Checksums in Packet Headers

 
 
1
Lab 8: Checksum Recalculation and Packet Deparsing
 
Jorge Crichigno
 
College of Engineering and Computing, University of South Carolina
 
A Hands-on Tutorial on P4 Programmable Data Planes
 
Tuesday March 7, 2023
 
Checksum Recalculation and Packet Deparsing
 
2
 
Lab activities are described in Lab 8, P4 Programmable Data
Plane Switches (BMv2) lab series
 
 
Checksums
 
3
 
Several protocols use checksums to validate the integrity of the packet headers
A checksum is a small value derived using a checksum algorithm such as the Cyclic
Redundancy Check (CRC)
 
Packet headers
 
Sender
Checksums
Several protocols use checksums to validate the integrity of the packet headers
A checksum is a small value derived using a checksum algorithm such as the Cyclic
Redundancy Check (CRC)
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
Sender
Checksums
5
Several protocols use checksums to validate the integrity of the packet headers
A checksum is a small value derived using a checksum algorithm such as the Cyclic
Redundancy Check (CRC)
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
Sender
Receiver
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
Checksums
6
Several protocols use checksums to validate the integrity of the packet headers
A checksum is a small value derived using a checksum algorithm such as the Cyclic
Redundancy Check (CRC)
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
Sender
Receiver
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
 
Equal?
Checksums
7
Several protocols use checksums to validate the integrity of the packet headers
A checksum is a small value derived using a checksum algorithm such as the Cyclic
Redundancy Check (CRC)
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
Sender
Receiver
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
 
Equal?
Checksums
8
Several protocols use checksums to validate the integrity of the packet headers
A checksum is a small value derived using a checksum algorithm such as the Cyclic
Redundancy Check (CRC)
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
Sender
Receiver
Programmable Switch
Original headers
 
Modified headers
 
action
H
 
Hash algorithm
(e.g., CRC)
 
Checksum
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksums
9
Several protocols use checksums to validate the integrity of the packet headers
A checksum is a small value derived using a checksum algorithm such as the Cyclic
Redundancy Check (CRC)
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
Sender
Receiver
Programmable Switch
Original headers
Modified headers
action
H
Hash algorithm
(e.g., CRC)
Checksum
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksums
10
Several protocols use checksums to validate the integrity of the packet headers
A checksum is a small value derived using a checksum algorithm such as the Cyclic
Redundancy Check (CRC)
Packet headers
H
Hash algorithm
(e.g., CRC)
Checksum
Sender
Receiver
Programmable Switch
Original headers
Modified headers
action
H
Hash algorithm
(e.g., CRC)
Checksum
Packet headers
H
Hash algorithm
(e.g., CRC)
 
Checksum
 
Equal?
 
Lab Topology and Objectives
 
 
11
 
The topology consists of three hosts: h1, h2, and h3; one P4 switch: s1
The P4 program modifies the headers of the packet
The P4 program recomputes the checksum of the updated headers
 
Slide Note
Embed
Share

Checksums play a crucial role in validating the integrity of packet headers in various protocols. This tutorial explores the concept of checksums, the use of algorithms like CRC, and the process of recalculating checksums to ensure data integrity in network communications.

  • Checksums
  • Packet Headers
  • Data Integrity
  • CRC Algorithm
  • Networking

Uploaded on Aug 14, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Lab 8: Checksum Recalculation and Packet Deparsing Jorge Crichigno College of Engineering and Computing, University of South Carolina A Hands-on Tutorial on P4 Programmable Data Planes Tuesday March 7, 2023 1

  2. Checksum Recalculation and Packet Deparsing Lab activities are described in Lab 8, P4 Programmable Data Plane Switches (BMv2) lab series 2

  3. Checksums Several protocols use checksums to validate the integrity of the packet headers A checksum is a small value derived using a checksum algorithm such as the Cyclic Redundancy Check (CRC) Sender Packet headers 3

  4. Checksums Several protocols use checksums to validate the integrity of the packet headers A checksum is a small value derived using a checksum algorithm such as the Cyclic Redundancy Check (CRC) Sender Packet headers Hash algorithm (e.g., CRC) H Checksum

  5. Checksums Several protocols use checksums to validate the integrity of the packet headers A checksum is a small value derived using a checksum algorithm such as the Cyclic Redundancy Check (CRC) Sender Receiver Packet headers Packet headers Hash algorithm (e.g., CRC) Hash algorithm (e.g., CRC) H H Checksum Checksum 5

  6. Checksums Several protocols use checksums to validate the integrity of the packet headers A checksum is a small value derived using a checksum algorithm such as the Cyclic Redundancy Check (CRC) Sender Receiver Packet headers Packet headers Hash algorithm (e.g., CRC) Hash algorithm (e.g., CRC) H H Checksum Checksum Equal? Checksum verified, accept packet 6

  7. Checksums Several protocols use checksums to validate the integrity of the packet headers A checksum is a small value derived using a checksum algorithm such as the Cyclic Redundancy Check (CRC) Sender Receiver Packet headers Packet headers Hash algorithm (e.g., CRC) Hash algorithm (e.g., CRC) H H Checksum Checksum Equal? Checksum incorrect, reject packet 7

  8. Checksums Several protocols use checksums to validate the integrity of the packet headers A checksum is a small value derived using a checksum algorithm such as the Cyclic Redundancy Check (CRC) Sender Programmable Switch Receiver Original headers Modified headers Packet headers Packet headers action Hash algorithm (e.g., CRC) Hash algorithm (e.g., CRC) H H Hash algorithm (e.g., CRC) H Checksum Checksum 8

  9. Checksums Several protocols use checksums to validate the integrity of the packet headers A checksum is a small value derived using a checksum algorithm such as the Cyclic Redundancy Check (CRC) Sender Programmable Switch Receiver Original headers Modified headers Packet headers Packet headers action Hash algorithm (e.g., CRC) Hash algorithm (e.g., CRC) H H Hash algorithm (e.g., CRC) H Checksum Checksum 9

  10. Checksums Several protocols use checksums to validate the integrity of the packet headers A checksum is a small value derived using a checksum algorithm such as the Cyclic Redundancy Check (CRC) Sender Programmable Switch Receiver Original headers Modified headers Packet headers Packet headers action Hash algorithm (e.g., CRC) Hash algorithm (e.g., CRC) H H Hash algorithm (e.g., CRC) H Checksum Checksum Equal? Checksum Checksum verified, accept packet 10

  11. Lab Topology and Objectives The topology consists of three hosts: h1, h2, and h3; one P4 switch: s1 The P4 program modifies the headers of the packet The P4 program recomputes the checksum of the updated headers 11

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#