Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology

Slides:



Advertisements
Similar presentations
Internet Hardware Connected ‘Servers’ Servers provide: – Web pages – – File downloads.
Advertisements

Intermediate TCP/IP TCP Operation.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
The Internet and Java Sockets ICW Lecture 5 Tom Chothia.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Network Layer and Transport Layer.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 PERTEMUAN 5.
Internet…issues Managing the Internet
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecturer: Tamanna Haque Nipa
TCP/IP Web Design & Layout January 23, TCP/IP For Dummies  The guts and the rules of the Internet and World Wide Web. A set of protocols, services,
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Data Communications and Networks
OSI Model Routing Connection-oriented/Connectionless Network Services.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Presentation on Osi & TCP/IP MODEL
How the Internet Works. The Internet and the Web The Web is actually just one of many computer applications that run on the Internet Among others are.
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
TCP/IP Protocols Contains Five Layers
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
©Brooks/Cole, 2003 Model and protocol  A model is the specification set by a standards organization as a guideline for designing networks.  A protocol.
SSL/TLS How to send your credit card number securely over the internet.
William Stallings Data and Computer Communications
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
science/internet-intro
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 3. How TCP/IP Works.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
K. Salah1 Security Protocols in the Internet IPSec.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Digital Signatures.
Chapter 4 Introduction to Network Layer
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
Topic 5: Communication and the Internet
Chapter 4 Introduction to Network Layer
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
Unit 8 Network Security.
Presentation transcript:

Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology

Part I: Routing

A Simplified Internet My Computer Router Website

A Telephone Network My Telephone Switch Your Telephone

The Difference? Telephone NetworksCircuit Switched = Guaranteed service from the network The InternetPacket Switched = No guarantees from the network!

Packets From: My Computer To: Website Please send me your home page Data Header All files transmitted on the Internet are first broken into packets.

Routing How does a router know where to send a packet?

Routing Tables Router A Packet’s Destination Next Router WebsiteRouter B Routing Table Distance to Destination 2 Hops

Routing Table Update Router A Router C Website Router C says: “I am 1 hop away from Website.” Router B

Routing Table Update Router A Router C Website Router A’s routing table is updated.

Routing Table Update Router A Packet’s Destination Next Router WebsiteRouter C Routing Table Distance to Destination 1 Hop

Routing KEY POINTS: Routing is:Decentralized Anonymous

Part II: TCP and Denial of Service

Transmission Control Protocol Internet Protocol (routing) Transmission Control Protocol (reliable end-to-end)

Reliable Transmission Sender Receiver No acknowledgement: Sender resends packet 4 Packets Acknowledgements

TCP Examples upload/download Telnet session FTP file transfer Web page download –one web page download may mean many TCP connections!

Setting Up a TCP Connection My Computer Website …as long as you respond to this message. SYN: Can I set up a connection with you? SYN-ACK: Yes,

Denial of Service The Website can’t handle the load! What if: isn’t my real IP address? (spoofing) No response! 2.I repeat 1 million times per minute? 1 million “half-open” connections!

Countermeasures: Filtering 1.Block Incoming SYN requests 2.Check source address on outgoing packets

For More Information Vern Paxson, “How to Own the Internet in Your Spare Time:” A discussion of how “worms” gain control of vulnerable computers.

Part III: Cryptography

Cryptography Cryptography : The art and/or science of encoding data so it can only be decoded by specific individuals.

Modern Cryptography Most modern cryptographic algorithms are widely known. The “secret” is the key which drives the algorithm.

Modern Cryptography Symmetric Key Cryptography Public Key Cryptography

Symmetric Keys: Example Sender’s Message: Encryption: Add a fixed key to each number in a sequence. The Key : 3 Encrypted Message: Decryption: Subtract key from each number in sequence.

Symmetric Keys “Symmetric Keys” means: Both sender and receiver have the same key. An Internet problem: How do customers and websites share keys with each other?

Public Keys: Example Receiver says to sender: “Take this open padlock and box.”

Public Keys: Example Receiver says to sender: “Take this open padlock and box.” “Put anything you want to send me inside.”

Public Keys: Example Receiver says to sender: “Take this open padlock and box. Put anything you want to send me inside. Then close the box, and lock it.”

Public Keys: Example Receiver says to sender: “Take this open padlock and box. Put anything you want to send me inside. Then close the box, and lock it.”

Public Keys: Example Locking the box is one-way: –It is easy to do, but hard to undo But the receiver has a trap door: –He uses the key to unlock the box

On the Internet Customers use a website’s public key to encrypt data. Even though everyone knows the algorithm used, decryption is hard without the receiver’s private key.

A Final Note: Secure Sockets Layer (SSL) 1.Use public key encryption to ensure both parties share a symmetric key 2.Use (faster) symmetric key encryption for communication

Part IV: Spiders

Recursive Retrieval My Computer Web Page

Where is the Spider? My Computer Web Page

Where is the Spider? My Computer Web Page

Where is the Spider? My Computer Web Page

The Reality My Computer Web Page THE SPIDER STAYS HERE!