How To Understand The Internet Of S (Netware)



Similar documents
Layered protocol (service) architecture

TCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1

Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)

Internet architecture is very scalable. Thailand Statistics

Overview: Internet vs Data Center Networks

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media

Computer Network Architecture

CPS221 Lecture: Layered Network Architecture

Data Communication Networks and Converged Networks

The OSI and TCP/IP Models. Lesson 2

Overview of Computer Networks

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

LESSON Networking Fundamentals. Understand TCP/IP

Computer Networks & Security 2014/2015

What s the Internet. routers: forward packets (chunks of data) millions of connected computing devices: hosts = end systems

Course book: Computer Networking. Computer Networks 3 rd edition. By Andrew ST S.Tanenbaum. Top Down approach 3 rd edition.

Lecture 28: Internet Protocols

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Network Overview. The network edge: The network edge: Internet Services Models. The network edge: A closer look at network structure:

Protocols. Packets. What's in an IP packet

Transport and Network Layer

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Communications and Computer Networks

Computer Networks CS321

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

How To Design A Layered Network In A Computer Network

Objectives of Lecture. Network Architecture. Protocols. Contents

PART OF THE PICTURE: The TCP/IP Communications Architecture

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

CSE 3461 / 5461: Computer Networking & Internet Technologies

Introduction to computer networks and Cloud Computing

Protocols and Architecture. Protocol Architecture.

Using MIS 3e Chapter 6A Appendix

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Address Resolution Protocol (ARP)

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

How Does Ping Really Work?

Chapter 11. User Datagram Protocol (UDP)

Layered Architectures and Applications

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Final for ECE374 05/06/13 Solution!!

How do I get to

Ethernet. Ethernet. Network Devices

Lab 1: Packet Sniffing and Wireshark

The Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So

CS335 Sample Questions for Exam #2

The OSI & Internet layering models

Chapter 9. IP Secure

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Technical Support Information Belkin internal use only

Internet Concepts. What is a Network?

Architecture and Performance of the Internet

Network Programming TDC 561

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Overview of TCP/IP. TCP/IP and Internet

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

THE TCP/IP PROTOCOL SUITE

Network Models OSI vs. TCP/IP

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Ethereal: Getting Started

CS101 Lecture 19: Internetworking. What You ll Learn Today

Introduction to Computer Networks

1 Introduction to mobile telecommunications

Wireless Encryption Protection

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Chapter 5. Data Communication And Internet Technology

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Data Communications and Networks IS 450/IS 650 Fall Course Logistics

Chapter 2 - The TCP/IP and OSI Networking Models

Cisco Configuring Commonly Used IP ACLs

Configuring Network Address Translation (NAT)

Introduction to Network Security Lab 1 - Wireshark

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Network Layers. CSC358 - Introduction to Computer Networks

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

UPPER LAYER SWITCHING

Distributed Systems Interconnec=ng Them Fundamentals of Distributed Systems Alvaro A A Fernandes School of Computer Science University of Manchester

Business Data Communications & IT Infrastructures, 2 nd Edition

CISC 1600 Introduction to Multi-media Computing

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

Networking Test 4 Study Guide

Internet Security Firewalls

12. Firewalls Content

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Networking Basics and Network Security

CompTIA Network+ (Exam N10-005)

Computer Networks - Xarxes de Computadors

Transcription:

Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation

Overview of Computer s Our Goal: Get feel and terminology Focus on the Internet What is the Internet? What is the Protocol? Layered Architecture. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 2

Overview of Computer s Our Goal: Get feel and terminology Focus on the Internet What is the Internet? What is the Protocol? Security Layered Architecture. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 3

What is the Internet Millions of connected computing devices: End systems / Hosts (Running Net Apps) Communication s (Wired or Wireless) mobile network home network global ISP regional ISP Routers and Switches (Forward Packets ) institutional network Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 4

What is the Internet of s ISPs Institutional s Home s Mobile s mobile network home network global ISP regional ISP Internet Protocols: Control Sending & Receiving of Messages E.g.: TCP, IP, HTTP, 802.11 institutional network Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 5

What is a Protocol? Human Protocol: What time is it?, I have a question., Protocols: Machines instead of humans. Protocols define format and order of messages sent and received among network entities, and actions taken on message transmission and message receipt. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 6

What is a Protocol? Protocol define the interaction sequences over time: Hi Hi Got the time? 2:00 Time TCP connection request TCP connection response Get http://www.awl.com/kurose-ross <file> Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 7

Protocol Layers s are complex with many pieces : Hosts Routers Wired s Wireless s s Protocols Hardware Software Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 8

Protocol Layers s are complex with many pieces : Hosts Routers Wired s Wireless s s Protocols Hardware Software Q: How can we organize the structure of networks? Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 9

Example: Organization of Air Travel A series of steps are taken at different layers : ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 10

Example: Organization of Air Travel Each layer implements a service : Via its own internal-layer actions. ticket (purchase) ticket (complain) ticket baggage (check) baggage (claim baggage gates (load) gates (unload) gate runway (takeoff) runway (land) takeoff/landing airplane routing airplane routing airplane routing airplane routing airplane routing departure airport intermediate air-traffic control centers arrival airport Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 11

Internet Protocol Stack There are five layers in Internet Protocol Stack with different functionalities and protocols. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 12

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 13

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 14

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 15

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 16

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP They all use TCP Protocol for reliable data transmission. (Socket Programming) (Each socket has a port #) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 17

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 18

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 19

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 20

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols : Routing from source to destination Ethernet, IEEE 802.11 (WiFi) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 21

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols : Routing from source to destination Ethernet, IEEE 802.11 (WiFi) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 22

Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols : Routing from source to destination Ethernet, IEEE 802.11 (WiFi) : Bit-by-bit transmission Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 23

Packets communications are essentially 0-1 bit streams: But we break down bit streams to small bit chunks = packets. The packet at each layer: Can have different names (frame, segment, etc.) Can have different sizes Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 24

Packets Message Segment Datagram Frame Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 25

Packet Headers Protocol at each layer adds its own headers for control data. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 26

Packet Headers Protocol at each layer adds its own headers for control data. Message Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 27

Packet Headers Protocol at each layer adds its own headers for control data. Segment Message H T Used by TCP and UDP Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 28

Packet Headers Protocol at each layer adds its own headers for control data. Datagram Message H T H N Used by IP, Routing Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 29

Packet Headers Protocol at each layer adds its own headers for control data. Used by Ethernet, Message H T H N H L Frame Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 30

What is Next? For the rest of this track we will cover: Part 2: Common Tools & Techniques in Security (Dr. Akbar Siami-Namin) Part 3: Cyber Security in the Internet Protocol Stack (Dr. Hamed Mohsenian-Rad) Part 4: Research and Education in Security (Dr. Rattikorn Hewett) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 31