Networking 1 / 43. Networking

Size: px
Start display at page:

Download "Networking 1 / 43. Networking"

Transcription

1 and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping 1 / 43

2 and Operating Systems and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping Many different pieces Some pieces are in the kernel; others are in user space Apart from the division, we need appropriate interfaces 2 / 43

3 Kinds of and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping Different protocols; different protocol suites User versus kernel consumption Synchronous versus asynchronous 3 / 43

4 and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping Service Servers Clients Peer-to-peer Which are part of the OS? 4 / 43

5 The Stack and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping Seven layers: physical, link, network, transport, session, presentation, application Well, not really, on the Internet Link layer device drivers Network: IP (Internet Protocol) Transport (and a bit of session): TCP, UDP Presentation, application: applications All but the last are in the kernel 5 / 43

6 Protocol Suites and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping TCP/IP The Internet Subclass: IPv6 OSI Novell IPX Appletalk NetBIOS Many others that have faded from the scene 6 / 43

7 and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping Connection-Oriented or Connectionless? Some protocols are connection-oriented once things are set up, you always talk to a single endpoint Example: TCP Others are connectionless each packet can go to or come from a different place Example: UDP, as used in the DNS 7 / 43

8 Mux/Demux and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping Many layers of multiplex/demultiplex Link layer selects different network layers (and maybe different protocol suites) Network layer selects different transports Transport layer selects different applications User space can read all layers 8 / 43

9 Layers and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping Application Transport Network Link Transport Network 9 / 43

10 Application Access and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping Why do applications have access to all layers? Debugging Implement layer at user level 10 / 43

11 Example: tcpdump at Link Layer and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping # tcpdump -v -v -s 1500 not ip and not arp tcpdump: listening on bge0, link-type EN10MB (Ethernet), capture size 1500 bytes 23:05: :48:54:71:ce:32 > Broadcast null I (s=0,r=0,c) len=42 11 / 43

12 Example: DHCP and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping DHCP is used to assign IP addresses to hosts At the time a host issues a DHCP request, it has no IP address, so it can t speak IP Both the DHCP client and the DHCP server have to listen and speak at link level 12 / 43

13 Example: OSPF and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping The OSPF routing protocol runs directly on top of IP To implement this at user level, the program has to read IP packets 13 / 43

14 Example: ping and Operating Systems Kinds of The Stack Protocol Suites Connection-Oriented or Connectionless? Mux/Demux Layers Application Access Example: tcpdump at Link Layer Example: DHCP Example: OSPF Example: ping ping uses ICMP messages ICMP lives directly on top of IP In other words, ICMP packets have to be available both in the kernel and at user level 14 / 43

15 Network Connections Aren t Files The Socket Interface Sockets and Layers Connectionless Networks Couldn t We Just Open /dev/tcp? Summary What is the interface to the networking stack? Is it file-like? Something special? The answer, of course, is it depends 15 / 43

16 Network Connections Aren t Files Network Connections Aren t Files The Socket Interface Sockets and Layers Connectionless Networks Couldn t We Just Open /dev/tcp? Summary We always do much more than just read or write We often have to pass extra information, such as source or destination address for connectionless protocols But sometimes, we do just read and write / 43

17 The Socket Interface Network Connections Aren t Files The Socket Interface Sockets and Layers Connectionless Networks Couldn t We Just Open /dev/tcp? Summary Due originally to Berkeley, circa 1983 Network access is initiated by the socket() system call On Unix, socket() returns an ordinary file descriptor; you can (eventually) do read()/write()/close() On Windows, it returns a special type of file descriptor; you can only do special socket operations, such as send()/recv() 17 / 43

18 Sockets and Layers Network Connections Aren t Files The Socket Interface Sockets and Layers Connectionless Networks Couldn t We Just Open /dev/tcp? Summary Sockets are used at all layers parameters on the socket() call specify the layer and protocol The semantics of the returned file descriptor are layer-dependent A variety of options can be set with setsockopt() and ioctl() Sockets are also used for configuration control, such as assigning IP addresses to interfaces You control the routing tables by writing to a special socket 18 / 43

19 Connectionless Networks Network Connections Aren t Files The Socket Interface Sockets and Layers Connectionless Networks Couldn t We Just Open /dev/tcp? Summary Every packet written needs a destination address as well as data Every packet read contains a source address as well as data Use sendto()/recvfrom() (Address format will vary, depending on the type of network; some networks even use variable-length addresses 19 / 43

20 Couldn t We Just Open /dev/tcp? Network Connections Aren t Files The Socket Interface Sockets and Layers Connectionless Networks Couldn t We Just Open /dev/tcp? Summary On some systems, such as Solaris, you can! But we still need special operations setsockopt() could just be an ioctl, but accept() returns a new file descriptor Connectionless networks use special data format 20 / 43

21 Summary Network Connections Aren t Files The Socket Interface Sockets and Layers Connectionless Networks Couldn t We Just Open /dev/tcp? Summary Network connections aren t really files Given all the special stuff that has to go on anyway, there s little advantage to using the file system instead of sockets There may be some advantage, though, to getting a normal file descriptor 21 / 43

22 Service Service Dispatchers The Port Mapper The Port Mapper Other? Telnet and SSH Anonymous FTP Service Servers Clients Peer-to-peer 22 / 43

23 Service Service Service Dispatchers The Port Mapper The Port Mapper Other? Telnet and SSH Anonymous FTP Service applications function as an extension of the OS Example: with NFS, the client and server are in the kernel, but other pieces are at user level: mounting and unmount the file system, locking, etc. Example: Routing IP is pretty useless without it 23 / 43

24 Service Dispatchers Service Service Dispatchers The Port Mapper The Port Mapper Other? Telnet and SSH Anonymous FTP Certain applications exist just to run other applications ineted Runs most TCP and UDP applications (Original idea was to keep the process table small, to improve performance. Now, it permits (some) servers to just use stdin/stdout) Example: portmapper dispatches inbound RPC requests 24 / 43

25 The Port Mapper Service Service Dispatchers The Port Mapper The Port Mapper Other? Telnet and SSH Anonymous FTP Subprocedures or rather, their stubs register with the portmapper The caller s stubs contact the port mapper to find out the actual port number for the subprocedure This is not quite invisible to the application programmer; at the least, the registration has to be set up 25 / 43

26 The Port Mapper Service Service Dispatchers The Port Mapper The Port Mapper Other? Telnet and SSH Anonymous FTP $ rpcinfo -p cluster.cs.columbia.edu program vers proto port service tcp 111 portmapper tcp 111 portmapper tcp mountd udp 2049 nfs and many more besides 26 / 43

27 Other? Service Service Dispatchers The Port Mapper The Port Mapper Other? Telnet and SSH Anonymous FTP Most applications have nothing to do with the OS A Web server could run, almost unchanged, just as well on Windows as on Unix (Minor differences in a few system calls) But some do authentication 27 / 43

28 Telnet and SSH Service Service Dispatchers The Port Mapper The Port Mapper Other? Telnet and SSH Anonymous FTP Telnet and SSH permit remote logins They have to authenticate users, using OS-specific mechanisms Telnet can invoke login; SSH, which can do its own authentication, cannot 28 / 43

29 Anonymous FTP Service Service Dispatchers The Port Mapper The Port Mapper Other? Telnet and SSH Anonymous FTP Ordinary FTP has to authenticate users; see above Anonymous FTP has a different problem: confining the remote user Must use OS-specific sandbox mechanism 29 / 43

30 Goals of Types of CORBA Publish-Subscribe Common middle layer between applications and the stack I.e., common middle ground between applications and the OS Arguably as much a part of the OS as the C runtime library 30 / 43

31 Goals of Goals of Types of CORBA Publish-Subscribe Common interface Naming Replication Access 31 / 43

32 Types of Goals of Types of CORBA Publish-Subscribe Document-based: the Web File-based: distributed file system Object-based: CORBA Publish-subscribe More / 43

33 CORBA Goals of Types of CORBA Publish-Subscribe CORBA: Common Object Request Broker Architecture RPC extended procedure calls to the net CORBA extends objected-oriented programming to the net Instead of referencing files or web pages, you invoke methods The CORBA Object Broker handles naming, location, access method, etc. 33 / 43

34 Publish-Subscribe Goals of Types of CORBA Publish-Subscribe Processes that have information publish it On a LAN, implemented as a broadcast Information router forwards such broadcasts to other interested LANs If a process subscribes to a topic, its local information broker tells other LANs it wants such data 34 / 43

35 It s a Distributed OS Actually, There Are Many Grids Scenarios Security Issues Sandboxing Storage Space Accounting Other Essential Components Share computing resources around the world (The original goal of the ARPANET!) Built on high performance computers and high performance networks 35 / 43

36 It s a Distributed OS It s a Distributed OS Actually, There Are Many Grids Scenarios Security Issues Sandboxing Storage Space Accounting Other Essential Components The Grid functions like a large-scale distributed operating system It has to solve all the distributed OS problems we talked about These include security, scheduling, locking, communications, and more 36 / 43

37 Actually, There Are Many Grids It s a Distributed OS Actually, There Are Many Grids Scenarios Security Issues Sandboxing Storage Space Accounting Other Essential Components The Grid is a concept and a set of protocols, not a single Internet-wide virtual machine You and your friends can pool your own machines Each Grid sets up its own access control policy 37 / 43

38 Scenarios It s a Distributed OS Actually, There Are Many Grids Scenarios Security Issues Sandboxing Storage Space Accounting Other Essential Components Specific computer; local I/O only simply have to authenticate to host computer Specific computer; remote I/O must delegate security credentials to host OS to allow file retrieval and update Run on best computer must talk to scheduler and delegate credentials; scheduler must verify acceptability of credentials on each candidate machine Multiprocessing each remote job needs credentials to talk to other pieces 38 / 43

39 Security Issues It s a Distributed OS Actually, There Are Many Grids Scenarios Security Issues Sandboxing Storage Space Accounting Other Essential Components User authentication straight-forward Must protect grid computers from remote users standard operating system problem Must have large-scale, secure, distributed file system Users want to protect their data from the remote OS hard! 39 / 43

40 Sandboxing It s a Distributed OS Actually, There Are Many Grids Scenarios Security Issues Sandboxing Storage Space Accounting Other Essential Components If untrusted users are running jobs on your machine, you may want to sandbox them But each user needs different resources; you need a flexible sandbox You want to isolate each remote user from every other, and (if possible) from your local users 40 / 43

41 Storage Space It s a Distributed OS Actually, There Are Many Grids Scenarios Security Issues Sandboxing Storage Space Accounting Other Essential Components The Grid is for big problems; these take a lot of storage space How do we manage allocation? How do we transfer that much over the net? How do we encrypt that much data during storage? 41 / 43

42 Accounting It s a Distributed OS Actually, There Are Many Grids Scenarios Security Issues Sandboxing Storage Space Accounting Other Essential Components Someone has to pay for resources used The Grid includes accounting standards record CPU, disk, and RAM usage (and perhaps bandwidth) 42 / 43

43 Other Essential Components It s a Distributed OS Actually, There Are Many Grids Scenarios Security Issues Sandboxing Storage Space Accounting Other Essential Components Name space File I/O and format conversion File replication and cache engine Brokers, which talk to schedulers These are middleware 43 / 43

Network Programming TDC 561

Network Programming TDC 561 Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers. Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might

More information

CSE 127: Computer Security. Network Security. Kirill Levchenko

CSE 127: Computer Security. Network Security. Kirill Levchenko CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties

More information

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same. This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the

More information

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 1 Chapter 10 CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK Chapter 10: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 2 OVERVIEW Configure and troubleshoot the TCP/IP protocol Connect to a wireless

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Software Product Description

Software Product Description Software Product Description PRODUCT NAME: HP TCP/IP Services for OpenVMS SPD 46.46.23 DESCRIPTION License Description The HP TCP/IP Services for OpenVMS software product is the OpenVMS implementation

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

The TCP/IP Reference Model

The TCP/IP Reference Model The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Network Models and Protocols

Network Models and Protocols 669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks Jonathan Reed jdreed@mit.edu MIT IS&T VPN Release Team Overview Basic Networking Terms General Concepts How the VPN works Why it s useful What to watch out for Q&A Networking 101

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

File Sharing. Peter Lo. CP582 Peter Lo 2003 1

File Sharing. Peter Lo. CP582 Peter Lo 2003 1 File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture OSI Model 7 6 5 4 3 2 1 Application Presentation Session Transport Network Data Link Physical Protocols Define a set of rules for communication. Specify the meaning and format of messages Define exchange

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

Software Product Description

Software Product Description Software Product Description PRODUCT NAME: HP TCP/IP Services for OpenVMS Version 5.6 SPD 46.46.21 DESCRIPTION License Description The HP TCP/IP Services for OpenVMS software product is the OpenVMS implementation

More information

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Internet Concepts. What is a Network?

Internet Concepts. What is a Network? Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Networks: IP and TCP. Internet Protocol

Networks: IP and TCP. Internet Protocol Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

iseries TCP/IP routing and workload balancing

iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users Restricted

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast. Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011

IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011 IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011 AGENDA Introduction IPv6 why do we need it? Selecting the right TCP/IP stack Case study Conclusions Page 2 Company Profile Wireless Products

More information

Algemene Theorie en Vaardigheden 2. April 2014 Theaterschool OTT-2 1

Algemene Theorie en Vaardigheden 2. April 2014 Theaterschool OTT-2 1 Les 6 Showcontrol April 2014 Theaterschool OTT-2 1 OSI layers versus equipment Layer 1: Physical Network Interface Card (NIC) Hub (multiport repeater) Modem (modulator/demodulator, converts signals) Layer

More information

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of

More information

Firewalls and System Protection

Firewalls and System Protection Firewalls and System Protection Firewalls Distributed Systems Paul Krzyzanowski 1 Firewalls: Defending the network inetd Most UNIX systems ran a large number of tcp services as dæmons e.g., rlogin, rsh,

More information

GregSowell.com. Mikrotik Basics

GregSowell.com. Mikrotik Basics Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Chapter 11. User Datagram Protocol (UDP)

Chapter 11. User Datagram Protocol (UDP) Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,

More information

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Operating Systems Design 16. Networking: Sockets

Operating Systems Design 16. Networking: Sockets Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski pxk@cs.rutgers.edu 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Computer Networks CCNA Module 1

Computer Networks CCNA Module 1 Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The

More information

Network Models OSI vs. TCP/IP

Network Models OSI vs. TCP/IP Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

Basic Operation & Management of TCP/IP Networks

Basic Operation & Management of TCP/IP Networks Basic Operation & Management of TCP/IP Networks SYSTEMS, Inc. For the MU-SPIN Coordination Office Slide 1 Presentation Contents Introduction to the Internet, Protocols and TCP/IP IP addressing, Name Resolution

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Computer Networks - Xarxes de Computadors

Computer Networks - Xarxes de Computadors Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications

More information

TCP/IP - Socket Programming

TCP/IP - Socket Programming TCP/IP - Socket Programming jrb@socket.to.me Jim Binkley 1 sockets - overview sockets simple client - server model look at tcpclient/tcpserver.c look at udpclient/udpserver.c tcp/udp contrasts normal master/slave

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

Ethernet and IP A slightly less introductory networking class. Drew Saunders Networking Systems Stanford University

Ethernet and IP A slightly less introductory networking class. Drew Saunders Networking Systems Stanford University Ethernet and IP A slightly less introductory networking class Drew Saunders Networking Systems Stanford University Goals of Class Slightly more in-depth knowledge of Ethernet. Internet Protocol, TCP, UDP,

More information

Detailed Table of Contents

Detailed Table of Contents Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

Stateful Inspection Technology

Stateful Inspection Technology White Paper Stateful Inspection Technology The industry standard for enterprise-class network security solutions Check Point protects every part of your network perimeter, internal, Web to keep your information

More information

Network Protocol Configuration

Network Protocol Configuration Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring

More information

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,

More information

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

architecture: what the pieces are and how they fit together names and addresses: what's your name and number? Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Understanding Layer 2, 3, and 4 Protocols

Understanding Layer 2, 3, and 4 Protocols 2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Firewall 1 Basic firewall concept Roadmap Filtering firewall Proxy firewall Network Address Translation

More information

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,... Read Chapter 9 Linux network utilities finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,... 1 Important to know common network terminology

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Industrial Communication Whitepaper. Principles of EtherNet/IP Communication

Industrial Communication Whitepaper. Principles of EtherNet/IP Communication Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski pxk@cs.rutgers.edu

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski pxk@cs.rutgers.edu Distributed Systems Firewalls: Defending the Network Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution

More information

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)

More information