new queue or open an existing queue.

msgsnd : used to add messages to the end of the queue

msgrcv : messages are fetched from a queue

every queue has a msqid_ds structure associated with it.

This structure is used to define the current status of the queue.

strcut msqid_ds {

struct ipc_perm msg_perm ;

struct msg *msg_first;

struct msg *msg_last;

olong msg_cbytes;

ulong msg_qbytes;

pid_t msg_lspid;

pid_t msg_lrpid;

time_t msg_stime

Semaphores

Semaphores are a programming construct designed by E. W. Dijkstra in the late 1960s

Semaphores let processes query or alter status information. They are often used to monitor and control the availability of system resources such as shared memory segments.

Initializing a Semaphore Set

The function semget() initializes or gains access to a semaphore.

It is prototyped by:

int semget(key_t key, int nsems, int semflg);

The cmd argument is one of the following control flags:

GETVAL -- Return the value of a single semaphore.

SETVAL -- Set the value of a single semaphore. In this case, arg is taken as arg.val, an int.

GETPID -- Return the PID of the process that performed the last operation on the semaphore or array.

GETNCNT -- Return the number of processes waiting for the value of a semaphore to increase.

GETZCNT -- Return the number of processes waiting for the value of a particular semaphore to reach zero.

GETALL -- Return the values for all semaphores in a set. In this case, arg is taken as arg.array, a pointer to an array of unsigned shorts (see below).

SETALL -- Set values for all semaphores in a set. In this case, arg is taken as arg.array, a pointer to an array of unsigned shorts.

IPC_STAT -- Return the status information from the control structure for the semaphore set and place it in the data structure pointed to by arg.buf, a pointer to a buffer of type semid_ds.

IPC_SET -- Set the effective user and group identification and permissions. In this case, arg is taken as arg.buf.

IPC_RMID -- Remove the specified semaphore set.

Semaphore Operations

semop() performs operations on a semaphore set. It is prototyped by:

int semop(int semid, struct sembuf *sops, size_t nsops); The semid argument is the semaphore ID returned by a previous semget() call. The sops argument is a pointer to an array of structures, each containing the following information about a semaphore operation:

The semaphore number

The operation to be performed

Control flags, if any.

The sembuf structure specifies a semaphore operation, as defined in .

struct sembuf

{

ushort_t sem_num; /* semaphore number */

short sem_op; /* semaphore operation */

short sem_flg; /* operation flags */};

}

There are two control flags that can be used with semop():

IPC_NOWAIT Can be set for any operations in the array. Makes the function return without changing any semaphore value if any operation for which IPC_NOWAIT is set cannot be performed. The function fails if it tries to decrement a semaphore more than its current value, or tests a nonzero semaphore to be equal to zero.

SEM_UNDO Allows individual operations in the array to be undone when the process exits.

Mutual Exclusion and Synchronization

Mutual exclusion

Guarantee that no two processes (or other types of agents) should access a critical region at the same time

Synchronization

Guarantee that one step should occur before/after another

Use lock, semaphore, or monitor to achieve mutual execution and/or synchronization

Critical Region and Locking

How to Implement the Lock?

How to use lock for mutual exclusion?

lock (lck);

< critical section >

unlock (lck);

How to use lock for synchronization?

E.g., Guarantee that S12 executes before S22

P1: S11, S12 P2: S21, S22

lock (lck);

P1: S11, S12, unlock (lck);

P2: S21, lock (lck); S22

Bounded Buffer Problem

Analysis

full: indicates how far from full

full.count = 0 ® n items in buffer ® producer wait

Þ producer decreases full.count

consumer increases full.count

empty: indicates how far from empty

empty.count = 0 ® 0 item in buffer ® consumer wait

Þ producer increases empty.count

consumer decreases full.count

Both have to wait on mutex before accessing buffer

If only one producer and one consumer, do we still have to use mutex?

No, each uses a different buffer slot

But we still need to use full and empty semaphores

Reader-Writer Problem

Many reader can read at the same time without causing problem

When there is a writer, has to write exclusively

First reader/writer problem (reader has priority)

If ³ 1 reader in CS Þ allow more readers to get in

If a writer is in CS, no one else can enter

This way readers has a higher priority

Have starvation problem for writers

There are other forms of reader/writer problem

Monitor

Protect shared objects within an abstraction

Provide encapsulation

Accesses to a shared object is confined within a monitor

Easier to debug the code

Provide mutual exclusive accesses

No two process can be active at the same time within a monitor

Monitor and Semaphore

Monitor provides encapsulation

What should be encapsulated?

Too much Þ reduce concurrency

Some part of the code that can be executed concurrently, if encapsulated in the monitor, can cause reduced concurrency

If not encapsulate them, then lose the meaning of encapsulation

Reader/writer example

If monitor is used to do what a semaphore would do

Monitor is more expensive



UNIT – II
Overview of TCP/IP
Socket address Structures
Byte ordering functions
Byte Manipulation Functions
Address conversion functions
Address conversion functions
Elementary TCP Sockets program
Iterative Server
Concurrent Server


Transport Layer

OSI Layer Protocols

Some protocols used

User datagram protocol

Transmission Control Protocol

TCP Connection establishment and Termination

TCP State Transition

Port Number

Protocols

Protocols are the standards that specify how data is represented when being transferred from one machine to another.

Protocols specify how the transfer occurs, how errors are detected, and how acknowledgements are passed.

To simplify protocol design and implementation, communication stacks are segregated into layers that can be solved independently.

Each layer is assigned a separate protocol.

Network Layer

The Network Layer is responsible for establishing paths for data transfer through the network

IP

IGMP

ICMP

ARP

RARP

IP :

IP is a network layer protocol in the Internet protocol suite

Addressing.

Packet timeouts

Options : trace the route a packet takes (record route), label packets with security features.

IPV4 :

Uses 32 bit addresses 192.1.2.34

IPV6

Uses 128 bit addresses 3ffe:ffff:101::230:6eff:fe04:d9ff.

ICMP

Internet Control Message Protocol

Handles error and control information between routers and hosts

IGMP

Internet Group Management Protocol

Used with multicasting

ARP

the Address Resolution Protocol (ARP)

standard method for finding a host's hardware address when only its network layer address is known.

RARP

Reverse Address Resolution Protocol (RARP)

used to obtain an IP address for a given hardware address (such as an Ethernet address).

Transport Layer

Process-Level Addressing:

Segmentation, Packaging and Reassembly:

Multiplexing and Demultiplexing:

Connection Establishment, Management and Termination

Acknowledgments and Retransmissions

Flow Control:

User Datagram Protocol

UDP is not reliable

In case of checksum error or datagram dropped in the network

It is not retransmitted

UDP Datagram has length

The length of the data is passed along with the data so it has record boundaries unlike the TCP which does not have boundaries

Provides a connectionless service

No long term relationship between the client and the server

Transmission Control Protocol

Feature of Transmission Control Protocol

Connections :

Provides connection between clients and servers

Reliability

Acknowledge required when data is sent over the network

If acknowledgement not received , TCP automatically retransmits the data

UDP not reliable

RTT

TCP contains algorithm to estimate the Round Trip Time between the client and server

Sequences Data :

TCP sequences the data by associating a sequence number with every byte that it sends

If a byte arrives out of order TCP can reorder it .

If duplicate data arrives, It discards the duplicate data

Flow Control

Advertised window : TCP tells the peer how many bytes of data it is wiling to accept from the peer at any one time

As data is received from the sender , the window size decreases , but as the receiving application reads data from the buffer , the window size decreases

UDP does not provide flow control

Full duplex connection

The application can send and receive data in both the directions on a given connection at any given time

UDP can be full duplex

Sockets

A socket is an end to end communication link between a server and a client application. This allows applications to be network aware, and send and receive data via a network. Interface details vary from computer to computer.

applications consist of a server portion and a client portion. An application program request the operating system to create a socket connection. Each time a socket connection is used, the application program must specify the destination address, or alternatively, bind the IP address to the socket.

Sockets use a destination address and port number to communicate with another application. Each connection uses a specific port number, some of which are reserved (see /etc/services).

Types of sockets

Internet Sockets,

unix sockets,

X.25 sockets

Two Types of Internet Sockets

Stream Sockets (SOCK_STREAM)

Connection oriented, rely on TCP to provide reliable two-way connected communication

Datagram Sockets (SOCK_DGRAM)

Rely on UDP, Connection is unreliable

Datagram sockets

The datagram protocol, also known as UDP, is connectionless.

This means that each time a datagram (a packet of data to a destination) is sent, the socket and destination computers address must be included. There is a limit of 64KB for datagrams sent to a specific location.

UDP is also unreliable, as there is no quarantee that the datagrams sent will arrive in the same order at the destination.

The files to include in application programs that define sockets and the various calls associated with them are

sys/types.h
sys/socket.h
netinet/in.h
arpa/inet.h

Data types

a socket descriptor : int

struct sockaddr

struct sockaddr_in

Creating a socket


The socket() call creates a socket on demand. The format is

int s;
s = socket( AF_INET, SOCK_DGRAM, 0 );
/* specify TCP/IP and use datagrams */

If the socket was not created, -1 is returned to indicate an error. When a socket is created, it is in an unconnected state. An application program normally uses the system call connect() to bind a destination address to the socket and place it into a connected state.

Sockets can be used in either connectionless datagram or as a more reliable stream. In connectionless datagram (udp), there is no guarentee of delivery. In tcp sockets, data delivery is guaranteed.

recvfrom(), sendto() and sendmsg() allow udp as they require the destination address to be specified as part of the call.

Setting up a destination address and port number

An application program creates a variable of type struct sockaddr_in, then assigns the destination address and port number to this variable. In sending or receiving data on the socket connection, this variable is passed as a parameter.

struct sockaddr_in server;

/* set up server name and port number */
server.sin_family = AF_INET; /* use TCP/IP */
server.sin_port = 800; /* specify port 800 */
server.sin_addr.s_addr = inet_addr("156.59.20.50");

Binding the destination address

Rather than specify the destination address in each call, the destination address can be bound to the socket.

/* set up the server connection side */server.sin_family = AF_INET; /* use TCP/IP */server.sin_port = 0; /* use first available port */server.sin_addr.s_addr = INADDR_ANY;if( bind( s, &server, sizeof(server) ) < 0 ) { perror("Error, socket not bound."); exit(3);}

Sending data to the socket connection

There are five possible system calls that an application program can use to send data to a socket. They are send(), sendto(), sendmsg(), write() and writev().

The following code fragment sends data to the port.

char buf[32];
strcpy( buf, "Hello" );
sendto( s, buf, sizeof(buf)+1, 0, &server, sizeof(server));

Receiving data from the socket connection


The following code fragment receives data from the port.

char buf[32];int s, client_address_size;struct sockaddr_in client, server; if( recvfrom( s, buf, sizeof(buf), 0, (struct sockaddr *) &client, &client_address_size) < 0 ) { perror("Error getting data from socket connection."); exit( 4 );}

Closing the socket connection

When the application program is finished, the socket connection should be closed.

close( s );

Byte Ordering functions

htons() - short integer from host byte order to network byte order.

ntohs() - short integer from network byte order to host byte order.

htonl() - long integer from host byte order to network byte order.

ntohl() - long integer from network byte order to host byte order.

S = 16 bit ( port number )

L = 32 bit (IPv4 addresses)

Stream protocol

The stream protocol, also known as TCP, is connection orientated.

This requires a connection to be established between the sender and receiver.

One of the sockets listens for a connection request (the server), the other socket asks for a connection (the client).

When the server accepts the connection request from the client, data can then be sent between the server and client.

In TCP there is no limit on the amount of data that can be transmitted. TCP is also a reliable protocol, in that data is received in the same order in which it was sent.

Now Let us write the TCP Program

Client.c

The main aim of the client is

to create a socket

Get and store the server`s address

Use the connect function to establish connection with the server

Send and receive messages

include the following header files

#include

#include

#include

#include

#include /* bcoz v use hostent structure */

#include

#include /* for internet family adderss structures */

#include

declare the two integer values

numbytes,

sockfd

declare a char buff of size 100

declare a pointer variable hname of type struct hostent

declare a variable serveraddr of type sockaddr_in

use the gethostbyname() function to lookup the server name and check if it was successful or not . Note that the return value must be received in hname variable

call the socket function and check if it is successful or not and store the return value in sockfd

initialize the values of serveraddr to 0, using the bzero function

Initialize the values of sin_family and sin_port of the serveraddress

get the h_addr of the hname and type cast it to struct in_addr pointer and assign this value to the sin_addr as follows

serveraddr.sin_addr = *((struct in_addr *)hname->h_addr);

use the connect function to establish the connection with the server and check if it successful or not

Now you can send and receive the data

use recv() function to receive the data sent by the server and check if it was successfully received or not

Print the data that was received on the screen

server.c

The main aim of the server is

to create a socket

Bind with the local protocol

Listen for any incoming requests

Accept the requests

Send and receive messages

declare two integer values – sockfd and newsockfd

declare a variable myaddress of type structure sockaddr_in;

declare a variable clientaddress of type structure sockaddr_in;

using the socket function create a socket and check if it was successful or not

initialize the values of the myaddress to zero using bzero function

Initialize the values of sin_family, sin_port and sin_addr(INADDR_ANY)

Use the bind() function to get the local protocol address of the server and check if it is successful or not

Use the listen() function to wait for a connection and check if it is successful or not

use the accept () function to accept a client connection and store the return value in the newsockfd variable . Check if it is successful or not

use the send function to send some data to the client and check if it was successfully sent or not ( note that you must use the newsockfd to send the data and not the sockfd)

UDP PROGRAM

Client does not establish a connection with the server

Instead, the client just sends a datagram to the server using sendto()

Similarly the server does not accept a connection from the client. Instead it just calls a recvfrom()

Recvfrom(int sockfd, void *buff, size_t nbytes, int flags, struct sockaddr *from , socklen_t *addrlen)

Sendto(int sockfd, const void *buff, size_t nbytes, int flags, struct sockaddr *to, socklen_t *addrlen)

NAME AND ADDRESS CONVERSIONS
inet_aton, function
o converts the specified string, in the Internet standard dot notation, to a network address, and stores the address in the structure provided.
int inet_aton(const char *cp, struct in_addr *addr);
o Ex
inet_aton(“172.16.2.215”, &serveraddress);
o returns 1 if the address is successfully converted, or 0 if the conversion failed.
inet_addr
o converts the specified string, in the Internet standard dot notation, to an integer value suitable for use as an Internet address.
o The converted address is in network byte order (bytes ordered from left to right).
in_addr_t inet_addr(const char *cp);
o Ex:
Struct in_addr a ;
a.in_addr_t = inet_addr(“172.16.2.215”)
o On success, inet_addr() returns the Internet address. Otherwise, it returns -1.
o
inet_ntoa
o converts the specified Internet host address to a string in the Internet standard dot notation.
char *inet_ntoa(struct in_addr in);
o returns a pointer to the network address in Internet standard dot notation
inet_net_pton()
o char *inet_net_pton(int af, const char *src, void *dst, size_t size);
o converts an Internet network number from presentation format (either Internet standard dot notation, or Classless Internet Domain Routing (CIDR) format) to network format
o Used for IPV6
inet_ntop()
o converts an address from network format to presentation format.
o Used in IPV6
char *inet_ ntop(int af, const void *src, char *dst, size_t size);



UNIT – III
Posix Signal handling
I/O multiplexing –I/O Models
I/O multiplexing –I/O Models
select function
shutdown function -poll function


POSIX SIGNAL HANDLING
A signal is a limited form of inter-process communication used in Unix, Unix-like, and other POSIX-compliant operating systems. Essentially it is an asynchronous notification sent to a process in order to notify it of an event that occurred. When a signal is sent to a process, the operating system interrupts the process's normal flow of execution. Execution can be interrupted during any non-atomic instruction. If the process has previously registered a signal handler, that routine is executed. Otherwise the default signal handler is executed.
Signal
Description
Process aborted
Signal raised by alarm
Bus error: "access to undefined portion of memory object"
Child process terminated, stopped (or continued*)
Continue if stopped
Floating point exception: "erroneous arithmetic operation"
Hangup
Illegal instruction
Interrupt
Kill (terminate immediately)
Write to pipe with no one reading
Quit and dump core
Stop executing temporarily
Termination (request to terminate)
Terminal stop signal
Background process attempting to read from tty ("in")
Background process attempting to write to tty ("out")
User-defined 1
User-defined 2
Pollable event
Profiling timer expired
Trace/breakpoint trap
Urgent data available on socket
Signal raised by timer counting virtual time: "virtual timer expired"
CPU time limit exceeded
File size limit exceeded
I/O MULTIPLEXING
· Type of I/O Models
o Blocking I/O
o Non Blocking I/O
o I/O Multiplexing
o Signal driven I/O
o Asynchronous I/O
· Synchronous I/O Vs Asynchronous I/O
o Synchronous I/o
§ Causes the requesting process to be blocked until that I/O operation completes
§ Eg : Blocking, non blocking, I/O multiplexing, signal driven I/O
§ Asynchronous I/O
§ Does not cause the requesting process to be blocked
o Asynchronous I/O
o Polling : continually checking the kernel to see if the datagram is ready
o It is a waste of CPU Time
o The process blocks in call to select , waiting for one of possible many sockets to become readable
o Slight disadvantage : requires 2 system calls
o Advantage : can wait for more than one descriptor
o waiting for the datagram to arrive
o Signal driven tells us when the I/O operation can be initiated
o Asynchronous tells us when the I/O operation can be completed
o Few systems support POSIX asynchronous I/O
· Select Function
o This function allows the process to instruct the kernel to wait for any one of multiple events to occur
o and to wake up the process when one or more of the event occurs
o Or when a specified amount of time has passed
o We can call select and tell the kernel to return only when
o Any of the descriptors in the set {1,4,5} are ready for reading
o Any of the descriptors in the set {2,7} are ready for writing
o Any of the descriptors in the set {1,4} have an exception condition pending
o 10 seconds have elapsed
int select( int nfds,
fd_set* readfds,
fd_set* writefds,
fd_set* exceptfds,
const struct timeval* timeout
);
struct timeval
{
long tv_sec;
long tv_usec
};


UNIT IV
Socket options – getsocket and setsocket functions –
Generic socket options –
Generic socket options –
IP socket options –
ICMP socket options – TCP socket options –
Elementary UDP sockets
Domain name system –.
gethostbyname function – Ipv6 support in DNS
gethostbyadr function
getservbyname and getservbyport functions


SOCKET OPTIONS
· SOL_SOCKET
o Use this constant as the level argument to getsockopt or setsockopt to manipulate the socket-level options described in this section.
· SO_DEBUG
o This option toggles recording of debugging information in the underlying protocol modules. The value has type int; a nonzero value means “yes”.
· SO_REUSEADDR
o This option controls whether bind (see Setting Address) should permit reuse of local addresses for this socket. If you enable this option, you can actually have two sockets with the same Internet port number; but the system won't allow you to use the two identically-named sockets in a way that would confuse the Internet. The reason for this option is that some higher-level Internet protocols, including FTP, require you to keep reusing the same port number.
o The value has type int; a nonzero value means “yes”.
· SO_KEEPALIVE
o This option controls whether the underlying protocol should periodically transmit messages on a connected socket. If the peer fails to respond to these messages, the connection is considered broken. The value has type int; a nonzero value means “yes”.
· SO_DONTROUTE
o This option controls whether outgoing messages bypass the normal message routing facilities. If set, messages are sent directly to the network interface instead. The value has type int; a nonzero value means “yes”.
· SO_LINGER
o This option specifies what should happen when the socket of a type that promises reliable delivery still has untransmitted messages when it is closed; see Closing a Socket. The value has type struct linger.
o — Data Type: struct linger
o This structure type has the following members:
o int l_onoff
o This field is interpreted as a boolean. If nonzero, close blocks until the data are transmitted or the timeout period has expired.
o int l_linger
o This specifies the timeout period, in seconds.
· SO_BROADCAST
o This option controls whether datagrams may be broadcast from the socket. The value has type int; a nonzero value means “yes”.
· SO_OOBINLINE
o If this option is set, out-of-band data received on the socket is placed in the normal input queue. This permits it to be read using read or recv without specifying the MSG_OOB flag. See Out-of-Band Data. The value has type int; a nonzero value means “yes”.
· SO_SNDBUF
o This option gets or sets the size of the output buffer. The value is a size_t, which is the size in bytes.
· SO_RCVBUF
o This option gets or sets the size of the input buffer. The value is a size_t, which is the size in bytes.
· SO_STYLE
· SO_TYPE
o This option can be used with getsockopt only. It is used to get the socket's communication style. SO_TYPE is the historical name, and SO_STYLE is the preferred name in GNU. The value has type int and its value designates a communication style; see Communication Styles.
· SO_ERROR
o This option can be used with getsockopt only. It is used to reset the error status of the socket. The value is an int, which represents the previous error status.
Here are the functions for examining and modifying socket options. They are declared in sys/socket.h.
— Function: int getsockopt (int socket, int level, int optname, void *optval, socklen_t *optlen-ptr)
The getsockopt function gets information about the value of option optname at level level for socket socket.
The option value is stored in a buffer that optval points to. Before the call, you should supply in *optlen-ptr the size of this buffer; on return, it contains the number of bytes of information actually stored in the buffer.
Most options interpret the optval buffer as a single int value.
The actual return value of getsockopt is 0 on success and -1 on failure. The following errno error conditions are defined:
EBADF
The socket argument is not a valid file descriptor.
ENOTSOCK
The descriptor socket is not a socket.
ENOPROTOOPT
The optname doesn't make sense for the given level.
— Function: int setsockopt (int socket, int level, int optname, void *optval, socklen_t optlen)
This function is used to set the socket option optname at level level for socket socket. The value of the option is passed in the buffer optval of size optlen.
Generic Socket Options
SO_BROADCAST: permit sending of broadcast datagram, only on broadcast links
SO_DEBUG: enable debug tracing of packets sent or received by TCP socket, trpt program to examine the kernel circular buffer
SO_DONTROUTE: bypass routing table lookup, used by routing daemons (routed and gated) in case the routing table is incorrect
SO_ERROR: get pending error and clear
SO_KEEPALIVE: test if TCP connection still alive periodically (2 hours, changed by TCP_KEEPALIVE)
Generic Socket Options (Cont.)
SO_LINGER: linger on TCP close if data in socket send buffer, linger structure passed
SO_OOBINLINE: leave received out-of-band data inline in the normal input queue
SO_RCVBUF/SO_SNDBUF: socket receive / send buffer size, TCP default: 8192-61440, UDP default: 40000/9000
SO_RCVLOWAT/SO_SNDLOWAT: receive / send buffer low water mark for select to return
SO_RCVTIMEO/SO_SNDTIMEO: receive / send timeout for socket read/write
SO_REUSEADDR/SO_REUSEPORT: allow local address reuse for TCP server restart, IP alias, UDP duplicate binding for multicasting
SO_TYPE: get socket type, SOCK_STREAM or SOCK_DGRAM
SO_USELOOPBACK: routing socket gets copy of what it sends
IPv4 Socket Options
IP_HDRINCL: IP header included with data, e.g. traceroute builds own IP header on a raw socket
IP_OPTIONS: specify socket options like source route, timestamp, record route, etc.
IP_RECVSTADDR: return destination IP address of a received UDP datagram by recvmsg
IP_RECVIF: return received interface index for a received UDP datagram by recvmsg
IP Socket Options (Cont.)
IP_TOS: set IP TOS field of outgoing packets for TCP/UDP socket, TOS: IPTOS_LOWDELAY / THROUGHPUT, RELIABILITY / LOWCOST
IP_TTL: set and fetch the default TTL for outgoing packets, 64 for TCP/UDP sockets, 255 for raw sockets, used in traceroute
IP_MULTICAST_IF, IP_MULTICAST_TTL, IP_MULTICAST_LOOP,IP_ADD_MEMBERSHIPIP_DROP_MEMBERSHIP
IPv6 Socket Options
ICMP6_FILTER: fetch and set icmp6_filter structure specifying message types to pass
IPV6_ADDFORM: change address format of socket between IPv4 and IPv6
IPV6_CHECKSUM: offset of checksum field for raw socket
IPV6_DSTOPTS: return destination options of received datagram by recvmsg
IPV6_HOPLIMIT: return hop limit of received datagrams by recvmsg
IPv6 Socket Options (Cont.)
IPV6_HOPOPS: return hop-by-hop options of received datagrams by recvmsg
IPV6_NEXTHOP: specify next hop address as a socket address structure for a datagram
IPV6_PKTINFO: return packet info, dest IPv6 and arriving interface, of received datagrams
IPV6_PKTOPTIONS: specify socket options of TCP socket
IPV6_RTHDR: receive source route
IPV6_UNICAST_HOPS: ~ IP_TTL
IPV6_MULTICAST_IF/HOPS/LOOP, IPV6_ADD/DROP_MEMBERSHIP
TCP Socket Options
TCP_KEEPALIVE: seconds between probes
TCP_MAXRT: TCP max retx time
TCP_MAXSEG: TCP max segment size
TCP_NODELAY: disable Nagle algorithm, to reduce the number of small packets
TCP_STDURG: interpretation of TCP’s urgent pointer, used with out-of-band data



UNIT-V
Mutexes
condition variables
raw sockets – raw socket creation
raw socket input-raw socket output
ping program
trace route program.


RAW SOCKETS

Usually, sockets are used to build applications on top of a transport protocol

Stream sockets (TCP)

Datagram sockets (UDP)

Some applications need to access a lower layer protocol,

Control protocols built on IP rather than UDP or TCP, such as ICMP and IGMP

Experimental transport protocols

A “raw” socket allows direct access to IP

Used to build applications on top of the network layer

Standard socket() call used to create a raw socket

Family is AF_INET, as for TCP or UDP

Socket type is SOCK_RAW instead of SOCK_STREAM or SOCK_DGRAM

Socket protocol needs to be specified, e.g. IPPROTO_ICMP

Socket (AF_INET, SOCK_RAW, IPPROTO_ICMP)

Features of Raw Socket

Read and write ICMP and IGMP packets (instead for putting more code into the kernel, it is handled entirely in the user process )

A process can read and write IPv4 datagram with an IPV4 protocol field that is not processed by the kernel (most kernel process datagram of ICMP, IGMP, TCP, UDP)

A process can build its own IPV4 header using IP_HDRINCL socket option

Raw socket creation

Only a super user can create a raw socket

Created as follows

Sockfd=socket(AF_INET, SOCK_RAW, protocol)

Protocol: IPPROTO_xxx

IP_HDRINCL option can be set as follows

int on = 1;

setsockopt(sockfd,, IPPROTO_IP, IP_HDRINCL, &on, sizeof(on))

Raw Socket Output

Normal output can be performed : sendto, send, write

The starting address to be specified

If IP_HDRINCL is not set : the first byte following the IP header

If IP_HDRINCL is set : the first byte of the IP Header

Raw Socket Input

Cannot read the TCP & UDP directly through the raw socket. It must be read through the data link layer

Icmp packets are passed to the raw socket after the kernel has finished process the ICMP message

Internet Control Message Protocol

ICMP messages

Query network node(s) for information

Report error conditions

ICMP messages are carried as IP datagrams

ICMP “uses” or is “above” IP

ICMP messages usually processed by IP, UDP,or TCP

Two important applications of Raw Sockets

Ping program

Trace route Program

PING
· Ping is a computer network tool used to test whether a particular host is reachable across an IP network;
· it is also used to self test the network interface card of the computer.
· It works by sending ICMP “echo request” packets to the target host and listening for ICMP “echo response” replies.
· Ping estimates the round-trip time, generally in milliseconds, and records any packet loss, and prints a statistical summary when finished
· ICMP packet
ICMP ping packet
Bit 0 - 7
Bit 8 - 15
Bit 16 - 23
Bit 24 - 31
IP Header
(160 bits OR 20 Bytes)
Version/IHL
Type of service
Length
Identification
flags et offset
Time To Live(TTL)
Protocol
Checksum
Source IP address
Destination IP address
ICMP Payload
(64+ bits OR 8+ Bytes)
Type of message
Code
Checksum
Quench
Data (optional)

· Composition of an ICMP Echo Reply packet
o Header (in blue), with Protocol set to 1 and Type of Service set to 0.
o Type of ICMP message (8 bits)
o Code (8 bits)
o Checksum (16 bits), calculated with the ICMP part of the packet (the header is not used)
o Data load for the different kind of answers
TRACEROUTE
· Traceroute is a computer network tool used to determine the route taken by packets across an IP network.
· Traceroute works by increasing the "time-to-live" value of each successive batch of packets sent.
· The first three packets sent have a time-to-live (TTL) value of one (implying that they are not forwarded by the next router and make only a single hop).
· The next three packets have a TTL value of 2, and so on.
· When a packet passes through a host, normally the host decrements the TTL value by one, and forwards the packet to the next host.
· When a packet with a TTL of one reaches a host, the host discards the packet and sends an ICMP time exceeded (type 11) packet to the sender.
· The traceroute utility uses these returning packets to produce a list of hosts that the packets have traversed en route to the destination.
· The three timestamp values returned for each host along the path are the delay (aka latency) values typically in milliseconds (ms) for each packet in the batch. If a packet does not return within the expected timeout window, a star (asterisk) is traditionally printed.
· Traceroute may not list the real hosts. It indicates that the first host is at one hop, the second host at two hops, etc. IP does not guarantee that all the packets take the same route.