Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security Lecture.

Slides:



Advertisements
Similar presentations
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Advertisements

Dr. Philip Cannata 1 Computer Networking. Dr. Philip Cannata 2.
Arsitektur Jaringan Pertemuan 09 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
Protocols and the TCP/IP Suite
1 School of Computing Science Simon Fraser University CMPT 771/471: Internet Architecture & Protocols Introduction Instructor: Dr. Mohamed Hefeeda.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
ECS 152A 1. Introduction. A Communications Model Source —generates data to be transmitted Transmitter —Converts data into transmittable signals Transmission.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
What’s the Internet: “nuts and bolts” view
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Protocol layers, service models.
1 Week 2 Lecture 1 Layers (basics) Dr. Fei Hu. Review last lecture 2.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
CS 381 Introduction to computer networks Chapter 1 - Lecture 4 2/10/2015.
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Lec4: TCP/IP, Network management model, Agent architectures
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications 1.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
ECE 4400:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi.
Introduction 1-1 “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Basic Concepts of Internet Technology What is a computer network? Isolated computers vs. networked computers internetworking The Internet What’s a protocol?
1 Computer Networks & The Internet Lecture 4 Imran Ahmed University of Management & Technology.
William Stallings Data and Computer Communications
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Reference model. Goal: 2 message exchange between application processes.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
Marina Papatriantafilou – Introduction to computer communication Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley.
1: Introduction1 Internet Services and Protocols Adapted from “Computer Networking: A Top Down Approach Featuring the Internet” Kurose and Ross, Addison.
Introduction and Overview of Network and Telecommunications.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
1 Ram Dantu University of North Texas, Practical Networking.
TUNALIData Communications1 Chapter 2 Protocols and Architecture.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
Computer Networks Dr. Adil Yousif CS Lecture 1.
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420.
Graciela Perera Introduction Graciela Perera
CS 3214 Computer Systems Networking.
Day 01 - The Internet.
Slides taken from: Computer Networking by Kurose and Ross
CS 3214 Computer Systems Lecture 21 Godmar Back.
CS 3214 Computer Systems Networking.
Introduction 1 1: Introduction.
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 423.
ECE 4400:427/527 - Computer Networks Spring 2017
Chapter 1: Introduction
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
Computer Networking A Top-Down Approach Featuring the Internet
Department of Computer Science Southern Illinois University Carbondale CS441 – Mobile & Wireless Computing Overview of Computer Networking Protocols.
Presentation transcript:

Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security Lecture 2: Overview of Computer Networking Dr. Kemal Akkaya

Kemal AkkayaWireless & Network Security 2 What’s the Internet: “nuts and bolts” view  Millions of connected computing devices: hosts = end systems  Running network apps  Communication links  fiber, copper, radio, satellite  transmission rate = bandwidth  Routers: forward packets (chunks of data)  Protocols control sending, receiving of msgs  e.g., TCP, IP, HTTP, FTP, PPP  Internet: “network of networks”  Loosely hierarchical  Public Internet vs Private intranet  Internet standards  RFC: Request for Comments  IETF: Internet Engineering Task Force local ISP company network regional ISP router workstation server mobile

Kemal AkkayaWireless & Network Security 3 The network edge  End systems (hosts)  Run application programs  e.g., Web,  At “edge of network”  Client/Server model  Client host requests, receives service from always-on server  e.g. Web browser/server; client/server  Peer-Peer model  Minimal (or no) use of dedicated servers  e.g., Napster, Gnutella, KaZaA

Kemal AkkayaWireless & Network Security 4 What’s the Internet: a service view  Communication infrastructure enables distributed applications  Network edge: applications and hosts  Network core : routers network of networks  Access networks, physical media: communication links  Applications: Web, , games, e- commerce, file sharing  Communication services provided to apps:  Connectionless unreliable  Connection-oriented reliable  Various protocols are used for communication services

Kemal AkkayaWireless & Network Security 5 What’s a protocol? Human protocols:  “What’s the time?”  “I have a question”  introductions … specific msgs sent … specific actions taken when msgs received, or other events Network protocols:  Machines rather than humans  All communication activity in Internet governed by protocols Protocols define format, order of messages sent and received among network entities, and actions taken on message transmission, receipt

Kemal AkkayaWireless & Network Security 6 What’s a protocol?  A human protocol and a computer network protocol: Q: Other human protocols? Hi Got the time? 2:00 TCP connection req TCP connection response Get time  Timing  Speed matching  Sequencing  Syntax  Data formats  Signal levels  Semantics  Control information  Error handling  Key Elements of a Protocol:

Kemal AkkayaWireless & Network Security 7 Protocol “Layers” Networks are complex!  Many “pieces”:  hosts  routers  links of various media  applications  protocols  hardware, software Question: Is there any hope of organizing structure of network? Or at least our discussion of networks? ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing Organization of air travel  Consider the following analogy:  A series of steps

Kemal AkkayaWireless & Network Security 8 Layering of airline functionality  Layers: Each layer implements a service  via its own internal-layer actions  relying on services provided by layer below  Why Layering?  Dealing with complex systems  Explicit structure allows identification, relationship of complex system’s pieces Layered reference model for discussion  Modularization eases maintenance, updating of system Change of implementation of layer’s service transparent to rest of system e.g., change in gate procedure doesn’t affect rest of system ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing ticket baggage gate takeoff/landing airplane routing

Kemal AkkayaWireless & Network Security 9 Standardized Protocol Architectures  Required for devices to communicate  Vendors have more marketable products  Customers can insist on standards based equipment  Two standards:  OSI Reference model Open Systems Interconnection Developed by the International Organization for Standardization (ISO) Seven layers Never lived up to early promises  TCP/IP protocol suite Most widely used De facto standard  Also: IBM Systems Network Architecture (SNA)

Kemal AkkayaWireless & Network Security 10 OSI - The Model  A layer model  Each layer performs a subset of the required communication functions  Each layer relies on the next lower layer to perform more primitive functions  Each layer provides services to the next higher layer  Changes in one layer should not require changes in other layers  Why OSI did not take over the world  Bad timing  Bad technology  Bad implementations  Bad politics

Kemal AkkayaWireless & Network Security 11 The OSI Environment

Kemal AkkayaWireless & Network Security 12 OSI as Framework for Standardization

Kemal AkkayaWireless & Network Security 13 OSI Layers  Physical  Physical interface between devices Mechanical Electrical Functional Procedural  Data Link  Means of activating, maintaining and deactivating a reliable link  Error detection and control  Higher layers may assume error free transmission  Network  Transport of information  Higher layers do not need to know about underlying technology  Not needed on direct links  Transport  Exchange of data between end systems  Error free  In sequence  No losses  No duplicates  Quality of service  Session  Control of dialogues between applications  Dialogue discipline  Grouping  Recovery  Presentation  Data formats and coding  Data compression  Encryption  Application  Means for applications to access OSI environment

Kemal AkkayaWireless & Network Security 14 Use of a Relay

Kemal AkkayaWireless & Network Security 15 TCP/IP Protocol Architecture  Developed by the US Defense Advanced Research Project Agency (DARPA) for its packet switched network (ARPANET)  Used by the global Internet  No official model but a working one.  Application layer  Host to host or transport layer  Internet layer  Data link layer  Physical layer  Problems:  Service, interface, and protocol not distinguished  Not a general model  No exact separate mention of physical and data link layers Sometimes called host-to-network layer  Minor protocols deeply entrenched, hard to replace

Kemal AkkayaWireless & Network Security 16 Layer Descriptions  Physical Layer  Physical interface between data transmission device (e.g. computer) and transmission medium or network  Characteristics of transmission medium  Signal levels  Data rates  Data Link Layer  Exchange of data between neighboring network nodes  Invoking services like priority  Internet (IP) Layer  Systems may be attached to different networks  Routing functions across multiple networks  Implemented in end systems and routers  Transport Layer (TCP)  Reliable delivery of data  Ordering of delivery  Application Layer  Support for user applications: HTTP, SMTP

Kemal AkkayaWireless & Network Security 17 OSI vs TCP/IP

Kemal AkkayaWireless & Network Security 18 Protocols and networks in the TCP/IP model

Kemal AkkayaWireless & Network Security 19 PDUs in TCP/IP

Kemal AkkayaWireless & Network Security 20 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M network link physical link physical HtHt HnHn HlHl M HtHt HnHn M HtHt HnHn HlHl M HtHt HnHn M HtHt HnHn HlHl M HtHt HnHn HlHl M router switch Encapsulation

Kemal AkkayaWireless & Network Security 21 Some Protocols in TCP/IP Suite