Internet Technology and Security
|
|
|
- Deirdre Pearson
- 10 years ago
- Views:
Transcription
1 Internet Technology and Security
2 Unless otherwise noted, the content of these lecture slides are licensed under a Creative Commons Attribution 3.0 License. Copyright , Charles Severance, Martha Pollack, Paul Resnick You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance with U.S. law. Copyright holders of content included in this material should contact [email protected] with any questions, corrections, or clarifications regarding the use of content. The Regents of the University of Michigan do not license the use of third party content posted to this site unless such a license is specifically granted in connection with particular content. Users of content are responsible for their compliance with applicable law. Mention of specific products in this material solely represents the opinion of the speaker and does not represent an endorsement by the University of Michigan. For more information about how to cite these materials visit Any medical information in this material is intended to inform and educate and is not a tool for self-diagnosis or a replacement for medical evaluation, advice, diagnosis or treatment by a healthcare professional. You should speak to your physician or make an appointment to be seen if you have questions or concerns about this information or your medical condition. Viewer discretion is advised: Material may contain medical images that may be disturbing to some viewers.
3 Copyright Thanks Thanks to IEEE Computer for permisison to use IEEE Computer magazine articles associated with the videos Thanks to Dave Malicke and Open Michigan (open.umich.edu) for help with copyright review of these materials
4
5 Store and Forward Networking Dialup Leased Clipart:
6 Research Networks s December 1969 How can we avoid having a direct connection between all pairs of computers? How to transport messages efficiently? How can we dynamically handle outages? August
7 Heart, F., McKenzie, A., McQuillian, J., and Walden, D., ARPANET Completion Report, Bolt, Beranek and Newman, Burlington, MA, January 4,
8 Efficient Message Transmission: Packet Switching Challenge: in a simple approach, like store-and-forward, large messages block small ones Break each message into packets Can allow the packets from a single message to travel over different paths, dynamically adjusting for use Use special-purpose computers, called routers, for the traffic control
9 Packet Switching - Hello there, have a nice day. Postcards Hello ther (1, csev, daphne) e, have a (2, csev, daphne) nice day. (3, csev, daphne)
10 1 2 3
11 Packet Switching - Postcards Hello e, nice have day. ther a (3, (2, (1, csev, daphne) Hello there, have a nice day.
12 Shared Network Router Wide Area Network Local Area Network Cable or DSL Clipart:
13 In order to keep cost low and the connections short Shared Networks geographically - data would be forwarded through several routers. Getting across the country usually takes about 10 hops Network designers continually add and remove links to tune their networks Source: Internet_Protocol_Suite
14 Layered Network Model A layered approach allows the problem of designing a network to be broken into more manageable sub problems Best-known model: TCP/IP the Internet Protocol Suite There was also a 7 layer OSI: Open System Interconnection Model Application Layer Web, , File Transfer Transport Layer (TCP) Reliable Connections Internetwork Layer (IP) Simple, Unreliable Link Layer (Ethernet, WiFi) Physical Connections
15 Internet Standards The standards for all of the Internet protocols (inner workings) are developed by an organization Internet Engineering Task Force (IETF) Standards are called RFCs - Request for Comments Source:
16 Layered Architecture The Physical and Internet Layers are like trucks and trains - they haul stuff and get it to the right loading dock - it takes multiple steps The Transport layer checks to see if the trucks made it and send the stuff again if necessary Source:
17 Link Layer (aka Physical Layer) As your data crosses the country may use a different physical medium for each hop Wire, Wireless, Fiber Optic, etc. The link is one hop - Is it up or down? Connected or not? Very narrow focus - no view at all of the whole Internet Source:
18 Ethernet Problems solved by the Link Layer How does data get pushed onto a link? How is the link shared? Common Link Technologies
19 Link Layer Addresses Many physical layer devices have addresses built in to them by the manufacturer Ethernet Wireless Ethernet (Wifi)
20 Link Layer Physical addresses are to allow systems to identify themselves on the ends of a single link Physical addresses go no farther than one link Sometimes links like Wifi and Wired Ethernet are shared with multiple computers 0f:21:63:12:b3:1a 98:2f:4e:78:01:b4 Source:
21 Listen for your own data Sharing Nicely - Avoiding Chaos CSMA/CD Carrier Sense Media Access with Collision Detection To avoid garbled messages, systems must observe rules (Protocols) Ethernet rules are simple Wait for silence Begin Transmitting data
22 Internetwork Layer (IP) Application Layer Web, , File Transfer Transport Layer (TCP) Reliable Connections Internetwork Layer (IP) Simple, Unreliable Link Layer (Ethernet, WiFi) Physical Connections
23 Internet Protocol Layer Goal: Gets your data from this computer to the other computer half way across the world Each router knows about nearby routers IP Is best effort - it is OK to drop data if things go bad... Source:
24 IP Addresses The IP address is the worldwide number which is associated with one particular workstation or server Every system which will send packets directly out across the Internet must have a unique IP address IP addresses are based on where station is connected IP addresses are not controlled by a single organization - address ranges are assigned They are like phone numbers they get reorganized once in a great while
25
26 IP Address Format Four numbers with dots - each number (32 bits) Kind of like phone numbers with an area code The prefix of the address is which network While the data is traversing the Internet - all that matters is the network number (734) Network Area code Number *.*
27 While in the network, all that matters is the Network number To: *.* *.* To: To: Clipart:
28 No single router knows the whole network - just which way to send data to get it closer To: *.*?? *.* Clipart:
29 Router Tables Lists of where to send packets, based on destination network address; bandwidth on adjacent links; traffic on adjacent links; state of neighbor nodes (up or not);... To: *.*?? Updated dynamically Routers ask each other for information Clipart:
30 IP Is Simple Thousands of network connections. Billions of bytes of data per seconds. Local Network *.* Thousands of user systems 100 s of servers One area code to keep track of inside the Internet. Clipart:
31 DHCP = Dynamic Host Configuration Protocol Hello? Here I am What IP Address can I use? Use
32 Non-Routable Addresses A typical home router does Network Address Translation (NAT) Your ISP gives your home router a real global routable address Your router gives out local addresses in a special range ( *.*) The router maps remote addresses for each connection you make from within your home network
33 NAT = Network Address Translation Clipart:
34
35 Peering into the Internet Most systems have a command that will reveal the route taken across the internet (traceroute on Mac and tracert on Windows) Each IP packet has a field called Time to Live - TTL The TTL is used to deal with loops in the network - normally if routers got confused and ended up with a loop - the network would clog up rapidly. To: *.* Clipart:
36 How Traceroute Works Normal packets are sent with a Time to Live (TTL) of 255 hops Trace route sends a packet with TTL=1, TTL=2,... So each packet gets part-way there and then gets dropped and traceroute gets a notification of where the drop happens This builds a map of the nodes that a packet visits when crossing the Internet.
37 Traceroute $ traceroute to www5.stanford.edu ( ), 64 hops max, 40 byte packets ( ) ms ms ms 2 v-bin-seb.r-bin seb.umnet.umich.edu ( ) ms ms ms 3 v-bin-seb-i2-aa.meritaa2.umnet.umich.edu ( ) ms ms ms ( ) ms ms ms 5 so rtr.kans.net.internet2.edu ( ms ms ms 6 so rtr.hous.net.internet2.edu ( ) ms ms ms 7 so rtr.losa.net.internet2.edu ( ) ms ms ms 8 hpr-lax-hpr--i2-newnet.cenic.net ( ) ms ms ms 9 svl-hpr--lax-hpr-10ge.cenic.net ( ) ms ms ms10 oak-hpr--svlhpr-10ge.cenic.net ( ) ms ms ms11 hpr-stan-ge--oak-hpr.cenic.n ( ) ms ms ms12 bbra-rtr.stanford.edu ( ) ms ms ms13 * * *14 www5.stanford.edu ( ) ms ms ms
38 Traceroute $ traceroute to ( ), 64 hops max, 40 byte packets ( ) ms ms ms 2 v-bin-seb.r-binseb.umnet.umich.edu ( ) ms ms ms 3 v-bin-seb-i2-aa.meritaa2.umnet.umich.edu ( ) ms ms ms 4 lt-0-3-0x1.eq-chi2.mich.net ( ) ms ms ms 5 xe-0-0-0x23.msu6.mich.net ( ) ms ms ms ( ) ms ms ms 7 cc-t1-ge1-23.net.msu.edu ( ) ms ms ms 8 * * *
39 Traceroute $ traceroute Warning: has multiple addresses; using traceroute to ( ), 64 hops max, 40 byte packets ( ) ms ms ms 2 v-bin-seb.r-binseb.umnet.umich.edu ( ) ms ms ms 3 v-bin-seb-i2-aa.meritaa2.umnet.umich.edu ( ) ms ms ms ( ) ms ms ms ( ) Michigan ms ms ms ( ) ms ms Tennessee ms ( ) ms ms ms ( ) m ( ) ms ( ) ms ms ms ( ) ms ms Seoul ms ( ) ms ms ms ( ) ms ms ms Beijing
40 The perfect is the enemy of the good Le mieux est l'ennemi du bien. --Voltaire IP Does: Best effort to get data across bunch of hops from one network to another network IP Does Not: Guarantee delivery - if things go bad - the data can vanish Best effort to keep track of the good and bad paths for traffic - tries to pick better paths when possible This makes it fast and scalable to very large networks - and ultimately reliable because it does not try to do too much
41 Domain Name System The Domain Name System convert user-friendly names, like to network-friendly IP addresses, like Source: Internet_Protocol_Suite
42 Domain Name System Numeric addresses like are great for Internet routers but lousy for people Each campus ends up with a lot of networks ( *.*, *) Sometimes (rarely) the IP address numbers get reorganized When servers physically move they need new IP addresses
43 DNS: Internet Address Book The Domain Name System is a big fast distributed database of Internet names to Internet phone numbers IP Addresses reflect technical geography read left to right like a phone number Domain names reflect organizational structure - read right to left like postal address 2455 North Qaud, Ann Arbor, MI 48109, USA, Earth
44 .org.edu.com.nl umich.edu si.umich.edu
45 Looking Up A Domain Name When a system sees a new domain name, it looks it up from its "closest" domain name server - this "close" domain name server is configured or handed out when the computer connects to the network If that DNS server does not know the answer, the server works its way up the tree and then back down to a server that knows the mapping. Then the local Domain Name server remembers the mapping so it only asks once per 24 hours (caching)
46 Getting your own.com or.org... You must choose an Internet Service Provider and get an account Choose a name that is not taken Can be harder than you think Pay roughly $10.00 per year
47 Internetwork Layer (IP) Application Layer Web, , File Transfer Transport Layer (TCP) Reliable Connections Internetwork Layer (IP) Simple, Scalable, Unreliable Link Layer (Ethernet, WiFi) Physical Connections
48 Transport Layer Application Layer Web, , File Transfer Transport Layer (TCP) Reliable Connections Transmission_Control_Protocol Internetwork Layer (IP) Simple, Scalable, Unreliable Link Layer (Ethernet, WiFi) Physical Connections
49 Review: The Magic of IP What it does - Tries to get one packet across a 5-20 of hops from one network to another network Keeps track of the good and bad paths for traffic - tries to pick better paths when possible But no guarantee of delivery - if things go bad - the data vanishes This makes it fast and scalable - and ultimately reliable because it does not try to do too "everything"
50 Internet Protocol So many links / hops So many routes Thinks can change dynamically and IP has to react (links up/ down) IP can drop packets Source: Internet_Protocol_Suite
51 Transport Protocol (TCP) Built on top of IP Assumes IP might lose some data In case data gets lost - we keep a copy of the data a we send until we get an acknowledgement If it takes too long - just send it again Source: Internet_Protocol_Suite
52 Sender Receiver Break Messages into Pieces
53 Sender Receiver Break Messages into Pieces
54 Sender Got 1 Where is 2?? Receiver Break Messages into Pieces
55 Sender Got 2 Receiver Break Messages into Pieces
56 Sender Got 4 Receiver Break Messages into Pieces
57 Sender Got 5 Receiver Break Messages into Pieces
58 Billions of computers connected to the internet; 100 thousands of routers. Hundreds of billions bytes of data enroute at any moment. Clipart: Storage of enroute data done at the edges only!
59 One (of many) Scary Problem(s) In 1987 as local campuses with 10 MBit networks were connected together using 56Kbit leased lines, things kind of fell apart At some point, when there was a little too much traffic, it all fell apart
60 Transport Protocol (TCP) The responsibility of the transport layer is to present a reliable endto-end pipe to the application Data either arrives in the proper order or the connection is closed TCP keeps buffers in the sending and destination system to keep data which has arrived out of order or to retransmit if necessary TCP provides individual connections between applications
61
62 Secure Sockets Layer (SSL) Security for TCP
63 v v
64 Packet Sniffing Clipart: Photo CC BY: karindalziel (flickr)
65 Transport Layer Security (TLS) Used to be called Secure Sockets Layer (SSL) Can view it as an extra layer between TCP and the application layer It is very difficult but not impossible to break this security - normal people do not have the necessary compute resources to break TLS Encrypting and decryption takes resources - so we use it for things when it is needed The IP and TCP are unaware whether data has been encrypted
66 Secure Application Protocols There are often secure and unencrypted application protocols Your browser tells you when using a secure connection - you should never type passwords into a non-secure connection Especially over wireless - especially at a security conference...
67 System to System TCP/IP Secure TCP/IP Your local connection (particularly when wireless) is your greatest exposure. Generally, the backbone of the Internet is pretty secure to prying eyes from generic baddies... Clipart: Photo CC BY: karindalziel (flickr)
68
69 Source:
70 Digital Certificates In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document which uses a digital sign ature to bind a public key with an identity information such as the name of a person or an organization, their address, and so forth. The certificate can be used to verify that a public key belongs to an individual.
71 Certificate Authority (CA) A certificate authority is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate. A CA is a trusted third party that is trusted by both the owner of the certificate and the party relying upon the certificate.
72
73 Your browser comes with certificates/public keys from some certificate authorities built in. Like Verisign.
74 v v
75 Application Layer Application Layer Web, , File Transfer Transport Layer (TCP) Reliable Connections Internetwork Layer (IP) Simple, Unreliable Link Layer (Ethernet, WiFi) Physical Connections
76 Quick Review Link layer: gets the data onto the link, and manages collisions on a single hop Internet layer: moves the data over one hop, trying to get it closer to its destination Transport layer: Assumes that the internet layer may lose data, so request retransmission when needed provides a nice reliable pipe from source to destination Source: Internet_Protocol_Suite
77 Application Protocol Since TCP gives us a reliable pipe, what to we want to do with the pipe? What problem do we want to solve? Mail World Wide Web Stream kitty videos Source: Internet_Protocol_Suite
78 Two Questions for the Application Layer Which application gets the data? Ports What are the rules for talking with that application? Protocols
79 Ports Like extensions in a phone number The IP address network number (the area code) gets to the LAN The IP address host number (the telephone number) gets you to the destination machine The port (the extension) gets you to a specific application
80 TCP, Ports, and Connections
81 Incoming 25 Login 23 blah blah blah blah Web Server Personal Mail Box Clipart: Please connect me to the secure web server (port 443) on
82 Common TCP Ports Telnet (23) - Login SSH (22) - Secure Login HTTP (80) HTTPS (443) - Secure SMTP (25) (Mail) IMAP (143/220/993) - Mail Retrieval
83 Application Protocols
84 Application Protocol Since TCP gives us a reliable pipe, what to we want to do with the pipe? What problem do we want to solve? Mail World Wide Web Stream kitty videos Source: Internet_Protocol_Suite
85 HTTP - Hypertext Transport Protocol The dominant Application Layer Protocol on the Internet Invented for the Web - to Retrieve HTML, Images, Documents etc Extended to be data in addition to documents - RSS, Web Services, etc.. Basic Concept - Make a Connection - Request a document - Retrieve the Document - Close the Connection
86 HTTP Request / Response Cycle Web Server HTTP Request HTTP Response Browser Internet Explorer, FireFox, Safari, etc. Source:
87 HTTP Request / Response Cycle GET /index.html Web Server HTTP HTTP Request Response Browser <head>.. </head> <body> <h1>welcome to my application</h1>... </body> Internet Explorer, FireFox, Safari, etc. Source:
88 Internet Standards The standards for all of the Internet protocols (inner workings) are developed by an organization Internet Engineering Task Force (IETF) Standards are called RFCs - Request for Comments Source:
89
90 Source:
91 Hacking HTTP Web Server Last login: Wed Oct 10 04:20:19 on ttyp2 si-csev-mbp:~ csev$ telnet 80 HTTP Request HTTP Response Trying Connected to Escape character is '^]'. GET <h1>the First Page</h1><p>If you like, you can switch to the <a href=" Page</a>.</p> Browser Port 80 is the non-encrypted HTTP port
92 Accurate Hacking in the Movies Matrix Reloaded Bourne Ultimatum Die Hard (scroll down for video) Or search YouTube for "Trinity hacking scene"
93 (scroll down for video) Or search YouTube for "Trinity hacking scene"
94 Application Layer Summary We start with a pipe abstraction - we can send and receive data on the same socket We can optionally add a security layer to TCP using SSL - Secure Socket Layer (aka TLS - Transport Layer Security) We use well known port numbers so that applications can find a particular application *within* a server such as a mail server, web service, etc
95 The Architecture of the Internet Application Layer Web, , File Transfer Transport Layer (TCP) Reliable Connections August 1972 Internetwork Layer (IP) Simple, Unreliable Link Layer (Ethernet, WiFi) Physical Connections
96 The Architecture of the Internet Application Layer Web, , File Transfer Transport Layer (TCP) Reliable Connections Internetwork Layer (IP) Simple, Unreliable Link Layer (Ethernet, WiFi) Physical Connections
97 Application Layer Web, , File Transfer Transport Layer (TCP) Reliable Connections Internetwork Layer (IP) Simple, Unreliable Link Layer (Ethernet, WiFi) Physical Connections
98 Application Layer Web, , File Transfer Transport Layer (TCP) Reliable Connections Internetwork Layer (IP) Simple, Unreliable Link Layer (Ethernet, WiFi) Physical Connections
99 The Internet: An Amazing Design Hundreds of millions of computers Thousands of routers inside the Internet Hundreds of millions of simultaneous connections Trillions of bytes of data moved per second around the world And it works
100 The Internet It is said that The Internet is the largest single engineering effort ever created by mankind It was created to work in an organic way - to repair itself and automatically adjust when parts fail No one part of the Internet knows all of the Internet (like life) It is never 100% up - but it seems up all the time
101
102 Additional Source Information xkcd, CC: BY-NC, Internet Protocol Suite Diagrams: Kbrose, Wikimedia Commons, CC:BY-SA, All your bases are belong to me: Karin Dalziel, Flickr, CC:BY, Internet Map: The Opte Project, Wikimedia Commons, CC:BY,
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Internet History. Charles Severance
Internet History Charles Severance Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License. http://creativecommons.org/licenses/by/3.0/.
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Using MIS 3e Chapter 6A Appendix
Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
Life of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Computer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol
Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers
Terminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
architecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Architecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
The OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
Connecting to and Setting Up a Network
Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
CITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
The OSI & Internet layering models
CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
CSCI 491-01 Topics: Internet Programming Fall 2008
CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
Computer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Ethernet and IP A slightly less introductory networking class. Drew Saunders Networking Systems Stanford University
Ethernet and IP A slightly less introductory networking class Drew Saunders Networking Systems Stanford University Goals of Class Slightly more in-depth knowledge of Ethernet. Internet Protocol, TCP, UDP,
Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Chapter 1 Computer Networks and the Internet
CSF531 Advanced Computer Networks 高 等 電 腦 網 路 Chapter 1 Computer Networks and the Internet 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Access networks
The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
Intrusion Detection, Packet Sniffing
Intrusion Detection, Packet Sniffing By : Eng. Ayman Amaireh Supervisor :Dr.: Lo'ai Tawalbeh New York Institute of Technology (NYIT)- Jordan s s campus-2006 12/2/2006 eng Ayman 1 What is a "packet sniffer"?
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
The Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So
The Internet CCST9015 Feb 6, 2013 What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Charging for Internet One is charging for speed (How fast the
Computer Networks III
Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router
Computer Networks CCNA Module 1
Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
Data Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0
Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Layered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40
CMSI 182 Intro to Computer Science Week 13 Tuesday B.J. Johnson Doolan 222 09:25 10:40 Where We Are: History Lesson We re here! I/O Peripherals Internet Architecture RAM/ROM Applications O/S Programs Languages
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
CISC 1600 Introduction to Multi-media Computing
CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: [email protected] http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html
Internet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.
Transition Networks White Paper Why Authentication Matters YOUR NETWORK. OUR CONNECTION. : Why Authentication Matters For most organizations physical security is a given. Whether it is video surveillance,
The Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
SSL Guide. (Secure Socket Layer)
SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Structure and Performance of Open Access Networks Case Lappeenranta Model
Structure and Performance of Open Access Networks Case Lappeenranta Model M.Juutilainen, T.Lapinlampi, J.Ikonen and J.Porras Paper Title Laboratory of Communications Engineering, Lappeenranta University
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Chapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
