Persistence lists Explain the purpose of persistence lists and what maintains them. Give an example of a client who should be on a persistence list.

Slides:



Advertisements
Similar presentations
The Network Layer Chapter 5. Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of.
Advertisements

 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Lecture 5: TCP/IP OSI layers 3 (IP) and 4 (TCP/UDP) IPv4 – addresses and routing, “best-effort” service Ethernet, Appletalk, etc wrap IP packets with their.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
OSI Model.
CS682 Session 6 Prof. Katz. Firewalls An intelligent router? Used as a traffic control mechanism Based on information in the Layer 3 and 4 headers Administrator.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
NetComm Wireless VPN Functionality Feature Spotlight.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
The OSI Reference Model Key concepts: Layers Communications between two adjacent layers Encapsulation Multiplexing and demultiplexing Tunneling.
OSI Model Routing Connection-oriented/Connectionless Network Services.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Exercises for Chapter 3: Networking.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 01 Introduction to Computer Networking.
Presentation on Osi & TCP/IP MODEL
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses.
Transmission Control Protocol TCP. Transport layer function.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
Karlstad University IP security Ge Zhang
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
1 Introduction to TCP/IP. 2 OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
IP Security
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Network Fundamentals – Chapter 5
Chapter 18 IP Security  IP Security (IPSec)
SECURING NETWORK TRAFFIC WITH IPSEC
Internet and Intranet Fundamentals
Outline Basics of network security Definitions Sample attacks
Pertemuan 19 Introduction to TCP/IP
Network Fundamentals – Chapter 5
Virtual Private Network (VPN)
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
OUT OF BAND AUTHENTICATION
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Computer Networks Protocols
Outline Basics of network security Definitions Sample attacks
Network Fundamentals – Chapter 5
Chapter 6 IP Security.
Chapter 8 – Data switching and routing
Presentation transcript:

persistence lists Explain the purpose of persistence lists and what maintains them. Give an example of a client who should be on a persistence list.

TCP Tahoe/Reno What is the difference between TCP Tahoe and TCP Reno?

Packet Size Sending data over the network generally has high header data to payload ratio, making transactions quite expensive. Explain why this is and briefly outline one possible solution which will improve this ratio while keeping a remote shell session, which sends data one byte at a time, relatively lag-free

Network Layer There are two types of network layers - connection-based and datagram-based. The internet is datagram based, which means that the router does not keep connection-state information. But connections are a very popular feature on the internet! Explain the benefits of using a datagram-based network, and why it would be selected over a connection-based network for a large-scale project.

IPSec When trying to make data secure using an encapsulating security payload, what is the difference between the invisible mode header and the tunnel mode header?

Routing Algorithms what does it mean to be a routing algorithm with global information? what does it mean to be a routing algorithm with local information?

SYN Floods One of the most popular Denial of Service attacks on the Internet is often based on SYN flooding. a) Please describe below how SYN flooding works. What weakness of TCP protocol is it exploiting? You may include (draw) diagrams in your explanation. b) How can we prevent massive SYN Flood attacks? In what layer of the seven layer OSI network model can we best prevent the attacks?

Layer Model Draw the seven layer OSI model, describe what each layer is concerned with. Also, list at least 5 protocols we have discussed in class and note to which layer they belong.