How To Understand The Internet Of S (Netware)
|
|
|
- Rosamund Chandler
- 5 years ago
- Views:
Transcription
1 Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation
2 Overview of Computer s Our Goal: Get feel and terminology Focus on the Internet What is the Internet? What is the Protocol? Layered Architecture. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 2
3 Overview of Computer s Our Goal: Get feel and terminology Focus on the Internet What is the Internet? What is the Protocol? Security Layered Architecture. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 3
4 What is the Internet Millions of connected computing devices: End systems / Hosts (Running Net Apps) Communication s (Wired or Wireless) mobile network home network global ISP regional ISP Routers and Switches (Forward Packets ) institutional network Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 4
5 What is the Internet of s ISPs Institutional s Home s Mobile s mobile network home network global ISP regional ISP Internet Protocols: Control Sending & Receiving of Messages E.g.: TCP, IP, HTTP, institutional network Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 5
6 What is a Protocol? Human Protocol: What time is it?, I have a question., Protocols: Machines instead of humans. Protocols define format and order of messages sent and received among network entities, and actions taken on message transmission and message receipt. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 6
7 What is a Protocol? Protocol define the interaction sequences over time: Hi Hi Got the time? 2:00 Time TCP connection request TCP connection response Get <file> Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 7
8 Protocol Layers s are complex with many pieces : Hosts Routers Wired s Wireless s s Protocols Hardware Software Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 8
9 Protocol Layers s are complex with many pieces : Hosts Routers Wired s Wireless s s Protocols Hardware Software Q: How can we organize the structure of networks? Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 9
10 Example: Organization of Air Travel A series of steps are taken at different layers : ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 10
11 Example: Organization of Air Travel Each layer implements a service : Via its own internal-layer actions. ticket (purchase) ticket (complain) ticket baggage (check) baggage (claim baggage gates (load) gates (unload) gate runway (takeoff) runway (land) takeoff/landing airplane routing airplane routing airplane routing airplane routing airplane routing departure airport intermediate air-traffic control centers arrival airport Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 11
12 Internet Protocol Stack There are five layers in Internet Protocol Stack with different functionalities and protocols. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 12
13 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 13
14 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 14
15 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 15
16 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 16
17 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP They all use TCP Protocol for reliable data transmission. (Socket Programming) (Each socket has a port #) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 17
18 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 18
19 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 19
20 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 20
21 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols : Routing from source to destination Ethernet, IEEE (WiFi) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 21
22 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols : Routing from source to destination Ethernet, IEEE (WiFi) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 22
23 Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols : Routing from source to destination Ethernet, IEEE (WiFi) : Bit-by-bit transmission Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 23
24 Packets communications are essentially 0-1 bit streams: But we break down bit streams to small bit chunks = packets. The packet at each layer: Can have different names (frame, segment, etc.) Can have different sizes Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 24
25 Packets Message Segment Datagram Frame Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 25
26 Packet Headers Protocol at each layer adds its own headers for control data. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 26
27 Packet Headers Protocol at each layer adds its own headers for control data. Message Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 27
28 Packet Headers Protocol at each layer adds its own headers for control data. Segment Message H T Used by TCP and UDP Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 28
29 Packet Headers Protocol at each layer adds its own headers for control data. Datagram Message H T H N Used by IP, Routing Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 29
30 Packet Headers Protocol at each layer adds its own headers for control data. Used by Ethernet, Message H T H N H L Frame Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 30
31 What is Next? For the rest of this track we will cover: Part 2: Common Tools & Techniques in Security (Dr. Akbar Siami-Namin) Part 3: Cyber Security in the Internet Protocol Stack (Dr. Hamed Mohsenian-Rad) Part 4: Research and Education in Security (Dr. Rattikorn Hewett) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 31
Layered protocol (service) architecture
Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure
TCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1
TCIPG Reading Group Introduction to Computer Networks Based on: Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison- Wesley, July 2007. Introduction 1-1 Chapter 1: Introduction
Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)
Computer Networks Delay, loss and throughput Layered architectures How do loss and delay occur? packets queue in router buffers packet arrival rate to exceeds output capacity packets queue, wait for turn
Internet architecture is very scalable. Thailand Statistics
Agenda 2110684 Information System Architecture Natawut Nupairoj, Ph.D. Department of Computer Engineering, Chulalongkorn University Part of this material are copyright 1996-2004 by J.F Kurose and K.W.
Overview: Internet vs Data Center Networks
Overview: Inter vs Data Center Networks Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking August 29, 2014 Overview What is the Inter? Goals
ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th
ECE/CS 372 introduction to computer networks Lecture 2 Announcements: Please make sure to check the course s website on a regular basis http://web.engr.oregonstate.edu/~sinkyha/cs372 Midterm scheduled
Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media
Introduction cont. Some Structure in the Chaos Lecture goal: get context, overview, feel of ing more depth, detail later in course approach: o descriptive o use Internet as example Overview: access net,
Computer Network Architecture
Computer Network Architecture ECE 156 Fall 2007 Romit Roy Choudhury Dept. of ECE and CS 1 Course Logistics 2 Welcome to ECE 156 Timings: Location: Course TA: Tu/Thu 1:15pm to 2:30pm 212 Engineering TBA
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
Computer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
What s the Internet. routers: forward packets (chunks of data) millions of connected computing devices: hosts = end systems
What s the Internet PC server wireless laptop cellular handheld router access points wired links millions of connected computing devices: hosts = end systems running network apps communication links fiber,
Course book: Computer Networking. Computer Networks 3 rd edition. By Andrew ST S.Tanenbaum. Top Down approach 3 rd edition.
Computer Networking Course book: Computer Networking Top Down approach 3 rd edition By Jim kurose and keith ross Reference book: Computer Networks 3 rd edition By Andrew ST S.Tanenbaum Introduction 1-1
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Network Overview. The network edge: The network edge: Internet Services Models. The network edge: A closer look at network structure:
A closer look at network structure: Network Overview network edge: applications and hosts network core: routers network of networks access networks, media: communication s Introduction 1-1 Introduction
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
How To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Using MIS 3e Chapter 6A Appendix
Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI
finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...
Read Chapter 9 Linux network utilities finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,... 1 Important to know common network terminology
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
How Does Ping Really Work?
How Does Ping Really Work? George Mays, Global Knowledge Course Director, CCISP, CCNA, A+, Network+, Security+, I-Net+ Introduction Ping is a basic Internet program that most of us use daily, but did you
Chapter 11. User Datagram Protocol (UDP)
Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,
Layered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Lab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
The Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So
The Internet CCST9015 Feb 6, 2013 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How fast the
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
The OSI & Internet layering models
CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Internet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
Architecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
THE TCP/IP PROTOCOL SUITE
CHAPTER 1 Protocols and Layers 25 a truck or plane. It sounds like a very complicated way to deliver one message, but this system makes the overall task of delivering many messages easier, not harder.
Network Models OSI vs. TCP/IP
Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both
OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS
OSI OPEN SYSTEMS OSI - Open Systems Interconnection INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS Peter R. Egli INDIGOO.COM 1/8 Contents 1. Layering model 2. The 7 layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
Ethereal: Getting Started
Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me
CS101 Lecture 19: Internetworking. What You ll Learn Today
CS101 Lecture 19: Internetworking Internet Protocol IP Addresses Routing Domain Name Services Aaron Stevens ([email protected]) 6 March 2013 What You ll Learn Today What is the Internet? What does Internet Protocol
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25
NAT & IP Masquerade Page 1 of 5 INTRODUCTION Pre-requisites TCP/IP IP Address Space NAT & IP Masquerade Protocol version 4 uses a 32 bit IP address. In theory, a 32 bit address space should provide addresses
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Data Communications and Networks IS 450/IS 650 Fall 2015. Course Logistics
Data Communications and Networks IS 450/IS 650 Fall 2015 Course Logistics Nirmalya Roy Department of Information Systems University of Maryland Baltimore County www.umbc.edu Welcome to IS 450/IS 650 Timings:
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration
ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Distributed Systems Interconnec=ng Them Fundamentals of Distributed Systems Alvaro A A Fernandes School of Computer Science University of Manchester
Distributed Systems Interconnec=ng Them Fundamentals of Distributed Systems lvaro Fernandes School of Computer Science University of Manchester Goals 1. To highlight the role of the interconnect in characterizing
Business Data Communications & IT Infrastructures, 2 nd Edition
DETAILED TABLE OF CONTENTS (Subject to Changes) Business Data Communications & IT Infrastructures, 2 nd Edition By Manish Agrawal & Rekha Sharma PROSPECT PRESS, expected publication: July, 2016 Preface
CISC 1600 Introduction to Multi-media Computing
CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: [email protected] http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html
AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP
AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Internet Security Firewalls
Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA
12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Computer Networks - Xarxes de Computadors
Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications
