Layered protocol (service) architecture



Similar documents
Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Kick starting science...

How To Understand The Internet Of S (Netware)

Overview: Internet vs Data Center Networks

TCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)

Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

Internet architecture is very scalable. Thailand Statistics

Protocoles internet. Carole Delporte paris- diderot.fr Introduc8on. C. Delporte M2- Internet 1

The OSI and TCP/IP Models. Lesson 2

Network Security Engineering: Introduction

Internet and IP addressing

Computer Networks CS321

Course book: Computer Networking. Computer Networks 3 rd edition. By Andrew ST S.Tanenbaum. Top Down approach 3 rd edition.

Computer Networks & Security 2014/2015

Internet structure: network of networks

Network Overview. The network edge: The network edge: Internet Services Models. The network edge: A closer look at network structure:

CompTIA Network+ (Exam N10-005)

The OSI & Internet layering models

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Chapter 1 Computer Networks and the Internet

Computer Networks and the Internet

Protocols. Packets. What's in an IP packet

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Chapter 5. Data Communication And Internet Technology

What is Network Latency and Why Does It Matter?

Introduction to computer networks and Cloud Computing

CSCI 362 Computer and Network Security

Chapter 9. IP Secure

Computer Networks Vs. Distributed Systems

Chapter 1 Introduction

Overview of Computer Networks

What s the Internet. routers: forward packets (chunks of data) millions of connected computing devices: hosts = end systems

Data Communication Networks and Converged Networks

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Advanced Higher Computing. Computer Networks. Homework Sheets

CSCI Topics: Internet Programming Fall 2008

CPS221 Lecture: Layered Network Architecture

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Introduction to Computer Networks

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Network Edge and Network Core

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Chapter 8 Security Pt 2

UPPER LAYER SWITCHING

CSE 3461 / 5461: Computer Networking & Internet Technologies

Layered Architectures and Applications

Computer Network Architecture

Telecommunications, Networks, and Wireless Computing

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

How To Understand The Layered Architecture Of A Network

COSC 472 Network Security

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:

COMPUTER NETWORK TECHNOLOGY (300)

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Cisco Data Center Network Solutions Sales Exam.

How To Understand The Internet From A Telephone To A Computer (For A Computer)

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Communication Networks. MAP-TELE 2011/12 José Ruela

IT Data Communication and Networks (Optional)

Page 1 of 7. Computer Networking

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Transport and Network Layer

CISC 1600 Introduction to Multi-media Computing

Post-Class Quiz: Telecommunication & Network Security Domain

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Protocol Data Units and Encapsulation

Own your LAN with Arp Poison Routing

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Introduction. Chapter 1 Introduction. CS 3516 Computer Networks. Chapter 1: Roadmap. Chapter 1: Introduction. Cool Internet Appliances

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Technical Support Information Belkin internal use only

VLAN und MPLS, Firewall und NAT,

Overview of TCP/IP. TCP/IP and Internet

Networking for Caribbean Development

Course on Computer Communication and Networks. Lecture 1 & part of lecture 2 Chapter 1: Introduction

Introduction to Computer

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

Internet Concepts. What is a Network?

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Ohio Supercomputer Center

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

LESSON Networking Fundamentals. Understand TCP/IP

IT4405 Computer Networks (Compulsory)

Security vulnerabilities in the Internet and possible solutions

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Lecture 28: Internet Protocols

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Lab VI Capturing and monitoring the network traffic

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Transcription:

Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure of the Internet a so-called network (service) architecture? 31

Analogy 1: Organization of air travel ticket (purchase) baggage (check) gates (load) runway takeoff ticket (complain) baggage (claim) gates (unload) runway landing airplane routing airplane routing airplane routing Structured into a series of steps on both ends 32

Layering of airline functionality ticket (purchase) baggage (check) gates (load) runway (takeoff) ticket (complain) baggage (claim gates (unload) runway (land) ticket baggage gate takeoff/landing airplane routing airplane routing airplane routing airplane routing airplane routing departure airport intermediate air-traffic control centers arrival airport Layers: each layer implements a service via its own internal-layer actions relying on services provided by layer below 33

Analogy 2: The philosopher-translator-secretary architecture 34

Why layering? Dealing with complex systems: explicit structure allows identification and relationship of complex system s pieces layered reference model modularization eases maintenance and updating of system change of implementation of layer s service transparent to rest of system 35

Network Architecture: A set of layers and protocols 36

Internet (TCP/IP) protocol stack application: supporting network applications FTP, STP, HTTP transport: process-process data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements PPP, Ethernet physical: bits on the wire application transport network link physical 37

ISO/OSI reference model presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine-specific conventions session: synchronization, checkpointing, recovery of data exchange Internet stack missing these layers! these services, if needed, must be implemented in application needed? application presentation session transport network link physical 38

message segment datagram frame Physical path data takes and the concept of Encapsulation H t H n H t H l H n H t source application transport network link physical link physical switch H l H n H n H t H t H t destination application transport network link physical network link physical H l H n H n H t H t H n H t router 39

Network Security attacks on Internet infrastructure: infecting/attacking hosts: malware, spyware, worms, unauthorized access (data stealing, user accounts) denial of service: deny access to resources (servers, link bandwidth) Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers! 40

What can bad guys do: malware? Spyware: infection by downloading web page with spyware records keystrokes, web sites visited, upload info to collection site Virus infection by receiving object (e.g., e-mail attachment), actively executing self-replicating: propagate itself to other hosts, users Worm: infection by passively receiving object that gets itself executed self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data) 41

Denial of service attacks attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see malware) 3. send packets toward target from compromised hosts target 42

Sniff, modify, delete your packets Packet sniffing: broadcast media (shared Ethernet, wireless) network interface reads/records all packets (e.g., including passwords!) passing by A C src:b dest:a payload B - needs confidentiality measures 43

asquerade as you IP spoofing: send packet with false source address A C src:b dest:a payload B - needs authentication measures 44

Internet History (1) 1983: deployment of TCP/IP 1982: smtp e-mail protocol defined 1983: DNS defined for name-to-ip address translation 1985: ftp protocol defined 1988: TCP congestion control 100,000 hosts connected to confederation of networks 45

Internet History (2) Internet Explosion: commercialization, the Web, new apps early 1990s: Web hypertext [Bush 1945, Nelson 1960 s] HTL, HTTP: Berners-Lee browsers: pioneered by osaic (1994), later Netscape late 1990 s: commercialization of the Web (Internet commerce) Late 1990 s 2000 s: more killer apps: instant messaging (pioneered by ICQ), P2P P3 file sharing (pioneered by Napster) network security to forefront est. 50 million hosts, 100 million+ users backbone links running at Gbps 46

Internet History (3) 2007: ~500 million hosts Voice, Video over IP P2P applications: BitTorrent (file distribution), Skype (VoIP), PPLive (television over IP) more applications: YouTube (video sharing), gaming high-speed wireless networks 47

Introduction: Summary Covered a ton of material! Overview of Internet structure What are its main components? what s a protocol? network edge, core, access network packet-switching versus circuit-switching Topics central to the field of computer networking: performance: loss, delay, throughput layered reference models security Brief history You now have hopefully: context, overview, feel of networking 48

TCP/IP reference model (Internet architecture) The Internet protocol stack and the respective protocol data units (PDUs): The physical layer is not addressed further. It deals with transmitting raw bits over a physical transmission medium. The delivered service at the interface to the upper layer must ensure that sending a bit 1 at one side will result in receiving bit 1 at the other side. To do so, it must reflect the specific properties of the medium. Examples for transmission media: wired: magnetic media, twisted pair, coaxial cable, fiber optics wireless: electromagnetic spectrum, radio- micro-, infrared waves 49