Protocoles internet. Carole Delporte paris- diderot.fr Introduc8on. C. Delporte M2- Internet 1
|
|
- Curtis Booker
- 8 years ago
- Views:
Transcription
1 Protocoles inter Carole Delporte paris- diderot.fr Introduc8on C. Delporte M2- Inter 1
2 Protocoles et services inter Sommaire (prévision): q Introduction et rappels réseau q Rappels java v Quelques compléments java q Protocoles: couche application v v v v Html-http ftp smtp Dns q Extensions v v Réseaux Pair à pair Grands réseaux et petits mondes q Sécurité v sockets ssl q Serveurs web v Apache, servlet, web services 3 séances de TP + examen M2-Inter 1-2
3 Bibliographie q q q q Java Network Programming, 3rd Edition Elliotte Rusty Harold O'Reilly Media, Inc.. Computer Networking: A Top Down Approach, 6 th edition J.F. Kurose K.W. Ross Addison Weslay. Computer Networks, A.S. Tannenbaum, D.J. Wetherall,Pearson. Certains transparents proviennent de: q Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross Addison-Wesley q Documents sur Didel PSIM2 et sur M2-Inter 1-3
4 Chapitre 1 q Introduction (rappels réseau) v Hôtes, réseaux d accès, liens physiques v Commutation par circuits, par paquets, structure du réseau v Pertes et délais v Protocoles et modèle en couches v Sécurité v Historique M2-Inter 1-4
5 Les composants PC server wireless laptop cellular handheld router points wired links q millions of connected computing devices: hosts = end systems v running work apps q communication links v fiber, copper, radio, satellite v transmission rate = bandwidth q routers: forward packets (chunks of data) Mobile work Global ISP Home work Regional ISP Institutional work M2-Inter 1-5
6 Inter: q protocols control sending, receiving of msgs v e.g., TCP, IP, HTTP, Skype, Ether q Inter: work of works v loosely hierarchical v public Inter versus private intra q Inter standards v RFC: Request for comments v IETF: Inter Engineering Task Force Mobile work Global ISP Home work Regional ISP Institutional work M2-Inter 1-6
7 What s the Inter: a service view q communication infrastructure enables distributed applications: v Web, VoIP, , games, e-commerce, social work, file sharing q communication services provided to apps: v reliable data delivery from source to destination v best effort (unreliable) data delivery mobile work home work institutional work global ISP regional ISP M2-Inter 1-7
8 A closer look at work structure: q work edge: applications and hosts q works, physical media: wired, wireless communication links mobile work home work global ISP regional ISP q work core: v interconnected routers v work of works institutional work M2-Inter 1-8
9 The work edge: q end systems (hosts): v run application programs v e.g. Web, v at edge of work q client/server model peer-peer v client host requests, receives service from always-on server client/server v e.g. Web browser/server; client/server q peer-peer model: v minimal (or no) use of dedicated servers v e.g. Skype, BitTorrent M2-Inter 1-9
10 A closer look at work structure: q work edge: applications and hosts q works, physical media: wired, wireless communication links mobile work home work global ISP regional ISP q work core: v interconnected routers v work of works institutional work M2-Inter 1-10
11 Inter structure: work of works Question: given millions of ISPs, how to connect them together? M2-Inter 1-11
12 Inter structure: work of works Option: connect each ISP to every other ISP? connecting each ISP to each other directly doesn t scale: O(N 2 ) connections. M2-Inter 1-12
13 Inter structure: work of works Option: connect each ISP to a global transit ISP? Customer and provider ISPs have economic agreement. global ISP M2-Inter 1-13
14 Inter structure: work of works But if one global ISP is viable business, there will be competitors. ISP A ISP B ISP C M2-Inter 1-14
15 Inter structure: work of works But if one global ISP is viable business, there will be competitors. which must be interconnected ISP A IXP IXP ISP B ISP C peering link M2-Inter 1-15
16 Inter structure: work of works and regional works may arise to connect s to ISPS ISP A IXP IXP ISP B ISP C regional M2-Inter 1-16
17 Inter structure: work of works and content provider works (e.g., Google, Microsoft, Akamai ) may run their own work, to bring services, content close to end users ISP A ISP B ISP B IXP Content provider work IXP regional Inter exchange point M2-Inter 1-17
18 Google Data Centers q Estimated cost of data center: $600M q Google spent $2.4B in 2007 on new data centers q Each data center uses megawatts of power M2-Inter 18
19 Inter structure: work of works Tier 1 ISP Tier 1 ISP Google IXP Regional ISP IXP Regional ISP IXP ISP ISP ISP ISP ISP ISP ISP ISP v at center: small # of well-connected large works tier-1 commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT), national & international coverage content provider work (e.g, Google): private work that connects it data centers to Inter, often bypassing tier-1, regional ISPs 1-19 M2-Inter
20 Tier-1 ISP: e.g., Sprint POP: point-of-presence to/from backbone peering. to/from customers M2-Inter 1-2
21 Inter structure: work of works q Tier-2 ISPs: smaller (often regional) ISPs v Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs Tier-2 ISP pays tier-1 ISP for connectivity to rest of Inter q tier-2 ISP is customer of tier-1 provider Tier-2 ISP Tier-2 ISP Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISPs also peer privately with each other. Tier-2 ISP Tier-2 ISP Tier-2 ISP M2-Inter 1-21
22 Inter structure: work of works q Tier-3 ISPs and local ISPs v last hop ( ) work (closest to end systems) Local and tier- 3 ISPs are customers of higher tier ISPs connecting them to rest of Inter local ISP local ISP Tier 3 ISP Tier-2 ISP Tier 1 ISP Tier-2 ISP local ISP local ISP Tier 1 ISP local ISP Tier-2 ISP Tier 1 ISP Tier-2 ISP local ISP local ISP Tier-2 ISP local ISP M2-Inter 1-2
23 Inter structure: work of works q a packet passes through many works! local ISP Tier 3 ISP Tier-2 ISP local ISP local ISP Tier-2 ISP local ISP Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISP local ISP Tier-2 ISP local ISP Tier-2 ISP local ISP local ISP M2-Inter 1-2
24 Protocoles, modèle en couches M2-Inter 1-2
25 Protocoles, modèle en couches Networks are complex! q many pieces : v hosts v routers v links of various media v applications v protocols v hardware, software Question: Is there any hope of organizing structure of work? Or at least our discussion of works? M2-Inter 1-2
26 What s a protocol? human protocols: q what s the time? q I have a question q introductions specific msgs sent specific actions taken when msgs received, or other events work protocols: q machines rather than humans q all communication activity in Inter governed by protocols protocols define format, order of msgs sent and received among work entities, and actions taken on msg transmission, receipt M2-Inter 1-2
27 What s a protocol? a human protocol and a computer work protocol: Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Get <file> Q: Other human protocols? M2-Inter 1-2
28 Why layering? dealing with complex systems: v explicit structure allows identification, relationship of complex system s pieces layered reference model for discussion v modularization eases maintenance, updating of system change of implementation of layer s service transparent to rest of system e.g., change in gate procedure doesn t affect rest of system v layering considered harmful? M2-Inter 1-28
29 Inter protocol stack v application: supporting work applications FTP, SMTP, HTTP v transport: process-process data transfer TCP, UDP v work: routing of datagrams from source to destination IP, routing protocols v link: data transfer between neighboring work elements Ether, (WiFi), PPP v physical: bits on the wire application transport work link physical M2-Inter 1-29
30 ISO/OSI reference model v presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine-specific conventions v session: synchronization, checkpointing, recovery of data exchange v Inter stack missing these layers! these services, if needed, must be implemented in application needed? application presentation session transport work link physical M2-Inter 1-30
31 segment datagram frame message H l H t H n H t H n H t M M M M source application transport work link physical Encapsulation link physical switch H l H n H n H t H t H t M M M M destination application transport work link physical H l H n H n H t H t M M work link physical H n H t M router M2-Inter 1-31
32 Network Security q The field of work security is about: v how bad guys can attack computer works v how we can defend works against attacks v how to design architectures that are immune to attacks q Inter not originally designed with (much) security in mind v original vision: a group of mutually trusting users attached to a transparent work J v Security considerations in all layers! M2-Inter 1-3
33 Bad guys can put malware into hosts via Inter q Malware can get in host from a virus, worm, or trojan horse. q Spyware malware can record keystrokes, web sites visited, upload info to collection site. q Infected host can be enrolled in a bot, used for spam and DDoS attacks. q Malware is often self-replicating: from an infected host, seeks entry into other hosts M2-Inter 1-3
34 Bad guys can put malware into hosts via Inter q Trojan horse v Hidden part of some otherwise useful software v Today often on a Web page (Active-X, plugin) q Virus v infection by receiving object (e.g., attachment), actively executing v self-replicating: propagate itself to other hosts, users q Worm: v infection by passively receiving object that gets itself executed v self- replicating: propagates to other hosts, users M2-Inter 1-3
35 Bad guys can attack servers and work infrastructure q Denial of service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the work (see bot) 3. send packets toward target from compromised hosts target M2-Inter 1-3
36 The bad guys can sniff packets Packet sniffing: v broadcast media (shared Ether, wireless) v promiscuous work interface reads/records all packets (e.g., including passwords!) passing by A C src:b dest:a payload B v Wireshark software used for end-of-chapter labs is a (free) packet-sniffer M2-Inter 1-3
37 The bad guys can use false source addresses q IP spoofing: send packet with false source address A C src:b dest:a payload B M2-Inter 1-3
38 The bad guys can record and playback q record-and-playback: sniff sensitive info (e.g., password), and use later v password holder is that user from system point of view A C src:b dest:a user: B; password: foo B M2-Inter 1-3
39 Historique M2-Inter 1-3
40 Inter History : Early packet-switching principles q 1961: Kleinrock - queueing theory shows effectiveness of packetswitching q 1964: Baran - packetswitching in military s q 1967: ARPA conceived by Advanced Research Projects Agency q 1969: first ARPA node operational q 1972: v ARPA public demonstration v NCP (Network Control Protocol) first host-host protocol v first program v ARPA has 15 nodes M2-Inter 1-4
41 Inter History : Interworking, new and proprietary s q 1970: ALOHA satellite work in Hawaii q 1974: Cerf and Kahn - architecture for interconnecting works q 1976: Ether at Xerox PARC q ate70 s: proprietary architectures: DEC, SNA, XNA q late 70 s: switching fixed length packets (ATM precursor) q 1979: ARPA has 200 nodes Cerf and Kahn s interworking principles: v minimalism, autonomy - no internal changes required to interconnect works v best effort service model v stateless routers v decentralized control define today s Inter architecture M2-Inter 1-41
42 Inter History : new protocols, a proliferation of works q 1983: deployment of TCP/IP q 1982: smtp protocol defined q 1983: DNS defined for name-to-ip-address translation q 1985: ftp protocol defined q 1988: TCP congestion control q new national works: Cs, BIT, NSF, Minitel q 100,000 hosts connected to confederation of works M2-Inter 1-4
43 Inter History 1990, 2000 s: commercialization, the Web, new apps q Early 1990 s: ARPA decommissioned q 1991: NSF lifts restrictions on commercial use of NSF (decommissioned, 1995) q early 1990s: Web v hypertext [Bush 1945, Nelson 1960 s] v HTML, HTTP: Berners-Lee v 1994: Mosaic, later Netscape v late 1990 s: commercialization of the Web Late 1990 s 2000 s: q killer apps: , web, instant messaging, P2P file sharing q work security to forefront q est. 50 million host, 100 million+ users q backbone links running at Gbps M2-Inter 1-4
44 Inter history 2005-present q ~750 million hosts v Smartphones and tablets q Aggressive deployment of broadband q Increasing ubiquity of high-speed wireless q Emergence of online social works: v Facebook: soon one billion users q Service providers (Google, Microsoft) create their own works v Bypass Inter, providing instantaneous to search, , etc. q E-commerce, universities, enterprises running their services in cloud (eg, Amazon EC2) M2-Inter 1-44
45 Les standard inter q Inter Engineering Task Force (IETF) (ouvert) q W3C (industriels fermé) q RFC IETF: v v v v v Experimental Proposed standard Draft standard Standard Informational Historic q Niveau de recommandation v v v v v Not recommended Limited use Elective Recommended required M2-Inter 45
46 Inter 2013 M2-Inter 1-46
47 statistiques M2-Inter 1-4
48 Inter 2013 M2-Inter 1-48
49 Inter 2013 M2-Inter 1-4
50 Facebook M2-Inter 1-5
51 Facebook M2-Inter 1-51
52 Facebook M2-Inter 1-52
53 M2-Inter 1-5
Overview: Internet vs Data Center Networks
Overview: Inter vs Data Center Networks Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking August 29, 2014 Overview What is the Inter? Goals
More informationLayered protocol (service) architecture
Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure
More informationInternet and IP addressing
Internet and IP addressing Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Communication Network Taxonomy Telephony Network parses number dialed
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
More informationNetwork Security. Vorlesung Kommunikation und Netze SS 10 E. Nett
Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!
More informationKick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
More informationTCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1
TCIPG Reading Group Introduction to Computer Networks Based on: Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison- Wesley, July 2007. Introduction 1-1 Chapter 1: Introduction
More informationCourse book: Computer Networking. Computer Networks 3 rd edition. By Andrew ST S.Tanenbaum. Top Down approach 3 rd edition.
Computer Networking Course book: Computer Networking Top Down approach 3 rd edition By Jim kurose and keith ross Reference book: Computer Networks 3 rd edition By Andrew ST S.Tanenbaum Introduction 1-1
More informationComputer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
More informationNetwork Edge and Network Core
Computer Networks Network Edge and Network Core Based on Computer Networking, 4 th Edition by Kurose and Ross What s s the Internet: Nuts and Bolts View PC server wireless laptop cellular handheld access
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCSCI 491-01 Topics: Internet Programming Fall 2008
CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our
More informationNetwork Security Engineering: Introduction
Network Security Engineering: Introduction Carlo U. Nicola, SGI FHNW With extracts from publications of : Ross J. Anderson, University of Cambridge William Stallings, David A. Wheeler. and from the book
More informationInteractive telecommunication between people Analog voice
History background on Circuit switch and Packet based switch network Telephony Interactive telecommunication between people Analog voice Transmitter/receiver continuously in contact with electronic circuit
More informationChapter 1 Computer Networks and the Internet
CSF531 Advanced Computer Networks 高 等 電 腦 網 路 Chapter 1 Computer Networks and the Internet 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Access networks
More informationNetwork edge and network core. millions of connected compu?ng devices: hosts = end systems running network apps
Computer Networks 1-1 What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld access points wired links millions of connected compu?ng devices: hosts = end systems running
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationData Communications and Networks IS 450/IS 650 Fall 2015. Course Logistics
Data Communications and Networks IS 450/IS 650 Fall 2015 Course Logistics Nirmalya Roy Department of Information Systems University of Maryland Baltimore County www.umbc.edu Welcome to IS 450/IS 650 Timings:
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationInternet structure: network of networks
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 Internet structure and s 1.6 Delay & loss in packet-switched networks 1.7 Protocol
More informationCISC 1600 Introduction to Multi-media Computing
CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: raphael@sci.brooklyn.cuny.edu http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html
More informationIntroduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media
Introduction cont. Some Structure in the Chaos Lecture goal: get context, overview, feel of ing more depth, detail later in course approach: o descriptive o use Internet as example Overview: access net,
More informationHow To Understand The Internet Of S (Netware)
Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation
More informationModule 1 Introduction CS755! 1-1!
Module 1 Introduction CS755! 1-1! What s a Distributed System? A distributed system is a collection of independent computers that appear to the users of the system as a single computer Example:! a network
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationWhat s the Internet. routers: forward packets (chunks of data) millions of connected computing devices: hosts = end systems
What s the Internet PC server wireless laptop cellular handheld router access points wired links millions of connected computing devices: hosts = end systems running network apps communication links fiber,
More informationIT-5302-3 Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture
IT-5302-3 Internet Architecture and Protocols Punjab University College of Information Technology, University of the Punjab, Pakistan. Lecture 02 Overview of Internet Architecture Lecture 02 - Roadmap
More informationComputer Network Architecture
Computer Network Architecture ECE 156 Fall 2007 Romit Roy Choudhury Dept. of ECE and CS 1 Course Logistics 2 Welcome to ECE 156 Timings: Location: Course TA: Tu/Thu 1:15pm to 2:30pm 212 Engineering TBA
More informationThe Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So
The Internet CCST9015 Feb 6, 2013 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How fast the
More informationCourse on Computer Communication and Networks. Lecture 1 & part of lecture 2 Chapter 1: Introduction
Course on Computer Communication and Networks Lecture 1 & part of lecture 2 Chapter 1: Introduction EDA344/DIT 420, CTH/GU Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith
More informationIntroduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Goals of This Course v Be familiar with Fundamental network topics Some advanced topics State-of-the-art
More informationIntroduction. Chapter 1 Introduction. CS 3516 Computer Networks. Chapter 1: Roadmap. Chapter 1: Introduction. Cool Internet Appliances
Introduction CS 3516 Computer Networks Chapter 1 Introduction All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5 th edition Jim Kurose, Keith Ross Addison-Wesley, April 2009
More informationChapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
More informationComputer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationComputer System Design: Laws, Principles, Trends - II
Computer System Design: Laws, Principles, Trends - II Presenter: Sandeep K. S. Gupta Reference: -Computer Networking: A Top-Down Approach, 5ed, Ross and Kurose. -Computer Organization and Design: The Hardware/Software
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationCSE 3214: Computer Network Protocols and Applications
CSE 3214: Computer Network Protocols and Applications 1 Course Web-Page: Instructor: http://www.eecs.yorku.ca/course/3214/ (all lecture notes will be posted on this page) Natalija Vlajic (vlajic@cse.yorku.ca)
More informationTCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
More informationECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th
ECE/CS 372 introduction to computer networks Lecture 2 Announcements: Please make sure to check the course s website on a regular basis http://web.engr.oregonstate.edu/~sinkyha/cs372 Midterm scheduled
More informationChapter 1: Introduction. Chapter 1 Introduction. Chapter 1: roadmap. Cool internet appliances. What s the Internet: nuts and bolts view
Chapter 1 Introduction A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationRoadmap. Cool internet appliances. Introduction to Computer Networks. What s the Internet: nuts and bolts view
Introduction to Computer Networks Our goal: get feel and terminology more depth, detail later in course approach: use Internet as example Overview: what s the Internet what s a protocol? edge core access
More informationInternet Routing. Review of Networking Principles
Internet Routing Review of Networking Principles 1 Principles of the Internet Edge vs. core (end-systems vs. routers) Dumb Intelligence at the end-systems Different communication paradigms Connection oriented
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationChapter 1: Introduction. Chapter 1: roadmap. What is the Internet? Introduction to Computer Networks 計 算 機 網 路 概 論
Chapter 1: Introduction Introduction to Computer Networks 計 算 機 網 路 概 論 Chapter 1: Introduction Courtesy to Pearson Addison-Wesley because many slides are from Jim Kurose, Keith Ross, Computer Networking:
More informationDHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy
, ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
More informationNetwork Overview. The network edge: The network edge: Internet Services Models. The network edge: A closer look at network structure:
A closer look at network structure: Network Overview network edge: applications and hosts network core: routers network of networks access networks, media: communication s Introduction 1-1 Introduction
More informationThe OSI & Internet layering models
CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end
More informationTopics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
More informationArchitecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
More informationIntroduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
More informationThe TCP/IP Reference Model
The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was
More informationE-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
More informationPrinciples of Network Applications. Dr. Philip Cannata
Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).
More information1/31/2013. Data Communications & Networks. Session 1 Main Theme. 2 Introduction and Overview. Dr. Jean-Claude Franchitti
Data Communications & Networks Session 1 Main Theme Introduction and Overview Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture
More informationWorkshop on Infrastructure Security and Operational Challenges of Service Provider Networks
Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Farnam Jahanian University of Michigan and Arbor Networks IFIP Working Group 10.4 June 29-30, 2006 What s the
More informationData Communication Networks Introduction
Data Communication Networks Introduction M. R. Pakravan Department of Electrical Engineering Sharif University of Technology Data Networks 1 Introduction The course introduces the underlying concepts and
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationInternet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
More informationTechnical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
More informationarchitecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationChapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationOct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
More informationNetwork Security in Practice
Network Security in Practice Practices of Network Security ccess control: firewalls ttacks and counter measures Security protocol case studies Kai Shen 12/8/2014 CSC 257/457 - Fall 2014 1 12/8/2014 CSC
More informationAddress Resolution Protocol (ARP)
Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses
More informationLink Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
More informationNetworks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol
Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationCA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie
CA106 Web Design Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929, dfitzpat@computing.dcu.ie History of the Internet Terminals attached to mainframe computer From mid 1960 s packet-switching
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationNineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:
Policy Statement: NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market broadband Internet services offered by NineStar Connect. NineStar
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationInternet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 1: Introduction, the Internet and Internet Protocols and Applications January 20, 2004 Arthur Goldberg Computer Science Department New York University
More informationPage 1 of 7. Computer Networking
Page 1 of 7 Computer Networking 7.1 What Is Computer Networking? A computer network consists of several computers that are connected to one another using devices that allow them to communicate. Computer
More informationDomain Name System (DNS)
Domain Name System (DNS) Instructor: Anirban Mahanti Office: ICT 745 Email: mahanti@cpsc.ucalgary.ca Class Location: ICT 121 Lectures: MWF 12:00 12:50 Notes derived from Computer Networking: A Top Down
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationChapter 1: Introduction. Chapter 1 Introduction. Chapter 1: roadmap. Cool internet appliances. What s the Internet: nuts and bolts view
Chapter 1 Introduction note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationCMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst
CMPSCI 453 Computer Networking Professor V. Arun Department of Computer Science University of Massachusetts Amherst 1 What is this course about? introductory (first) course in computer networking q learn
More informationWhat s the Internet: a service view. Chapter 1 Introduction. What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view
What s the Internet: a service view Chapter 1 Introduction communication infrastructure enables distributed applications: Web, VoIP, email, games, e-commerce, file sharing communication services provided
More informationIntroduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
Introduction Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching,
More informationDetailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationCOSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationDelay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)
Computer Networks Delay, loss and throughput Layered architectures How do loss and delay occur? packets queue in router buffers packet arrival rate to exceeds output capacity packets queue, wait for turn
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $100,000 % ISP intranet % % % backbone satellite link desktop computer: server: network
More informationPLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009
Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2008-2009 Conceitos de Redes e Arquitecturas - Networks and Architectures
More informationDistributed Systems. 2. Application Layer
Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social
More information