Unix Security Features and TCP/IP Primer
|
|
|
- Hester Hunt
- 10 years ago
- Views:
Transcription
1 Unix Security Features and TCP/IP Primer Secure Software Programming and Vulnerability Analysis Christopher Kruegel Unix Security Features and TCP/IP Primer Secure Software Programming 2
2 Unix Features Multi-user operating system Process implements user-activity entity that executes a given piece of code has its own execution stack, memory pages, and file descriptors table Thread separate stack and program counter share memory pages and file descriptor table Secure Software Programming 3 Unix - Process Process Attributes process ID (PID) uniquely identified process user ID (UID) ID of owner of process effective user ID (EUID) ID used for permission checks (e.g., to access resources) saved user ID (SUID) to temporarily drop and restore privileges lots of management information scheduling memory management, resource management Secure Software Programming 4
3 Unix - User Model Unix is user-centric no roles User identified by user name (UID), group name (GID) authenticated by password (stored encrypted) User root superuser, system administrator special privileges (access resources, modify OS) cannot decrypt user passwords Secure Software Programming 5 Unix - Authentication Passwords user passwords are used as keys for crypt() function runs DES algorithm 25 times on a block of zeros 12-bit salt 4096 variations chosen from date, not secret prevent same passwords to map onto same string make dictionary attacks more difficult Password cracking dictionary attacks Crack, JohnTheRipper Secure Software Programming 6
4 Unix - Authentication /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/bin/false daemon:x:2:2:daemon:/sbin:/bin/false adm:x:3:4:adm:/var/adm:/bin/false lp:x:4:7:lp:/var/spool/lpd:/bin/false chris:acpyurst9bfgz1:1000:100:chris Kruegel:/home/chris:/bin/bash username password UID GID complete name home-dir login-shell Secure Software Programming 7 Unix - Authentication Authentication prompt - /bin/login user provides name and password salt retrieved from /etc/password zero block is encrypted result compared to stored one Attacks fake logins tty tapping social engineering Secure Software Programming 8
5 Unix - Authentication Shadow passwords password file is needed by many applications to map user ID to user names encrypted passwords are not /etc/shadow holds encrypted passwords account information last change date expiration (warning, disabled) minimum change frequency readable only by superuser and privileged programs MD5 hashed passwords to slow down guessing Secure Software Programming 9 Unix - Group Model Users belong to one or more groups primary group (stored in /etc/password) additional groups (stored in /etc/group) possibility to set group password and become group member with newgrp /etc/group root:x:0:root bin:x:1:root,bin,daemon users:x:100:chris groupname : password : group id : additional users Secure Software Programming 10
6 Unix - File System File tree primary repository of information hierarchical set of directories directories contain file system objects (FSO) root is denoted / File system object files, directories, symbolic links, sockets, device files referenced by inode (index node) Secure Software Programming 11 Unix - File System File System Object Attributes type size reference counter position on disk (disk block list) UID and GID of owner access and modification times permission bits but no file name! Directory holds mapping between name and inode Secure Software Programming 12
7 Unix - File System Access Control permission bits chmod, chown, chgrp, umask file listing: - rwx rwx rwx (file type) (user) (group) (other) Type r w x s t File read access write access execute suid / sgid inherit id sticky bit Directory list files insert and remove files stat / execute files, chdir new files have dir-gid files only deleteable by owner Secure Software Programming 13 Unix - SUID Programs Each process has real and effective user / group ID usually identical real IDs determined by current user login, su effective IDs determine the rights of a process system calls (e.g., setuid()) suid / sgid bits attractive target for attacker Secure Software Programming 14
8 Unix - Resource Limits File system limits quotas restrict number of storage blocks and number of inodes hard limit can never be exceeded (operation fails) soft limit can be exceeded temporarily can be defined per mount-point defend against resource exhaustion (denial of service) Process resource limits number of child processes, open file descriptors Secure Software Programming 15 Unix - Signals Signal simple form of interrupt asynchronous notification can happen anywhere for process in user space used to deliver segmentation faults, reload commands, kill command Signal handling process can install signal handlers when no handler is present, default behavior is used ignore or kill process possible to catch all signals except SIGKILL (-9) Secure Software Programming 16
9 Unix - Signals Security issues code has to be be re-entrant atomic modifications no global data structures race conditions unsafe library calls, system calls Secure signals write handler as simple as possible block signals in handler Secure Software Programming 17 Unix - Communication Half-duplex pipes connect output of one process to input of another information flows uni-directional classic use in shell programming (via character) represented by a file (inode) in kernel but not in file system Named pipes much like regular pipes exist as a device special file in the file system processes of different ancestry can share data when I/O is done by sharing processes, the named pipe remains in the file system Secure Software Programming 18
10 Unix - Communication AT&T System V IPC inter-process communication primitives shared memory, semaphores, message queues standard access control mechanisms apply BSD Sockets mostly used for network connections local sockets possible e.g., to implement pipes appear as objects in file system but cannot use open more on sockets later in the TCP/IP section Secure Software Programming 19 Unix - Shared Libraries Library collection of object files included into (linked) program as needed code reuse Shared library multiple processes share a single library copy save disk space (program size is reduced) save memory space (only a single copy in memory) Secure Software Programming 20
11 Unix - Shared Libraries Static shared library address binding at link-time not very flexible when library changes code is fast Dynamic shared library address binding at load-time procedure linkage table (PLT) and global offset table (GOT) code is slower (indirection) loading is slow (binding has to be done at run-time) management issues (semantic changes) classic.so or.dll libraries Secure Software Programming 21 Unix - Shared Libraries Management stored in special directories (listed in /etc/ld.so.conf) manage cache with ldconfig Preload override (substitute) with other version use /etc/ld.so.preload can also use environment variables for override possible security hazard disabled for SUID programs Secure Software Programming 22
12 Unix Security Features and TCP/IP Primer Secure Software Programming 23 OSI Reference Model Developed by the ISO to support open systems interconnection layered architecture, level n uses service of (n-1) Host A Host B 7 Application Layer Application Layer 6 Presentation Layer Presentation Layer 5 Session Layer Session Layer 4 Transport Layer Transport Layer 3 Network Layer Network Layer 2 Data Link Layer Data Link Layer 1 Physical Layer Physical Layer Secure Software Programming 24
13 OSI Reference Model Physical Layer connect to channel / used to transmit bytes (= network cable) Data Link Layer error control between adjacent nodes Network Layer transmission and routing across subnets Transport Layer ordering multiplexing correctness Secure Software Programming 25 OSI Reference Model Session Layer support for session based interaction e.g. communication parameters/communication state Presentation Layer standard data representation Application Layer application specific protocols Secure Software Programming 26
14 TCP / IP TCP/IP Telnet SMTP TCP Internet Protocol (IP) Ethernet NIC OSI-Reference Application Transport Network Data Link Layer Physical Layer Secure Software Programming 27 Internet Host Host Host Host Host Internet Host Subnet Subnet Subnet PPP (phone) Secure Software Programming 28
15 Internet Protocol (IP) Is the glue between hosts of the Internet Standardized in RFC 791 Packet-based service packets have a maximum size of 2 16 bytes Attributes of delivery connectionless unreliable best-effort datagram delivery, integrity, ordering, non-duplication are NOT guaranteed Secure Software Programming 29 Internet Protocol (IP) IP packets (datagrams) can be exchanged by any two nodes that are set up as IP nodes (i.e., that have IP addresses) For point-to-point communication IP is tunneled over lower level protocols Ethernet Token Ring FDDI PPP, etc. Standardized data ordering network byte-order = big endian x86 host byte-order = little endian Secure Software Programming 30
16 IP Address IP addresses in IPv4 are 32 bit numbers (class+net+host ID) Each host has a unique IP address for each NIC Represented as dotted-decimal notation: = Classes: <starts with> <net-bits> <host-bits> <#of possible hosts> Class A: Class B: Class C: Class D: 1110 special meaning: 28 bit multicast address Class E: 1111 reserved for future use Secure Software Programming 31 IP Subnet It is often unrealistic to have networks with so many hosts further divide the hostbits into subnet ID and host ID saves address space Example: Class C normally has 24 netbits Class C network with subnet mask = host ID => 16 hosts within every subnet subnet ID => 16 subnets within this class C network Secure Software Programming 32
17 IP - Direct Delivery If two hosts are in the same physical network the IP datagram is encapsulated in a Layer 2 frame and delivered directly Host 1 ( ) Host 2 ( ) Host 3 ( ) Host 4 ( ) Host 5 ( ) Host 6 ( ) Secure Software Programming 33 IP Encapsulation IP packet included in Layer 2 frame e.g., Ethernet (RFC IP over Ethernet) e.g. Ethernet IP Header IP Data Frame Header Frame Data Secure Software Programming 34
18 Ethernet Widely used link layer protocol Carrier Sense, Multiple Access (CSMA) with Collision Detection Addresses: 48 bits (e.g. 00:38:af:23:34:0f) Frame 2 x 6 bytes addresses (destination and source) 2 bytes frame data type specifies encapsulated protocol, IP, ARP, RARP variable length data 4 bytes CRC Frame Length minimum of 64 bytes frame length padding may be needed maximum of 1518 bytes Secure Software Programming 35 IP - Direct Delivery Problem: Ethernet uses 48 bit addresses IP uses 32 bit addresses We want to send an IP datagram but we only can use the Link Layer to do this Secure Software Programming 36
19 ARP Solution - ARP (Address Resolution Protocol) Service at the link-level, RFC 826 Maps IP network addresses to Ethernet link-level addresses Scenario: host A wants to know the Ethernet address associated with IP address of host B A broadcasts ARP message on physical link (including its own mapping) B answers A with ARP answer message Mappings are cached arp -a shows mapping Secure Software Programming 37 Fragmentation Fragmentation when datagram size is larger than data link layer MTU (Maximum Transmission Unit) performed at source host or intermediate steps (e.g., routers) Reassembly rebuilding the IP packet only performed at the destination Each fragment is delivered as a separate datagram Secure Software Programming 38
20 IP - Indirect Delivery Routing needed if hosts are in different physical networks packet can t be delivered directly Packet is forwarded to a router (gateway) router has access to other network(s) router decides upon destination where to send the packet next this is repeated until packet arrives at network with target host then direct delivery is performed link level addresses change at every step, also TTL field Secure Software Programming 39 IP - Indirect Delivery Store and forward communication Host Host Host Host Host Internet Host Host Host Secure Software Programming 40
21 Routing Table Contains information how to do hop-by hop routing % route -n Kernel IP routing table Destination Gateway Genmask Flags Iface U eth0 loopback UG lo UG eth0 Flags: U: the route is up G: use gateway for destination Secure Software Programming 41 Routing Mechanism Route-daemon searches for matching host address matching network address default entry If no route can be found: ICMP message Host unreachable is sent back to originator Routing tables can be set statically dynamically (using routing protocols) Secure Software Programming 42
22 Routing Protocols automatically distribute information about delivery routes hierarchically organized with different scope divided in exterior gateway protocols (EGPs) distribute information between different autonomous systems e.g., Border Gateway Protocol (BGP) for Internet backbone interior gateway protocols (IGP) distribute information inside autonomous systems, e.g. in LANs e.g., Routing Information Protocol (RIP) e.g., Open Shortest Path First (OSPF) autonomous means: under a single administrative control Secure Software Programming 43 Routing Protocols LAN with different subnets RIP BGP BGP RIP BGP OSPF Secure Software Programming 44
23 User Datagram Protocol UDP (User Datagram Protocol) based on IP Connectionless based on datagrams Best-effort service delivery non-duplication ordering are not guaranteed Unreliable (checksum optional) Secure Software Programming 45 UDP Message Port abstraction allows addressing different destinations for the same IP Often used for multimedia more efficient than TCP for services based on request/reply schema (DNS, NIS, NFS, RPC) UDP source port (2 bytes) UDP destination port (2) UDP message length (2) Checksum (2) Data (up to 2 16 ) Secure Software Programming 46
24 Transmission Control Protocol TCP (Transmission Control Protocol) based on IP Connection-oriented based on streams Reliable service delivery non-duplication ordering are guaranteed Checksum mandatory Uses acknowledgements sent by receiver Secure Software Programming 47 TCP Provides port abstraction like UDP Allows two nodes to establish a virtual circuit identified with quadruples <srcip, src_port, dstip, dst_port> virtual circuit is composed of two streams (full duplex) The pair <IP address, port> is called a socket Secure Software Programming 48
25 TCP Sequence Numbers Sequence number specifies the position of the segment data in the communication stream (SEQ=1234 means: the payload of this segment contains data starting from 1234) Acknowledgement number specifies the position of the next expected byte from the communication partner (ACK=12345 means: I have received the bytes correctly to 12344, I expect the next byte to be 12345). Both are used to manage error control retransmission, duplicate filtering Secure Software Programming 49 TCP Virtual Circuit Setup A server listens to a specific port Client sends a connection request to the server, with SYN flag set and a random initial sequence number c The server answers with a segment marked with both the SYN and ACK flags and containing an initial random sequence number s c+1 as the acknowledge number The client sends a segment with the ACK flag set and with sequence number c+1 and ack number s+1 Secure Software Programming 50
26 TCP Virtual Circuit Setup TCP Three way handshake Server srcport=12312, dstport=23, seq = 6421, ack=0, SYN srcport=23, dstport=12312, seq = 11721, ack=6422, SYN, ACK Client srcport=12312, dstport=23, seq = 6422, ack=11722, ACK Secure Software Programming 51 TCP Data Exchange Each TCP segment contains sequence number = ack number of last received packet ack number = sequence number of last correctly received segment increase by the payload size of this segment A partner accepts a segment of the other partner only if the numbers are inside the transmission window An empty segment may be used to acknowledge the received data Packets with no payload and SYN or FIN set consume this sequence number Secure Software Programming 52
27 TCP Data Exchange Server srcport=12312, dstport=23, seq = 6422 (10 bytes), ack= 11722, ACK Client srcport=23, dstport=12312, seq = (25 bytes), ack=6432, ACK srcport=12312, dstport=23, seq = 6432 (100 bytes), ack=11747, ACK Secure Software Programming 53 Virtual Circuit Shutdown One of the partners, e.g., A, wants to terminate its stream sends a segment with the FIN flag set B answers with a segment with the ACK flag set From this point on, A will not send any data to B just acknowledge data sent by B with empty segments When B shuts its stream down, the virtual circuit is considered closed Secure Software Programming 54
28 Sample TCP Connection From To S A F Seq-Nr Ack-Nr Payload Login:\n s e c \n Secure Software Programming 55
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Introduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: [email protected] http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Internet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods
The Internet and its Protocols Protocol Specification & Design Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
The Internet. Internet Technologies and Applications
The Internet Internet Technologies and Applications Aim and Contents Aim: Review the main concepts and technologies used in the Internet Describe the real structure of the Internet today Contents: Internetworking
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Transport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
Network Models and Protocols
669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols
Subnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
CHAPTER 3 STATIC ROUTING
CHAPTER 3 STATIC ROUTING This chapter addresses the end-to-end delivery service of IP and explains how IP routers and hosts handle IP datagrams. The first section discusses how datagrams are forwarded
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
Introduction to IP networking
DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture
Chapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Post-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
Introduction to LAN/WAN. Network Layer (part II)
Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking
ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:
How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in
Access Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)
Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: [email protected]
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
TCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
Lecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
Understanding Layer 2, 3, and 4 Protocols
2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
The OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
Networking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
Chapter 11. User Datagram Protocol (UDP)
Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
Leased Line PPP Connections Between IOS and HP Routers
Leased Line PPP Connections Between IOS and HP Routers This technical document describes how to connect an IOS Router to an HP Router using point-to-point protocol. An example of an IOS router connected
TCP/IP Fundamentals. Edmund Lam IT Audit Manager University of California [email protected] 7/25/99 1
TCP/IP Fundamentals Edmund Lam IT Audit Manager University of California [email protected] 7/25/99 1 What we will discuss: TCP/IP related to OSI Layers History of TCP/IP and what is it? TCP/IP Structure
TCP/IP and the Internet
TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).
Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine [email protected] http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
CS 290 Host-based Security and Malware. Christopher Kruegel [email protected]
CS 290 Host-based Security and Malware Christopher Kruegel [email protected] Unix Unix / Linux Started in 1969 at AT&T / Bell Labs Split into a number of popular branches BSD, Solaris, HP-UX, AIX Inspired
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
ICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
