Review: Lecture 1 - Internet History

Similar documents
Transport and Network Layer

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Encapsulating Voice in IP Packets

Network Simulation Traffic, Paths and Impairment

Voice over IP. Presentation Outline. Objectives

User Datagram Protocol - Wikipedia, the free encyclopedia

Introduction to IP v6

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

EE4607 Session Initiation Protocol

EXPLORER. TFT Filter CONFIGURATION

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Overview of Voice Over Internet Protocol

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Advanced Internetworking

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

SSVVP SIP School VVoIP Professional Certification

Internetworking and IP Address

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Networking 4 Voice and Video over IP (VVoIP)

TCP/IP Protocol Suite. Marshal Miller Chris Chase

10CS64: COMPUTER NETWORKS - II

Multimedia Communications Voice over IP

Protocols. Packets. What's in an IP packet

IP-Telephony Real-Time & Multimedia Protocols

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Internet Protocol: IP packet headers. vendredi 18 octobre 13

ICTTEN8195B Evaluate and apply network security

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Computer Networks/DV2 Lab

Lecture Computer Networks

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

UPPER LAYER SWITCHING

Personal Firewall Default Rules and Components

ITL BULLETIN FOR JANUARY 2011

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

8.2 The Internet Protocol

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

VOICE OVER IP AND NETWORK CONVERGENCE

Network Layer: and Multicasting Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Applications that Benefit from IPv6

IP address format: Dotted decimal notation:

Traditional Telephony IP Telephony Voice, Data, Video Integration. Media Convergence. IP Router Server IP Router. Video Distribution Fax

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

VOICE OVER IP SECURITY

VoIP with SIP. Session Initiation Protocol RFC-3261/RFC

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

TECHNICAL CHALLENGES OF VoIP BYPASS

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

VegaStream Information Note Considerations for a VoIP installation

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

Network Programming TDC 561

Enhancements to Collaborative Media Streaming with IETF Protocols

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

EDA Training Programs. Catalog of Course Descriptions

Computer Networks. Secure Systems

An Introduction to VoIP Protocols

Ethernet. Ethernet. Network Devices

Application Note. Onsight Connect Network Requirements V6.1

Hands on VoIP. Content. Tel +44 (0) Introduction

BroadCloud PBX Customer Minimum Requirements

Final for ECE374 05/06/13 Solution!!

TLS and SRTP for Skype Connect. Technical Datasheet

Guideline for setting up a functional VPN

SIP : Session Initiation Protocol

Basic Vulnerability Issues for SIP Security

Chapter 11. User Datagram Protocol (UDP)

How do I get to

About the Technical Reviewers

ETM System SIP Trunk Support Technical Discussion

Technical Support Information Belkin internal use only

VoIP Analysis Fundamentals with Wireshark. Phill Shade (Forensic Engineer Merlion s Keep Consulting)

Chapter 3 LAN Configuration

TSIN02 - Internetworking

Requirements of Voice in an IP Internetwork

Session Border Controller

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

Lesson: TANDBERG and IP

Nortel Technology Standards and Protocol for IP Telephony Solutions

VoIP QoS. Version 1.0. September 4, AdvancedVoIP.com. Phone:

Glossary of Terms and Acronyms for Videoconferencing

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

Secure VoIP Transmission through VPN Utilization

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Unit 23. RTP, VoIP. Shyam Parekh

How To Design A Layered Network In A Computer Network

Firewalls und IPv6 worauf Sie achten müssen!

Transcription:

Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1

Review: Lecture 1 - Administration 2

Review: Lecture 1 - Standards TSIN02 - Internetworking Protocol specifications are entered into the so called standards track and goes through a set of maturity levels: Proposed, Draft, and Internet Standards, and Historic Internet drafts become RFCs when entered into the standards track. 3

Review: Lecture 2 - Network layer The network layer provides source to destination delivery of packets (across multiple networks) logical addressing routing 4

Review: Lecture 2 - Layer 3 Protocols ARP, RARP - converts physical addresses to logical and vice versa IP - an unreliable and connectionless datagram protocol. IPv4 vs IPv6 address space - header format fragmentation - new options security - resource allocation ICMP - a protocol for error reports and querys ICMPv6 incorporates ARP, RARP and IGMP 5

Review: Lecture 3 - Multicast TSIN02 - Internetworking One- to- many TV over IP Massive file distribution Many- to- many Video conferencing Many- to- one Send messages to a server with unknown IP# using a well- known multicast address. Example: locating servers (DHCP, SIP, MADCAP etc) 6

IGMP Internet Group Management Protocol Just for group membership communication between a host and a router Has nothing to do with multicast routing Keeps an updated list of active group listeners for each connected LAN. Simplistic network layer service. No address management, no session management, no reliable data delivery, no security support, no synchronism IGMP ICMP IP ARP RARP 7

IGMP versions Version 1: Just two message types: Host Membership Query Host Membership Report Version 2: Added the message type Leave Report This message is essential for decreasing zaptimes when connection only has room for one stream Version 3: Added support for source specific multicast A group is identified with a pair (S,G) where S is the sender IP# and G a normal multicast address. 8

Review Lecture 4 - Transport layer The transport layer provides process- to- process communication control mechanisms UDP - connectionless and unreliable transport TCP connection- oriented and reliable Stream delivery - Options Flow control - Congestion Control Error Control - Timers 9

Review Lecture 5 - Security Security aspects - Privacy, Authentication, Integrity and Non- repudiation Cryptography Secret (symmetric) Keys vs Public (asymmetric) Keys Hash Functions vs Digital Signatures Key Distribution IPsec, TLS, PGP, GPG, SSH Firewalls - packet filtering vs proxy Private and virtual private networks 10

Review: Lecture 6 - Autoconfiguration How to configure IP#, netmask and gateway? RARP BOOTP DHCP Zero- configuration of link- local addresses (i.e., no global route) an expired draft captures current behavior of Windows and Mac. DHCPv6 simplified and secure version of DHCPv4 IPv6 may use stateless address autoconfiguration Part of address constructed from hardware address. The other part from a prefix broadcast by IPv6 router 11

Service Discovery Two methods identified SLP Service Location Protocol Quite complex. May use a directory service DNS SRV Resource Record Create special host entries in the DNS database. Example host name:. _smtp._tcp It is unclear if these mechanisms have a future. They compete with many other protocols such as MS Active Directory, CORBA and UPnP (Universal Plug and Play) 12

Review: Lecture 7 - Real- time Streaming A real- time communication scenario needs to solve the following issues: Packet loss. Arrival jitter Sender/receiver synchronization Handling packet loss the TCP way might be unwanted due to that TCP leaves no firm guarantees on the delay time. Only QoS- mechanisms can solve this. Arrival jitter is solved by using a receiver buffer. Synchronization can be solved in various ways:(implicit, Global, Point- to- point) 13

RTP and RTCP TSIN02 - Internetworking Real- time protocol and Real- time Control Protocol works in tandem to Send one type of media to a receiver or group of receivers Convey timing information for point- to- point or global synchronization Uniquely identify a source regardless of underlying packet forwarding service (typically UDP) Convey upstream information about traffic situation in a scaleable manner (I.e., scale down control traffic when number of receivers increase) 14

SDP & RTSP SDP Session Description Protocol Really a data format describing associated media and how and when they will be transmitted. (E.g., multicast addresses, payload formats and port numbers) RTSP Real- time Streaming Protocol The Internet VCR Remote control protocol Works very much like HTTP. Uses SDP- data to answer DESCRIBE- requests. Fine- grained control over media. E.g. Audio and video can be referred by separate URL:s and may need separate setup to stream in synchronization. 15

Review Lecture 8 - Voice over IP TSIN02 - Internetworking Voice over IP requirements Signaling protocols: locate users, set up modify and tear down calls. Media transport protocols for transmission och packetised audio/video Supporting protocols for QoS, Security etc. SIP - IETF standard for session handling H.323 - ITU standard for session handling Megaco - joint venture between IETF and ITU 16

Review Lecture 9 - Mobile IP TSIN02 - Internetworking Home and Care- of Addresses Home and Foreign Agents Setting up communication from a foreign network discover agents register with agents transfer data Routing inefficiency MIPv4 vs MIPv6 17

Review Lecture 10 - SNMP TSIN02 - Internetworking A framework for managing devices in an internet. Agents and Managers A protocol for carrying management information request - response uses connectionsless services (UDP) SMI MIB 18

Review Lecture 11 - SCTP TSIN02 - Internetworking A new transport layer protocol connection- oriented and reliable supports multiple streams supports multihoming developed with ip telephony in mind 19

Review Lecture 11 - AAA TSIN02 - Internetworking Authentication Authorization Accounting (Auditing) Suggested protocol: DIAMETER 20

Review Lecture 12: The Future Some hot topics are: SIP Mobile IP SCTP Security Multimedia transport Ad Hoc Networking TSIN02 - Internetworking 21

Ad Hoc Networks TSIN02 - Internetworking Ad Hoc Networks are about building a network without one or more of the following: Routing infrastructure Server infrastructure Administrative infrastructure The protocols that are suitable in an Ad Hoc network depend on whether The network is spontaneous or planned The network is localized or distributed The participating nodes are uniform or diverse in capabilities The network will be for short or long term 22

Key Management in Ad hoc Networks Usually a trusted third party is part of a key management scheme. Here we cannot rely on only one node performing these tasks. Some proposed solutions are: Partially distributed certificate authority Fully distributed certificate authority Self issued certificates Secure pebblenets Demonstrative identifikation Password authenticated key exchange 23

Internetworking The art and science of connecting individual localarea networks (LANs) to create wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely complex because it generally involves connecting networks that use different protocols. Internetworking is accomplished with routers, bridges, and gateways. from the Webopedia Computer Dictionary 24