1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.

Slides:



Advertisements
Similar presentations
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Advertisements

Dr. Philip Cannata 1 Computer Networking. Dr. Philip Cannata 2.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
Introduction to Security Computer Networks Computer Networks Term B10.
Introduction 1-1 Chapter 1 Introduction These additional slides are adapted from the slides of the textbook. Computer Networking: A Top Down Approach,5th.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security Lecture.
Networking Based on the powerpoint presentation of Computer Networking: A Top Down Approach Featuring the Internet, Third Edition, J.F. Kurose and K.W.
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 School of Computing Science Simon Fraser University CMPT 771/471: Internet Architecture & Protocols Introduction Instructor: Dr. Mohamed Hefeeda.
1-1 Internet Overview: roadmap 1.5 Protocol layers, service models 1.6 Internet for Wireless 1.7 Internet under attack: security overview Lecture 3.
Roadmap 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 Internet structure and ISPs 1.6 Delay & loss.
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
What’s the Internet: “nuts and bolts” view
University of Calgary – CPSC 441.  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against.
CPSC 441 TUTORIAL TA: FANG WANG NETWORK SECURITY.
Introduction 1 Lecture 4 Networking Concepts (cont) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Protocol layers, service models.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 5 OVERVIEW FOR NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Last quiz question….
Introduction Protocol “layers” Networks are complex, with many “pieces”:  hosts  routers  links of various media  applications  protocols  hardware,
1 Week 2 Lecture 1 Layers (basics) Dr. Fei Hu. Review last lecture 2.
CS 381 Introduction to computer networks Chapter 1 - Lecture 4 2/10/2015.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Computer Networks CSE 434 Fall 2009 Sandeep K. S. Gupta Arizona State University Research Experience.
1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware, software Question:
ECE 4400:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi.
Introduction 1-1 “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
Chapter 1 Introduction Circuit/Packet Switching Protocols Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
Introduction to Computer Networks
OSI Model Data Communications. 7 layer “research” model ApplicationPresentationSessionTransportNetworkLinkPhysical.
1 Computer Networks & The Internet Lecture 4 Imran Ahmed University of Management & Technology.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April The.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Reference model. Goal: 2 message exchange between application processes.
CS 3830 Day 4 Introduction 1-1. Announcements  No office hour 12pm-1pm today only  Quiz on Friday  Program 1 due on Friday (put in DropBox on S drive)
Introduction 1-1 Chapter 1 Introduction (2/2) CSEE 4119 Computer Networks.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
DELAYS, LAYERED NETWORK MODEL AND NETWORK SECURITY.
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
CPSC441 Computer Communications Aniket Mahanti Introduction 1-1.
CPSC 441 TUTORIAL – APRIL 4, 2012 TA: MARYAM ELAHI NETWORK SECURITY.
Marina Papatriantafilou – Introduction to computer communication Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Introduction and Overview of Network and Telecommunications.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
COM594: Mobile Technology Lecture Week 1 Hardware and Protocols.
Computer Networks Dr. Adil Yousif CS Lecture 1.
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420.
Overview: Cloud Datacenters II
Introduction and Overview of Network and Telecommunications
Introduction to Computer Networks
Introduction to Networks
Network Introduction.
OSI Protocol Stack Given the post man exemple.
Introduction and Overview of Network and Telecommunications (contd.)
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 423.
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
CSE 4905 Network Security Overview
ECE 4400:427/527 - Computer Networks Spring 2017
Lectures Computer networking تمرین 3 نمره. پژوهش عملیاتی 2 نمره.
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Department of Computer Science Southern Illinois University Carbondale CS441 – Mobile & Wireless Computing Overview of Computer Networking Protocols.
Presentation transcript:

1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in Internet 1.5 Protocol layers, service models 1.6 Networks under attack: security Lecture 3

1-2 Protocol “Layers” Networks are complex!  Millions of components:  hosts  routers  Access networks  Physical links Question: Is there any hope of organizing structure of network? Lecture 3

1-3 Organization of air travel  a series of steps ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing Lecture 3

1-4 ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing ticket baggage gate takeoff/landing airplane routing Layering of airline functionality Layers: each layer implements a service  via its own internal-layer actions  relying on services provided by layer below  Another example: Postal Service! Lecture 3

1-5 What are the adv. of layering? Network is a huge complex system.  To reduce the design complexity  Ease of updating the system  change of implementation of layer’s service transparent to rest of system  e.g., Postal service (overnight flight or overnight ground) Lecture 3

1-6 Internet protocol stack application transport network link physical Lecture 3  application  support host/network applications  , FTP, HTTP (HTML)  transport  process-process data transfer  TCP, UDP  network  routing of datagrams from src. to destn.  IP address, routing protocols  link  data transfer between neighboring network elements  Ethernet, PPP  physical  bits “on the wire” (Compare with the Postal System!)

1-7 ISO/OSI reference model  presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine- specific conventions  session: synchronization, checkpointing, recovery of data exchange application presentation session transport network link physical Lecture 3

1-8 source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M network link physical link physical HtHt HnHn HlHl M HtHt HnHn M HtHt HnHn M HtHt HnHn HlHl M router switch Messages, Segments, Datagrams and Frames message M HtHt M HnHn frame Encapsulation Lecture 3 message

1-9 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in Internet 1.5 Protocol layers, service models 1.6 Networks under attack: security Lecture 3

1-10 Network Security  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against attacks  Internet not originally designed with (much) security in mind  original vision: “a group of mutually trusting users attached to a transparent network”  Internet protocol designers playing “catch-up” Lecture 3

1-11 Bad guys can put malware into hosts via Internet  Malware  virus  Worm  trojan horse and many others  Spyware malware can record keystrokes, web sites visited, upload info to collection site.  Infected host can be enrolled in a botnet, used for spam and DDoS attacks.  Malware is often self-replicating: from an infected host, seeks entry into other hosts Lecture 3

Quick Malware Overview  Trojan horse  Hidden part of some otherwise useful software  Today often on a Web page (Active-X, plugin)  Virus  infection by receiving object (e.g., attachment), actively executing  self-replicating: propagate itself to other hosts, users  Worm:  infection by passively receiving object that gets itself executed  self- replicating: propagates to other hosts, users 1-12 Lecture 3

Denial of Service Attacks 1-13  Denial of service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic Lecture 3

1-14 Packet Sniffing Packet sniffing:  broadcast media (shared Ethernet, wireless)  promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A B C src:B dest:A payload Lecture 3

1-15 Network security  We will discuss more about this later… Lecture 3