ICS 101 Fall 2012 Networking and the Internet Asst. Prof. Lipyeow Lim Information & Computer Science Department University of Hawaii at Manoa 9/4/20121Lipyeow.

Slides:



Advertisements
Similar presentations
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
Advertisements

Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Network Layer and Transport Layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Introduction to Networks and the Internet
OSI Model.
Introduction To Networking
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Data Communications and Networks
Higher Computing Network Protocols, the OSI model and IP addresses.
OSI Model Routing Connection-oriented/Connectionless Network Services.
CP476 Internet ComputingCh.1 # 1 Lecture 2. A Brief Introduction to the Internet The objective is to understand The history of Internet What the Internet.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Characteristics of Communication Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Mr C Johnston ICT Teacher
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Mukesh N. Tekwani Elphinstone College Mumbai
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
TCP/IP Transport and Application (Topic 6)
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Network Protocols A network protocol defines the structure of messages sent over the network We will only talk about the Internet Network protocols need.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
©Brooks/Cole, 2003 Model and protocol  A model is the specification set by a standards organization as a guideline for designing networks.  A protocol.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1. Layered Architecture of Communication Networks: TCP/IP Model
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
Net 221D:Computer Networks Fundamentals
Transmission Control Protocol (TCP) Internet Protocol (IP)
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
TCP/IP PROTOCOL UNIT 6. Overview of TCP/IP Application FTP, Telnet, SMTP, HTTP.. Presentation Session TransportHost-to-HostTCP, UDP NetworkInternetIP,
1 28-Sep-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI network layer CCNA Exploration Semester 1 Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI network layer CCNA Exploration Semester 1 – Chapter 5.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 5 Network and Transport Layers
Chapter 5 Network and Transport Layers
OSI Protocol Stack Given the post man exemple.
Layered Architectures
Networking for Home and Small Businesses – Chapter 6
Network Architecture Introductory material
Networking for Home and Small Businesses – Chapter 6
Topic 5: Communication and the Internet
Review of Important Networking Concepts
Network Protocol Layers
Communication Networks NETW 501
TCP/IP Protocol Suite: Review
Networking Introduction CSE 333 Summer 2018
Networking for Home and Small Businesses – Chapter 6
Presentation transcript:

ICS 101 Fall 2012 Networking and the Internet Asst. Prof. Lipyeow Lim Information & Computer Science Department University of Hawaii at Manoa 9/4/20121Lipyeow Lim -- University of Hawaii at Manoa

Problem Ancient cities G and R have a made a pact that each will come to the (military) aid of the other if one is in trouble. 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa2 Ancient City G Ancient City R 150 miles G & R are 150 miles apart. How can they send a message for help quickly ?

LOTR: Beacon of Gondor Video: Transmission medium: air- line of sight Data encoding: 1 bit – fire or no fire All receivers have to be listening Agreed upon interpretation of the signal at the endpoints Intermediate beacon wardens are always looking for a signal and relaying the signal One way communication 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa3 Gondor Rohan 150 miles

Modern Computer Networks Signaling technology can transmit complex sequences of bits - packets Each host or router obeys a set of rules for how to handle incoming/outgoing messages – communication protocols Communications can be multi-way Bandwidth: the number of bits that can be transferred per second (bps) Latency: the time it takes for a message to reach the destination after leaving the source 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa4 Host computer Host computer Router Fibre optic cables Ethernet or WiFi Host computer Local area network

Local Area Networks Wired (UTP Cat5) or Wireless Connects hosts within a limited spatial region together to form a network All hosts within the network can “talk” to each other The network is often a shared medium: only one host can talk at one time and the rest listens. 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa5

Data Packet How messages are packaged for delivery on the network – like postal mail. Source and destination addresses 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa6

Network Abstractions Network communications are conceived as layers of abstractions. Each layer plays a specific role and is relatively independent of other layers Each layer has its own packet format Packets from higher layers are embedded in packets of lower layers – “encapsulation” 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa7 Network Physical Network

TCP/IP Four Layer Model 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa8 Process to process: communicates data to other processes/applications on the same host or on other hosts Eg. SMTP, FTP, SSH, HTTP Host to host: communicates data to other host on the same network on on other networks Hides the topology of the network Flow control, error correction, connection control Eg. TCP, UDP Inter-network: communicates data to other networks Deals with addressing and routing of datagrams to next network Eg. IPv4, IPv6 Transmit data to other network interfaces on the local network Eg. Ethernet, WiFi

Link Layer Data packet arrives from upper layer (Internet layer) If packet is too big, break packet into smaller fragments (`frames’) Embed data packet in a link layer packet with link layer header, sequence number, error correction code etc. Link layer packets gets transmitted on physical link Link layer protocol governs how transmission over physical link is done. Eg. Carrier sense multiple access Bottom-up process is similar on the receiving host 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa9 Physical Network Eg. Ethernet, WiFi A host can have multiple network interface cards (eg. Laptops typically have an ethernet interface and a WiFi interface) Each interface has a 48-bit physical address that is hardwired to the hardware

Internet Layer Data packet arrives from Transport layer Embed data packet in an IPv4 packet with IP header etc. Pass packet to Link layer Data packet arrives from Link layer Check IP header if packet destination is for this host. If yes, strip header and pass to Transport layer Otherwise forward packet (routing) 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa10 Physical Network Eg. IPv4 Connects multiple networks together. Each network interface of a host is associated with an 32-bit IPv4 address IP address is not hardwired, but assigned in the software

IPv4 Addresses & Domain Name Service IP addresses are 32 bit numbers often written in 4 octets: Each address is also split into two parts – Prefix is the network address – Suffix is the host address within that network Domain Name Servers provide a service that translates more meaningful names to IP addresses – Uhunix.hawaii.edu = – www2.hawaii.edu = /4/2012Lipyeow Lim -- University of Hawaii at Manoa Network AddressHost Address 03116

IPv4 & Inter-network Routing For routers Examine destination IP address Look up routing tables to determine outgoing network Pass packet to link layer of that outgoing network Best effort delivery – no guarantees! 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa12 Ethernet Network Fibre Network host Router

Packet Routing Exercise 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa13

Transport Layer TCP provides a reliable communication channel between two host applications by addressing several issues Data packets arriving out of order Data packets are corrupted Same packets arriving more than once Some packets are lost/discarded Traffic congestion control 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa14 Physical Network Eg. TCP (connection-oriented), UDP End-to-end message transfer between hosts applications Each application on a host is associated with a port number IP address + port number will identify an application end-point

Applications: Your client program downloads incoming s from mail server (imap.gmail.com pop.gmail.com) Outgoing s are sent to mail server (smtp.gmail.com) Mail servers handle the routing of s using SMTP protocol which operates on port 25 or 587 – Lookup IP address of destination hostname in the address using DNS – Relaying as packets to that IP address 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa15 Network Mail Server NetworkInternet Mail Client

Sample Header Delivered-To: Received: by with SMTP id sq6csp687725veb; Mon, 3 Sep :39: (PDT) Received: by with SMTP id nt6mr pbb ; Mon, 03 Sep :39: (PDT) Return-Path: Received: from mta11.its.hawaii.edu (mta11.its.hawaii.edu. [ ])mta11.its.hawaii.edu by mx.google.com with ESMTPS id px6si pbc mx.google.com (version=TLSv1/SSLv3 cipher=RC4-MD5); Mon, 03 Sep :39: (PDT) Received-SPF: pass (google.com: domain of designates as permitted sender) client- ip= ; Authentication-Results: mx.google.com; spf=pass (google.com: domain ofmx.google.comgoogle.com designates as permitted sender) MIME-version: 1.0 Content-type: multipart/mixed; boundary="Boundary_(ID_3RY8N2VbJHb4tH5siR1e ww)" Received: from pmx11.its.hawaii.edu (pmx11.its.hawaii.edu [ ]) bypmx11.its.hawaii.edu [ mta11.its.hawaii.edumta11.its.hawaii.edu (Sun Java(tm) System Messaging Server (built Feb ; 32bit)) with ESMTP id Mon, 03 Sep :38: (HST) Received: from kuhi.its.hawaii.edu (kuhi.its.hawaii.edu [ ]) bykuhi.its.hawaii.edu [ pmx11.its.hawaii.edupmx11.its.hawaii.edu (Postfix) with ESMTP id E587118C023; Mon, 03 Sep :38: (HST) Received: from sak24.its.hawaii.edu (sak24.its.hawaii.edu [ ])sak24.its.hawaii.edu by kuhi.its.hawaii.edu ( /8.12.6) with ESMTP id q843ccvH023430; Mon, 03kuhi.its.hawaii.edu Sep :38: (HST) Date: Mon, 03 Sep :38: (HST) From: Dennis Streveler Cc: Message-id: sak24.its.hawaii.edu Subject: ICS 101 Help: Tuesday lecture -- Everything you THOUGHT you knew about NETWORKS and then some X-Mailer: sakai-mailsender 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa16

Applications: HTTP 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa17 HTTP Server Internet HTTP Client Hyper-Text Transfer Protocol (port 80) Request-response protocol When w/index.html is entered into a web browser (http client) w/index.html HTTP/ OK Date: Sun, 02 Sep :35:40 GMT Server: Apache Last-Modified: Tue, 21 Aug :27:18 GMT ETag: "7d3e c7bc86e86980" Accept-Ranges: bytes Content-Length: Content-Type: text/html... GET /~lipyeow/index.html HTTP/1.1 host: www2.hawaii.edu

Internet Security All data transmitted on the network using the protocols described thus far are in plaintext 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa18 Anyone with access to the physical network link can snoop on the bit sequences and decode according to the protocol stack! Anyone can read your s if he/she has access to a link on which your packets are transmitted Use encrypted connections eg. SSL/TLS

Secure HTTP -- HTTPS Use HTTP over a SSL/TLS layer (port 443) Negotiate a stateful encrypted connection to carry the HTTP messages. Use a trusted 3 rd party (CA) to verify identity Use public key handshake to establish a session key Encrypt subsequent messages using session key 9/4/2012Lipyeow Lim -- University of Hawaii at Manoa19 HTTPS Server HTTPS Client Certificate Authority certificate session key verify certificate HTTP messages