MASTER OF INFORMATION TECHNOLOGY
UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING
Address Resolution Protocol
(ARP)
MIT 2201 Computer Networking
Dr. Ajantha Atukorale
aja@ucsc.cmb.ac.lk
Overview
Overview
• The delivery of a packet to a host or a router requires two levels
of addressing: logical and physical.
• We need to be able to map a logical address to its
corresponding physical address and vice versa.
• These can be done using either static or dynamic mapping.
Address Resolution Protocol (ARP)
• Each device on a network maintains
its own ARP table.
• A device that requires an IP and
MAC address pair broadcasts an ARP
request.
• If one of the local devices matches
the IP address of the request, it
sends back an ARP reply that
contains its IP-MAC pair.
• If the request is for a different IP
network, a router performs a proxy
ARP.
• The router sends an ARP response
with the MAC address of the
interface on which the request was
received, to the requesting host.
Address Translation with ARP
ARP Request:
Argon broadcasts an ARP request to all stations on the
network:
“What is the hardware address of Router137?”
Address Translation with ARP
ARP Reply:
Router 137 responds with an ARP Reply (unicast) which
contains the hardware address
Address Translation with ARP
Address Translation with ARP
LAN
a. ARP request is multicast
System A System B
b. ARP reply is unicast
LAN
System A System B
Looking for physical address of a
node with IP address 141.23.56.23
Request
The node physical address
is A4:6E:F4:59:83:AB
Reply
• Sender knows the IP address of the target.
• IP asks ARP to create ARP request message. It includes sender’s and
target’s IP and physical addresses. Target Physical address is all 0s.
• Message is passed to data link layer, encapsulated in a frame using
sender’s physical address. The physical destination address is the
broadcast address.
• All machines drop the packet except the targeted machine. Target
machine identifies the IP address.
• Target machine sends the ARP reply with its physical address.
• Sender receives the reply and knows the physical address of target.
• IP datagram, carries data for target machine, is now encapsulated in a
frame and is unicast to the destination.
Delivery of the Datagram
• Hardware Type: 16-bits; Defining the type of network; Ethernet is 1.
• Protocol Type: 16-bits; IPv4 is 0800.
• Hardware and Protocol length is 8-bits.
ARP Packet Format
Encapsulation of ARP Packet
Start of Frame Delimiter -SFD
Encapsulation of ARP Packet
An ARP request is broadcast;
an ARP reply is unicast.
Example 1
• A host with IP address 130.23.43.20 and physical address
B2:34:55:10:22:10 has a packet to send to another host with IP
address 130.23.43.25 and physical address A4:6E:F4:59:83:AB.
• The two hosts are on the same Ethernet network. Show the ARP
request and reply packets encapsulated in Ethernet frames.
Example 1
ARP Cache Timeout
• Since sending an ARP request/reply for each IP datagram is inefficient,
hosts maintain a cache (ARP Cache) of current entries. The entries
expire after ARP cache timeout.
• Older versions of Windows used to have a timeout of 2 minutes for
ARP entries.
• This has changed in Vista and Server 2008 onwards to comply with
RFC4861. The new implementation has lowered this time to a
random value between 15 seconds and 45 seconds.
• Commands to check:
C:> netsh interface ipv4 show interface <interface ID>
$ cat /proc/sys/net/ipv4/neigh/default/gc_stale_time
Four cases using ARP
Proxy ARP
Proxy ARP: Host or router responds to ARP Request that arrives from one
of its connected networks for a host that is on another of its connected
networks.
128.143.137.1/16
00:e0:f9:23:a8:20
128.143.71.1/24
128.143.0.0/16
Subnet
128.143.71.0/24
Subnet
Router137
ARP Request:
W hat is the MAC address
of 128.143.71.21?
128.143.137.144/16
128.143.171.21/24
00:20:af:03:98:28
Argon Neon
ARP Reply:
The MAC address of
128.143.71.21 is
00:e0:f9:23:a8:20
128.143.71.21/24
Things to know about ARP
• What happens if an ARP Request is made for a non-existing host?
Several ARP requests are made with increasing time intervals
between requests. Eventually, ARP gives up.
• On some systems (including Linux) a host periodically sends ARP
Requests for all addresses listed in the ARP cache. This refreshes
the ARP cache content, but also introduces traffic.
Vulnerabilities of ARP
• Since ARP does not authenticate requests or replies, ARP
Requests and Replies can be forged
• ARP is stateless: ARP Replies can be sent without a corresponding
ARP Request
• According to the ARP protocol specification, a node receiving an
ARP packet (Request or Reply) must update its local ARP cache
with the information in the source fields, if the receiving node
already has an entry for the IP address of the source in its ARP
cache. (This applies for ARP Request packets and for ARP Reply
packets)
Vulnerabilities of ARP
Typical exploitation of these vulnerabilities:
• A forged ARP Request or Reply can be used to update the ARP
cache of a remote system with a forged entry
(ARP Poisoning)
• This can be used to redirect IP traffic to other hosts
• Generally, the aim is to associate the attacker's MAC address with
the IP address of another host (such as the default gateway),
causing any traffic meant for that IP address to be sent to the
attacker instead.
• ARP spoofing may allow an attacker to intercept data frames on a
LAN, modify the traffic, or stop the traffic altogether.
ARP Spoofing/poisoning
• Simplicity also leads to major insecurity
• No Authentication
• ARP provides no way to verify that the responding device is really who
it says it is
• Stateless protocol
• Updating ARP Cache table
• Attacks
• DOS
• Hacker can easily associate an operationally significant IP address to a
false MAC address
• Man-in-the-Middle
• Intercept network traffic between two devices in your network
Ethernet: 0800.0020.1111 IP = ???
What is my
IP
address?
Reverse ARP
Ethernet: 0800.0020.1111
IP: 172.16.3.25
Ethernet: 0800.0020.1111 IP = ???
What is my
IP
address?
I heard that
broadcast.
Your IP
address is
172.16.3.25.
Maps: MAC IP
Reverse ARP
• RARP (Reverse Address Resolution Protocol) is a protocol by which a physical
machine in a local area network can request to learn its IP address from a
gateway.
• A network administrator creates a table in a local area network's gateway router
that maps the physical machine (MAC address) addresses to corresponding
Internet Protocol addresses.
• When a new machine is set up, its RARP client program requests from the RARP
server on the router to be sent its IP address.
• Assuming that an entry has been set up in the router table, the RARP server will
return the IP address to the machine which can store it for future use.
• RARP is available for Ethernet, Fiber Distributed-Data Interface, and token ring
LANs.
Reverse ARP
Home Work
End of Lecture
Any Questions?

More Related Content

PPT
module06-arpV4(1) fr computer network protocol
PPT
Cours de réseau internet sur les protocoles et technologies réseaux
DOCX
84486335 address-resolution-protocol-case-study
PPT
ARP.ppt
PPTX
MAC in the Address Resolution Protocol.pptx
PPTX
04 coms 525 tcpip - arp and rarp
PDF
Arp config-arp
module06-arpV4(1) fr computer network protocol
Cours de réseau internet sur les protocoles et technologies réseaux
84486335 address-resolution-protocol-case-study
ARP.ppt
MAC in the Address Resolution Protocol.pptx
04 coms 525 tcpip - arp and rarp
Arp config-arp

Similar to Networking.pdf (20)

PPTX
Address resolution protocol (ARP)
PDF
Network Intrusion Ditection System
PPT
Arp spoofing
PPT
Address resolution protocol
PDF
Arp security by_abdimuna_sep_28
PDF
Communication networks_ARP
PDF
Web technology and commerce unit 1
PPTX
Support-Protocols ARP, RARP tcp tcmp .pptx
PPTX
Cours de réseau internet sur les protocoles et technologies réseaux arp
PPTX
Presentation on arp protocol
PDF
Protect The Fundamental of IP Networking - Network Security Features 2019
PPT
Address resolution protocol and internet control message protocol
PPT
Lecture 5 internet-protocol_assignments
PPTX
Arp (address resolution protocol)
PPTX
ARP,RARP,DHCP,ICMP NETWORKING PROTOCOLS INTERNET
PDF
Chap-07 ARP and RARP.pdf
PPTX
presentation of first program exist.pptx
PDF
Arp Cache Poisoning
PPTX
Advanced_Networking_Principles_and_Protocols_Lecture_3_part2.pptx
Address resolution protocol (ARP)
Network Intrusion Ditection System
Arp spoofing
Address resolution protocol
Arp security by_abdimuna_sep_28
Communication networks_ARP
Web technology and commerce unit 1
Support-Protocols ARP, RARP tcp tcmp .pptx
Cours de réseau internet sur les protocoles et technologies réseaux arp
Presentation on arp protocol
Protect The Fundamental of IP Networking - Network Security Features 2019
Address resolution protocol and internet control message protocol
Lecture 5 internet-protocol_assignments
Arp (address resolution protocol)
ARP,RARP,DHCP,ICMP NETWORKING PROTOCOLS INTERNET
Chap-07 ARP and RARP.pdf
presentation of first program exist.pptx
Arp Cache Poisoning
Advanced_Networking_Principles_and_Protocols_Lecture_3_part2.pptx
Ad

Recently uploaded (20)

PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
STKI Israel Market Study 2025 version august
PDF
Unlock new opportunities with location data.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Architecture types and enterprise applications.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Hybrid model detection and classification of lung cancer
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Enhancing emotion recognition model for a student engagement use case through...
STKI Israel Market Study 2025 version august
Unlock new opportunities with location data.pdf
Zenith AI: Advanced Artificial Intelligence
WOOl fibre morphology and structure.pdf for textiles
O2C Customer Invoices to Receipt V15A.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Web Crawler for Trend Tracking Gen Z Insights.pptx
Architecture types and enterprise applications.pdf
observCloud-Native Containerability and monitoring.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
sustainability-14-14877-v2.pddhzftheheeeee
A novel scalable deep ensemble learning framework for big data classification...
A comparative study of natural language inference in Swahili using monolingua...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Hybrid model detection and classification of lung cancer
Ad

Networking.pdf

  • 1. MASTER OF INFORMATION TECHNOLOGY UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING Address Resolution Protocol (ARP) MIT 2201 Computer Networking Dr. Ajantha Atukorale aja@ucsc.cmb.ac.lk
  • 3. Overview • The delivery of a packet to a host or a router requires two levels of addressing: logical and physical. • We need to be able to map a logical address to its corresponding physical address and vice versa. • These can be done using either static or dynamic mapping.
  • 4. Address Resolution Protocol (ARP) • Each device on a network maintains its own ARP table. • A device that requires an IP and MAC address pair broadcasts an ARP request. • If one of the local devices matches the IP address of the request, it sends back an ARP reply that contains its IP-MAC pair. • If the request is for a different IP network, a router performs a proxy ARP. • The router sends an ARP response with the MAC address of the interface on which the request was received, to the requesting host.
  • 5. Address Translation with ARP ARP Request: Argon broadcasts an ARP request to all stations on the network: “What is the hardware address of Router137?”
  • 6. Address Translation with ARP ARP Reply: Router 137 responds with an ARP Reply (unicast) which contains the hardware address
  • 8. Address Translation with ARP LAN a. ARP request is multicast System A System B b. ARP reply is unicast LAN System A System B Looking for physical address of a node with IP address 141.23.56.23 Request The node physical address is A4:6E:F4:59:83:AB Reply
  • 9. • Sender knows the IP address of the target. • IP asks ARP to create ARP request message. It includes sender’s and target’s IP and physical addresses. Target Physical address is all 0s. • Message is passed to data link layer, encapsulated in a frame using sender’s physical address. The physical destination address is the broadcast address. • All machines drop the packet except the targeted machine. Target machine identifies the IP address. • Target machine sends the ARP reply with its physical address. • Sender receives the reply and knows the physical address of target. • IP datagram, carries data for target machine, is now encapsulated in a frame and is unicast to the destination. Delivery of the Datagram
  • 10. • Hardware Type: 16-bits; Defining the type of network; Ethernet is 1. • Protocol Type: 16-bits; IPv4 is 0800. • Hardware and Protocol length is 8-bits. ARP Packet Format
  • 11. Encapsulation of ARP Packet Start of Frame Delimiter -SFD
  • 12. Encapsulation of ARP Packet An ARP request is broadcast; an ARP reply is unicast.
  • 13. Example 1 • A host with IP address 130.23.43.20 and physical address B2:34:55:10:22:10 has a packet to send to another host with IP address 130.23.43.25 and physical address A4:6E:F4:59:83:AB. • The two hosts are on the same Ethernet network. Show the ARP request and reply packets encapsulated in Ethernet frames.
  • 15. ARP Cache Timeout • Since sending an ARP request/reply for each IP datagram is inefficient, hosts maintain a cache (ARP Cache) of current entries. The entries expire after ARP cache timeout. • Older versions of Windows used to have a timeout of 2 minutes for ARP entries. • This has changed in Vista and Server 2008 onwards to comply with RFC4861. The new implementation has lowered this time to a random value between 15 seconds and 45 seconds. • Commands to check: C:> netsh interface ipv4 show interface <interface ID> $ cat /proc/sys/net/ipv4/neigh/default/gc_stale_time
  • 17. Proxy ARP Proxy ARP: Host or router responds to ARP Request that arrives from one of its connected networks for a host that is on another of its connected networks. 128.143.137.1/16 00:e0:f9:23:a8:20 128.143.71.1/24 128.143.0.0/16 Subnet 128.143.71.0/24 Subnet Router137 ARP Request: W hat is the MAC address of 128.143.71.21? 128.143.137.144/16 128.143.171.21/24 00:20:af:03:98:28 Argon Neon ARP Reply: The MAC address of 128.143.71.21 is 00:e0:f9:23:a8:20 128.143.71.21/24
  • 18. Things to know about ARP • What happens if an ARP Request is made for a non-existing host? Several ARP requests are made with increasing time intervals between requests. Eventually, ARP gives up. • On some systems (including Linux) a host periodically sends ARP Requests for all addresses listed in the ARP cache. This refreshes the ARP cache content, but also introduces traffic.
  • 19. Vulnerabilities of ARP • Since ARP does not authenticate requests or replies, ARP Requests and Replies can be forged • ARP is stateless: ARP Replies can be sent without a corresponding ARP Request • According to the ARP protocol specification, a node receiving an ARP packet (Request or Reply) must update its local ARP cache with the information in the source fields, if the receiving node already has an entry for the IP address of the source in its ARP cache. (This applies for ARP Request packets and for ARP Reply packets)
  • 20. Vulnerabilities of ARP Typical exploitation of these vulnerabilities: • A forged ARP Request or Reply can be used to update the ARP cache of a remote system with a forged entry (ARP Poisoning) • This can be used to redirect IP traffic to other hosts • Generally, the aim is to associate the attacker's MAC address with the IP address of another host (such as the default gateway), causing any traffic meant for that IP address to be sent to the attacker instead. • ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether.
  • 21. ARP Spoofing/poisoning • Simplicity also leads to major insecurity • No Authentication • ARP provides no way to verify that the responding device is really who it says it is • Stateless protocol • Updating ARP Cache table • Attacks • DOS • Hacker can easily associate an operationally significant IP address to a false MAC address • Man-in-the-Middle • Intercept network traffic between two devices in your network
  • 22. Ethernet: 0800.0020.1111 IP = ??? What is my IP address? Reverse ARP
  • 23. Ethernet: 0800.0020.1111 IP: 172.16.3.25 Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25. Maps: MAC IP Reverse ARP
  • 24. • RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway. • A network administrator creates a table in a local area network's gateway router that maps the physical machine (MAC address) addresses to corresponding Internet Protocol addresses. • When a new machine is set up, its RARP client program requests from the RARP server on the router to be sent its IP address. • Assuming that an entry has been set up in the router table, the RARP server will return the IP address to the machine which can store it for future use. • RARP is available for Ethernet, Fiber Distributed-Data Interface, and token ring LANs. Reverse ARP
  • 26. End of Lecture Any Questions?