CSE 3214: Computer Network Protocols and Applications



Similar documents
CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Overview of TCP/IP. TCP/IP and Internet

How To Understand And Understand Network Theory

Communication Networks MAP-TELE 2012/13

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Computer Networks and the Internet

CISC 1600 Introduction to Multi-media Computing

IT4405 Computer Networks (Compulsory)

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

CDA Introduction to Computer Networks

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Transport and Network Layer

IT Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture

CS 5480 Computer Networks

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Computer Networks CS321

10CS64: COMPUTER NETWORKS - II

CSE 473s Introduction to Computer Networks

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Enterprise Edge Communications Manager. Data Capabilities

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

CSCD 330 Network Programming Winter Lecture 1 - Course Details

Address Resolution Protocol (ARP)

Computer Networking Networks

Communications and Computer Networks

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Architecture and Performance of the Internet

Introduction to Network Security Lab 1 - Wireshark

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Chapter 5. Data Communication And Internet Technology

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Internet structure: network of networks

CSC4290: Introduction to Computer Networking. Hongwei Zhang

Protocols. Packets. What's in an IP packet

Review: Lecture 1 - Internet History

Lab VI Capturing and monitoring the network traffic

Layered Architectures and Applications

SSVP SIP School VoIP Professional Certification

Computer Network Architecture

You will work in groups of two on the labs. It is OK to talk to others and help each other in the lab.

50 Cragwood Rd, Suite 350 South Plainfield, NJ Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724

CPSC 4550 Computer Networks Fall 2012, Section 0

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

COMP416 Lab (1) Wireshark I. 23 September 2013

Network Simulation Traffic, Paths and Impairment

CSCI Topics: Internet Programming Fall 2008

The Internet. Internet Technologies and Applications

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Data Communication Networks Introduction

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

SSVVP SIP School VVoIP Professional Certification

Multi-Homing Dual WAN Firewall Router

Introduction to Networks and the Internet

Network Models OSI vs. TCP/IP

UPPER LAYER SWITCHING

Load Balance Router R258V

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Introduction to computer networks and Cloud Computing

Internet Routing. Review of Networking Principles

Computer Networks III

M3-R3: INTERNET AND WEB DESIGN

BASIC ANALYSIS OF TCP/IP NETWORKS

L4: ISPs, Backbones and Peering

Linux Network Security

Kick starting science...

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Internet Protocol: IP packet headers. vendredi 18 octobre 13

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

ISOM3380 Advanced Network Management. Spring Course Description

Networking 4 Voice and Video over IP (VVoIP)

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Network Layer: Network Layer and IP Protocol

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

City University of Hong Kong. Information on a Course offered by Department of Information Systems with effect from Semester B in 2013 / 2014

Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

CSE 123b Communications Software

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Unix System Administration

Lecture 28: Internet Protocols

Network Security TCP/IP Refresher

Tele3119 Trusted Networks Course Outline 2013

Transcription:

CSE 3214: Computer Network Protocols and Applications 1 Course Web-Page: Instructor: http://www.eecs.yorku.ca/course/3214/ (all lecture notes will be posted on this page) Natalija Vlajic (vlajic@cse.yorku.ca) Office Hours: TR 13:00-14:00 (CSB 2047) Prerequisite: General Prerequisite + CSE 3213. The course assumes prior knowledge of Java programming. Textbook: Computer Networking: A Top-Down Approach Featuring the Internet", J. F. Kurose and K. W. Ross, Addison Wesley, 2013, 6 th edition. Network Simulation Experiments Manual, E. Aboelela, Morgan Kaufmann, 2012, 3 rd edition. Other Material: TCP/IP Guide, http://www.tcpipguide.com/free/t_toc.htm

Software Tools: Riverbed Modeler available in CSE 2007 Wireshark 2 Grading Scheme: Midterm: 35% February 23!!! Final: 40% 4 Labs: 16% Riverbed Modeler Project: 9% Java Socket Programming Late Assignments: Missed Midterm: Course Objective: Late lab reports will not be accepted, unless a prior arrangement is made with the instructor. Makeups of missed midterm exams are only possible in case of medical emergencies!!! The course will cover more advanced topics in networking, concentrating on higher-level protocols, network programming and application, multimedia, security. It complements and builds upon the material covered in CSE 3213.

3

Course Schedule: Network Taxonomy, Packet vs. Circuit Switching Layers and Protocols --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Queuing Fundamentals, Packet Delay Network Layer and IP Protocol (IPv6) IP Addressing and NAT ARP ICMP Routing Algorithms (Link State, Distance Vector) 4 Routing Protocols (RIP, OSPF, BGR) Multicasting & IGMP --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Transport Layer, UDP, TCP TCP Flow, Error and Congestion Control Java Socket Programming --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- DHCP DNS HTTP Electronic Mail FTP Telnet P2P Network Security Multimedia and QoS

https://www.youtube.com/watch?v=i5oe63pohli 5

The Internet 6 The Internet most notable datagram packet-switching WAN evolved from the ARPANET (network of computers operated by several universities doing military research) initially developed in 1969 component networks differ in terms of their underlying technology and operation spread over 200 countries made up of 100,000s of interconnected networks, 10,000,000s of interconnected hosts, and 100,000,000s of users still grows exponentially Internet Service Provider () Internet Access Provider allows users or other networks to connect to the Internet 3-tiered hierarchy of interconnected s keeps the Internet together lower-tier s provide access to home users through dial-up, cable, DSL, high-speed LANs, etc. upper-tier s provide access to lower-tier s they consist of high-speed routers and high- -speed fiber-optic links

7

The Internet (cont.) 8 3-tiered Hierarchy of s Tier-1: International / National s Tier-2: Regional s Tier-3: Local s Tier 3 Tier-2 Tier-2 Tier-2 Tier-2 NAP Tier-2

The Internet (cont.) 9 International Internet backbone network one of the networks at the top of -hierarchy has international coverage (e.g. Cogent, MCI, Sprint, AT&T, UUNet) look similar to any other network (links + routers), but link speeds up to 100 Gbps range - routers must be able to forward packets at extremely high rates directly connect to each of the other tier-1 s; also connect to a large number of tier-2 s and other customer networks NAP set of high-speed routers through which routers from different tier-1 can exchange traffic NAP can be owned and operated by a third-party telecom company or by an Internet backbone provider tier-1 providers interconnect (peer) privately through private switching stations called peering points NAP tier-1 providers also interconnect at public network access points (NAPs)

Delay and Routes in the Internet (cont.) 10 Example [ Cogent Network Map ] Cogent's international IP network is the largest in the world and is scalable to a total capacity of over one Terabit.

The Internet (cont.) 11 Regional smaller that connects to one or more tier-1 s and possibly other tier-2 s have national coverage (e.g. Bell, Rogers) to reach the global Internet, a tier-2 needs to connect to and route traffic through one of the tier-1 tier-2 is customer, tier-1 is provider provider charges customer a fee a tier-2 can also connect directly to other tier-2 network without having to pass through a tier-1 network some tier-1 are also tier-2 providers, selling Internet access directly to end users (e.g. Sprint, AT&T, ) Tier-2 pays tier-1 for connectivity to rest of Internet Tier-2 Tier-2 NAP Tier-2 Tier-2 s also peer privately with each other, interconnect at NAP Tier-2 Tier-2

The Internet (cont.) 12 Local small that connects to the Internet via one or more tier-2 s and provides access to end users can be (1) company that just provides Internet service (2) corporation that supplies service to its own employees (3) college or university that runs its own network tier-3 s are customers of higher tier s Connecting them to rest of Internet Tier 3 Tier-2 Tier-2 Tier-2 NAP Tier-2 Tier-2

The Internet (cont.) 13 Packet Routing in the Internet each packet passes through many networks before reaching its destination Tier 3 Tier-2 Tier-2 Tier-2 Tier-2 Tier-2

The Internet (cont.) 14 Internet Exchange Point (IXP / IX) physical infrastructure through which different IP networks (, CDN, etc.) exchange traffic directly key advantages: networks interconnect directly rather than through one or more 3 rd party networks (lower cost and latency)

The main building of the London Internet Exchange (LINX) 15

https://cira.ca/canadian_ixp 16

Wireshark 17

Network Monitoring & Protocol Analysis 18 Network Monitoring & Protocol Analysis process of capturing network traffic and inspecting it closely to determine type and amount of data: a) traveling through your network, or b) arriving at your computer network/protocol analysis is also known as sniffing Network Analyzer standalone hardware device or software installed on (Packet Sniffer) a computer decodes data packets of common protocols and displays their content in human- readable format network analyzers are either free and commercial differences between network analyzers include: a) number of supported protocol decodes b) quality of packet decodes c) user interface d) graphing and statistical capabilities

Network Monitoring & Protocol Analysis (cont.) 19 Network Analyzer Application: 1) As an educational resource when learning about protocols. 2) Analyzing operations of applications & protocols they rely on. 3) Debugging in development stage of network programming. 4) Network intrusion detection. 5) Monitoring 3 rd party traffic to steal data or learn more about their network. Common Network Analyzer: Wireshark freeware runs on Windows, Linux, Mac, etc. decodes hundreds of protocols nice GUI Snort, WinDump / TcpDump, Dsniff, etc.