Final Exam Review Will release at 10:00am Dec. 6th,

Slides:



Advertisements
Similar presentations
Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner.
Advertisements

Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
8-1 Last time □ Network layer ♦ Introduction forwarding vs. routing ♦ Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding.
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
Announcement r Project 2 Extension ? m Previous grade allocation: Projects 40% –Web client/server7% –TCP stack21% –IP routing12% Midterm 20% Final 20%
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
Lecture 8 Modeling & Simulation of Communication Networks.
Network LayerII-1 RSC Part II: Network Layer 4. IP in operation Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Final Exam Review Knowledge questions True or false statement (explain why) Protocol Calculation Cover the contents after midterm coverage.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Final Exam Review Knowledge questions True or false statement (explain why) Protocol Calculation Cover the second half contents.
Final Review. The exam Two double-sided letter size cheating sheets allowed Closed book, closed note McMaster calculator allowed Types of questions: –
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
IP. Classless Inter-Domain Routing Classful addressing scheme wasteful – IP address space exhaustion – A class B net allocated enough for 65K hosts Even.
Final Exam Review Knowledge questions True or false statement (explain why) Protocol Calculation Cover the contents after midterm coverage –Homework 3,
Network Layer (2). Review Physical layer: move bits between physically connected stations Data link layer: move frames between physically connected stations.
Final Exam Review Will release at 10:00am Dec. 7 th, Due on Webcourse at 11:59pm the next day.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Introduction to Networks
Last time Message Integrity Authentication
Chapter 4: Network Layer
NAT – Network Address Translation
Address Resolution Protocol (ARP)
IT443 – Network Security Administration Instructor: Bo Sheng
Networking CS 3470, Section 1 Sarah Diesburg
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
MAC Addresses and ARP 32-bit IP address:
ICMP ICMP – Internet Control Message Protocol
Chapter 4: Network Layer
ARP: Address Resolution Protocol
Basic Network Encryption
استانداردهاي سري IEEE 802.X
CS 457 – Lecture 7 Wireless Networks
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Address Resolution Protocol (ARP)
CS 457 – Lecture 10 Internetworking and IP
Introduction to Networks
Network Security Basics
EEC-484/584 Computer Networks
Final Exam Review Will release at 10:00am Dec. 4th,
Routers Routing algorithms
1DT057 Distributed Information System Chapter 8 Network Security
ECE453 – Introduction to Computer Networks
Review and Announcement
Chapter 4: Network Layer
Protocol ap1.0: Alice says “I am Alice”
Networking CS 3470 Sarah Diesburg
Overview The Internet (IP) Protocol Datagram format IP fragmentation
Chapter 4: Network Layer
Final Exam Review Will release at 10:00am Dec. 11th,
Chapter 4: Network Layer
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
EEC-484/584 Computer Networks
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Chapter 4: Network Layer
Basic Network Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Networking CS 3470 Sarah Diesburg
Security: Integrity, Authentication, Non-repudiation
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Chapter 8 roadmap 8.1 What is network security?
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Final Exam Review Will release at 10:00am Dec. 6th, Due on Webcourse at 11:59pm the next day

Final Exam Review Knowledge questions True or false statement (explain why) Protocol Calculation Cover the contents after midterm coverage

Knowledge Question Examples Three classes of switch fabric, speed relationship Where can queue occur in router? TCP header size? IP header size? UDP header size? How many bits in IP of IPv6? Address space size? Why it is very slow to be deployed? (enough IP space, hard upgrading and compatible) What is DHCP? NAT? Their pros and cons? Routing: what are Link state, distance vector? Internet two-level routing? (inter-AS, intra-AS) RIP, OSPF, BGP? Used where? OSPF uses link state, BGP/RIP uses distance vector RIP, OSPF -> intra-AS, BGP -> inter-AS Which is better? pure ALOHA, slotted ALOHA, CSMA/CD? What are their assumptions? (collision detection, time syn) CSMA/CD? CSMA/CA? Why wireless use CSMA/CA? Ethernet Broadcast MAC addr.? What the broadcast address for? What is ARP? Why Ethernet is much better than aloha in efficiency? Carrier sense, collision detection, exp. backoff

Knowledge Question Examples Hub vs. Switch? 802.11a, b, g: speed? Working frequency? 802.15? (personal area network, example: bluetooth) Wireless no collision detection? listen while sending, fading, hidden terminal Network security three elements: Confidentiality, authentication, integrity What is public/symmetric key cryptography? Pro vs. con? Why use “nonce” in security? (replay attack) What is man-in-the-middle attack? Usage of firewall? (block outside active traffic to inside) IP spoofing? SYN flood DoS attack?

Protocol Problem Examples NAT address translation procedure Digital signature procedure HTTPS connection procedure CA, public key Secure email (assume known public key) Confidentiality Integrity

Calculation Examples subnet addressing link state, distance vector Figure out subnet based on host’s IP and subnet mask link state, distance vector parity checking CRC calculation wireless MAC protocol Caesar cipher decrypt, Vigenere cipher, one-time pad decrypt (given the pad)

Three types of switching fabrics Property? Speed order?

Routing Algorithm classification Global or decentralized information? Global: all routers have complete topology, link cost info “link state” algorithms Decentralized: router knows physically-connected neighbors, link costs to neighbors iterative process of computation, exchange of info with neighbors “distance vector” algorithms

NAT: Network Address Translation NAT translation table WAN side addr LAN side addr 1: host 10.0.0.1 sends datagram to 128.119.40.186, 80 2: NAT router changes datagram source addr from 10.0.0.1, 3345 to 138.76.29.7, 5001, updates table 138.76.29.7, 5001 10.0.0.1, 3345 …… …… S: 10.0.0.1, 3345 D: 128.119.40.186, 80 1 10.0.0.1 S: 128.119.40.186, 80 D: 10.0.0.1, 3345 4 S: 138.76.29.7, 5001 D: 128.119.40.186, 80 2 10.0.0.4 10.0.0.2 138.76.29.7 S: 128.119.40.186, 80 D: 138.76.29.7, 5001 3 10.0.0.3 4: NAT router changes datagram dest addr from 138.76.29.7, 5001 to 10.0.0.1, 3345 3: Reply arrives dest. address: 138.76.29.7, 5001

Intra-AS and Inter-AS routing between A and B a b C A B d c A.a A.c C.b B.a Host h2 Host h1 Intra-AS routing within AS B Intra-AS routing within AS A RIP: Routing Information Protocol OSPF: Open Shortest Path First BGP: Border Gateway Protocol (Inter-AS)

ARP protocol: Same LAN (network) A wants to send datagram to B, and B’s MAC address not in A’s ARP table. A broadcasts ARP query packet, containing B's IP address Dest MAC address = FF-FF-FF-FF-FF-FF all machines on LAN receive ARP query B receives ARP packet, replies to A with its (B's) MAC address frame sent to A’s MAC address (unicast) A caches (saves) IP-to-MAC address pair in its ARP table until information becomes old (times out) soft state: information that times out (goes away) unless refreshed ARP is “plug-and-play”: nodes create their ARP tables without intervention from net administrator

What is network security? Confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver decrypts message Authentication: sender, receiver want to confirm identity of each other Virus email really from your friends? The website really belongs to the bank? Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Digital signature

Collision Avoidance: RTS-CTS exchange B AP DIFS RTS(A) RTS(B) reservation collision RTS(A) CTS(A) CIFS CIFS DATA (A) ACK(A) defer time CIFS Textbook Page 522 figure

Firewall Block outside-initiated traffic to inside of a local network Usually do not block any traffic initiated from inside to outside Have at least two NICs (two IPs) administered network public Internet firewall

Internet security threats Denial of service (DOS): flood of maliciously generated packets “swamp” receiver Distributed DOS (DDOS): multiple coordinated sources swamp receiver e.g., C and remote host SYN-attack A A C SYN SYN SYN SYN SYN B SYN SYN

Digital signature = signed message digest Alice verifies signature and integrity of digitally signed message: Bob sends digitally signed message: large message m H: Hash function KB(H(m)) - encrypted msg digest H(m) digital signature (encrypt) Bob’s private key large message m K B - Bob’s public key digital signature (decrypt) K B + KB(H(m)) - encrypted msg digest H: Hash function + H(m) H(m) equal ? No confidentiality !

Secure e-mail Alice wants to send confidential e-mail, m, to Bob. KS KS( ) . KS(m ) m + Internet KB( ) . + KS KB(KS ) + KB + Alice: generates random symmetric private key, KS. encrypts message with KS (for efficiency) also encrypts KS with Bob’s public key. sends both KS(m) and KB(KS) to Bob.

Secure e-mail Alice wants to send confidential e-mail, m, to Bob. KS( ) . KB( ) + - KS(m ) KB(KS ) m KS KB Internet Bob: uses his private key to decrypt and recover KS uses KS to decrypt KS(m) to recover m

Secure e-mail (continued) Alice wants to provide message integrity (unchanged, really written by Alice). H( ) . KA( ) - + H(m ) KA(H(m)) m KA Internet compare Alice digitally signs message. sends both message (in the clear) and digital signature.

Secure e-mail (continued) Alice wants to provide secrecy, sender authentication, message integrity. H( ) . KA( ) - + KA(H(m)) m KA KS( ) KB( ) KB(KS ) KS KB Internet Alice uses three keys: her private key, Bob’s public key, newly created symmetric key

Internet Web Security Architecture Web Server B CA K+B K-CA(K+B) Client A Cert Request K-CA(K+B) K+B(KAB, R) KAB(R) KAB(m) Network Security

Forwarding table Destination Address Range Link Interface 11001000 00010111 00010000 00000000 through 0 11001000 00010111 00010111 11111111 11001000 00010111 00011000 00000000 through 1 11001000 00010111 00011000 11111111 11001000 00010111 00011001 00000000 through 2 11001000 00010111 00011111 11111111 otherwise 3

Longest prefix matching Prefix Match Link Interface 11001000 00010111 00010 0 11001000 00010111 00011000 1 11001000 00010111 00011 2 otherwise 3 Examples DA: 11001000 00010111 00010110 10100001 Which interface? DA: 11001000 00010111 00011000 10101010 Which interface? DA: 11001000 00010111 10011000 10101010 Which interface?

CRC Example Want: D.2r XOR R = nG equivalently: D.2r = nG XOR R if we divide D.2r by G, want remainder R D.2r G R = remainder[ ]

Dijkstra’s algorithm: example Step 1 2 3 4 5 N D(B),p(B) D(C),p(C) D(D),p(D) D(E),p(E) D(F),p(F) A 2,A 5,A 1,A infinity,- infinity,- AD 2,A 4,D 1,A 2,D infinity,- ADE 2,A 3,E 1,A 2,D 4,E ADEB 2,A 3,E 1,A 2,D 4,E ADEBC 2,A 3,E 1,A 2,D 4,E ADEBCF 2,A 3,E 1,A 2,D 4,E 5 3 B C 2 5 A 2 1 F 3 1 2 D E 1

z y x Dx(z) = min{c(x,y) + Dy(z), c(x,z) + Dz(z)} = min{2+1 , 7+0} = 3 Dx(y) = min{c(x,y) + Dy(y), c(x,z) + Dz(y)} = min{2+0 , 7+1} = 2 node x table x y z x y z 0 2 7 ∞ from cost to cost to cost to x y z x y z x 0 2 3 x 0 2 3 from y 2 0 1 from y 2 0 1 z 7 1 0 z 3 1 0 node y table cost to cost to cost to x z 1 2 7 y x y z x y z x y z x ∞ ∞ x 0 2 7 ∞ 2 0 1 x 0 2 3 y from y from 2 0 1 from y 2 0 1 z z ∞ ∞ ∞ 7 1 0 z 3 1 0 node z table cost to cost to cost to x y z x y z x y z x 0 2 7 x 0 2 3 x ∞ ∞ ∞ from y from y 2 0 1 from y 2 0 1 ∞ ∞ ∞ z z z 3 1 0 3 1 0 7 1 time

Caesar cipher decrypt: Vigenere cipher “welcome”, key= +2  Vigenere cipher “final exam” key=3,4,-1 (blank space does not change)

Subnet calculation Remember each subnet is represented by a.b.c.d/x Don’t use “128.119.0.0 to 128.119.0.255” to represent a subnet!