Kick starting science...

Similar documents
Layered protocol (service) architecture

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

Network Security Engineering: Introduction

Computer Networks and the Internet

Protocoles internet. Carole Delporte paris- diderot.fr Introduc8on. C. Delporte M2- Internet 1

Chapter 8 Security Pt 2

Protocols. Packets. What's in an IP packet

CSCI Topics: Internet Programming Fall 2008

Introduction to computer networks and Cloud Computing

The Internet and Network Technologies

Internet and IP addressing

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Data Communication Networks and Converged Networks

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Lecture 28: Internet Protocols

Overview of TCP/IP. TCP/IP and Internet

Computer Networks & Security 2014/2015

Chapter 4: Networking and the Internet

DoS/DDoS Attacks and Protection on VoIP/UC

Network Security in Practice

TCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1

Chapter 1 Computer Networks and the Internet

The Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So

Architecture and Performance of the Internet

Ethernet. Ethernet. Network Devices

Chapter 5. Data Communication And Internet Technology

Computer Networks CS321

CMPT 471 Networking II

SSVVP SIP School VVoIP Professional Certification

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media

Computer Networks CCNA Module 1

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Protocol Data Units and Encapsulation

Address Resolution Protocol (ARP)

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren

Own your LAN with Arp Poison Routing

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Firewalls. Chapter 3

CISC 1600 Introduction to Multi-media Computing

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

CSCI 362 Computer and Network Security

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Course on Computer Communication and Networks. Lecture 1 & part of lecture 2 Chapter 1: Introduction

Chapter 8 Network Security

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Lab VI Capturing and monitoring the network traffic

COMPUTER NETWORK TECHNOLOGY (300)

Internet Concepts. What is a Network?

Networking 4 Voice and Video over IP (VVoIP)

Computer Networks Vs. Distributed Systems

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Introduction to Network Security Lab 1 - Wireshark

Denial of Service Attacks

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Introduction Chapter 1. Uses of Computer Networks

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Detailed Table of Contents

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS

Certified Ethical Hacker Exam Version Comparison. Version Comparison

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Solution of Exercise Sheet 5

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

How To Protect Your Network From Attack From A Hacker On A University Server

Firewalls, Tunnels, and Network Intrusion Detection

TDC s perspective on DDoS threats

Networking Basics and Network Security

LESSON Networking Fundamentals. Understand TCP/IP

Computer Networks - CS132/EECS148 - Spring

Objectives of Lecture. Network Architecture. Protocols. Contents

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Introduction to Computer Networks

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

SSVP SIP School VoIP Professional Certification

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

The OSI & Internet layering models

Network Edge and Network Core

Distributed Systems. 2. Application Layer

CSE 3461 / 5461: Computer Networking & Internet Technologies

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

The TCP/IP Reference Model

How do I get to

WAN Traffic Management with PowerLink Pro100

The OSI and TCP/IP Models. Lesson 2

Transport and Network Layer

Security vulnerabilities in the Internet and possible solutions

Chapter 9. IP Secure

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:

Transcription:

Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep going? well, cable into wall 1

What happens there? What happens there? Or maybe more realistically Work at company How do we build services that are Important problem faced every day by many companies, including Efficient Secure Reliable 1-12 2

In the computer part we will look at things such as How do we build scalable, efficient, secure, and reliable services? How do we communicate with a machine across the world? How do we find out who to talk to? How do we find a path? How do we avoid sending too much for the receiver and to handle? 3

What happens at our machine? Inside the? Along the path? What happens at our machine? Inside the? Along the path? Roadmap So let s start the lecture What is the Internet? Network Edge End systems, access s, s Network Core Packet switching, structure Protocol Layers, service models Network Security History Roadmap What s the Internet: Nuts and Bolts View What is the Internet? Network Edge End systems, access s, s Network Core Packet switching, structure Protocol Layers, service models Network Security History 4

What s the Internet: Nuts and Bolts View What s the Internet: Service View Today s service/company landscape include... Today s service/company landscape include... 1-27 1-28 Today s service/company landscape include... Today s service/company landscape include... Network operators Equipment manufacturers (also sell services and help Operate s) Equipment manufacturers (also sell services and help Operate s) 1-29 1-30 5

Today s service/company landscape include... Today s service/company landscape include... Content delivery s Enterprise solutions and service (e.g., data center solutions and cloud providers) 1-31 Enterprise solutions and service (e.g., data center solutions and cloud providers) 1-32 Today s service/company landscape include... End user services (e.g., web-based social s, search, communication, and streaming) 1-33 Some common s today World Wide Web (WWW) Remote login (telnet, rlogin, ssh) File transfer Peer-to-peer file sharing Cloud computing/services Instant messaging (chat, text messaging, etc.) Live and video-on-demand streaming Internet phone (Voice-Over-IP) Distributed games 34 and tomorrow Today s end hosts The 2020 vision Everything that can be connected will be connected 50B devices (perhaps more like 500B...) IoT and smart cities achine-to-machine High-definition 3D streaming to heterogeneous clients 35 6

and tomorrow s Internet of Things! Roadmap A Closer Look at Network Structure What is the Internet? Network Edge End systems, access s, s Network Core Packet switching, structure Protocol Layers, service models Network Security History Access Networks and Physical edia Access Net: Digital Subscriber Line (DSL) 7

Access Net: Cable Network Access Net: Home Network Enterprise Access Networks (Ethernet) Wireless Access Networks Host: Sends Packets of Data Physical edia 8

Physical edia: Radio Roadmap What is the Internet? Network Edge End systems, access s, s Network Core Packet switching, structure Protocol Layers, service models Network Security History The Network Core Packet-Switching: Store-and-forward Packet Switching: Queueing Delay, Loss Two Key Network Functions 9

Internet Structure: Network of Networks Internet Structure: Network of Networks Internet Structure: Network of Networks Internet Structure: Network of Networks Internet Structure: Network of Networks Internet Structure: Network of Networks Tier 1 ISPs IXP- 3rd party company sets up an exchange point where multiple ISPs can peer together (about 300 IXPs) Peering Link - all traffic between two ISPs travels through one direct connection 10

Internet Structure: Network of Networks Internet Structure: Network of Networks Internet Structure: Network of Networks Tier-1 ISP: Sprint Google private bypasses Google has over 50 data centers some with upper tiers by peering with lower tiers over 100,000 servers, all interconnected via directly Googles private TCP/IP POP: ISP to ISP connections Sets of routers in the provider s where customer ISPs can connect into provider ISP Roadmap What s a Protocol? What is the Internet? Network Edge End systems, access s, s Network Core Packet switching, structure Protocol Layers, service models Network Security History 11

What s a Protocol? What s a Protocol? A Human Protocol A Human Protocol A Computer Network Protocol What's a Protocol? Protocol Layers Problem Scenario ore Problems Web Email Bittorrent VoIP Bittorrent Bittorrent This is a nightmare scenario Huge amounts of work to add new apps or media Limits growth and adoption Application endpoints may not be on the same media Ethernet 802.11 Bluetooth Cellular Ethernet 802.11 12

Solution: Use Indirection Layers, Protocols, Interfaces Web Email Bittorrent VoIP API O(1) agical work to Network add new Abstraction apps, media Few API limits API on new Layer API technology Networks organized as a stack of layers Offer services to the layer above it using a welldefined interface (programming language analogy: libraries hide details while providing a service) Reduces design complexity Protocols: Logical horizontal conversations at any layer (between peers) Data Transfer: each layer passes data & control information over the interfaces (between neighboring layers) Ethernet 802.11 Bluetooth Cellular Internet Protocol Stack The Hourglass HTTP, FTP, RTP, IAP, Jabber, TCP, UDP, ICP IPv4 Ethernet, 802.11x, DOCSIS, Fiber, Coax, Twisted Pair, Radio, 76 Layering: logical communication Layering: logical communication data data ack data 13

Layering: communication data data Encapsulation: Layering and data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below source destination message Encapsulation: Layering and data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below Encapsulation: Layering and data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below source destination source destination H t message segment H t H n H t message segment datagram Encapsulation: Layering and data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below Encapsulation: Layering and data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below source destination source destination H t H n H t H l H n H t message segment datagram frame H t H n H t H l H n H t H n H t H l message segment datagram frame 14

Encapsulation: Layering and data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below Encapsulation: Layering and data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below source destination source destination H t H n H t H l H n H t H n H t H l H n H t message segment datagram frame H t H n H t H l H n H t H t H n H t H l H n H t message segment datagram frame Encapsulation: Layering and data Each layer takes data from above adds header information to create new data unit passes new data unit to layer below Encapsulation Each layer takes data from above adds header information to create new data unit passes new data unit to layer below source destination H t H n H t H l H n H t H t H n H t H l H n H t message segment datagram frame Roadmap What is the Internet? Network Edge End systems, access s, s Network Core Packet switching, structure Protocol Layers, service models Network Security History Network Security field of security how bad entities can attack computer s how we can defend s against attacks how to design architectures that are immune to attacks Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent Internet protocol designers playing catch-up security considerations in all layers! Introduction 1-90 15

Bad guys/girls/organizations ( entities ): can put malware into hosts via Internet malware can get in host from a virus, worm, or Trojan horse. Bad entities can attack servers and infrastructure Denial of Service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic spyware malware can record keystrokes, web sites visited, upload info to collection site. infected host can be enrolled in botnet, used for spam and DDoS attacks. malware often self-replicating: from one infected host, seeks entry into other hosts 1. select target 2. break into hosts around the (see botnet) 3. send packets to target from compromised hosts target Introduction 1-91 Introduction 1-92 Bad entities can sniff Broadcast medium allow packet sniffers (in promiscuous mode) to listen to packets to others Bad entities can use false source addresses IP spoofing: send packet with false source address A C A C src:b dest:a payload B src:b dest:a payload B Introduction 1-93 Introduction 1-94 Bad entities can record and playback record-and-playback: sniff sensitive info (e.g., password), and use later A C src:b dest:a AND lots more user: B; password: foo B Roadmap What is the Internet? Network Edge End systems, access s, s Network Core Packet switching, structure Protocol Layers, service models Network Security History Introduction 1-95 16

Internet History Internet History Internet History Internet History DNS - Domain Name Server Internet History Internet History 2,7 billion users 2013 2,9 billion users 2014?? 2,7 billion users 2013 2,9 billion users 2014?? 1.11 billion users arch 2013 1.23 billion users2014 1.11 billion users arch 2013 1.23 billion users2014 17

Extra slides... Internet Hosts 1981-2013 Number of hosts advertised in the DNS July 2012: 908,585,739 July 2013: 996,230,757 July 2014: 1,028,544,414 Sweden: Host # 2014: 5,891,385 2004 2005 2006 2008 2010 2012 Sweden 945 221 2 701 456 2 958 000 3 579 000 5 727 000 Sweden: 5,727,000 2014: 9,723,809 users 2011 Country Rank: 18 Rank: 44+ 94,8% penetration! 18