Fall 2008CS 334: Computer Security1 Networks Tutorial.

Slides:



Advertisements
Similar presentations
Introduction 2 1: Introduction.
Advertisements

Spring 2000CS 4611 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics.
COS 461 Fall 1997 Networks and Protocols u networks and protocols –definitions –motivation –history u protocol hierarchy –reasons for layering –quick tour.
T.Sharon-A.Frank 1 Internet Resources Discovery (IRD) Introduction to the Internet/WWW.
EECS122 - UCB13 TOCTOC: Introduction Network Examples Network Components Ethernet Interconnected LANs Internetwork Types of Networks Internet Packets Transport.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
1 Katz, Stoica F04 EECS 122: Introduction to Computer Networks Network Service and Applications Computer Science Division Department of Electrical Engineering.
Networking Support In Java Nelson Padua-Perez Chau-Wen Tseng Department of Computer Science University of Maryland, College Park.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
1 CS 268: Graduate Computer Networks – Spring 2005  Instructors: -Scott Shenker 683 Soda -Ion Stoica.
CS 552 Computer Networks Fall 2004 Rich Martin. Course Description Graduate course on computer networking –Undergraduate knowledge of networking assumed.
Review on Networking Technologies Linda Wu (CMPT )
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
What’s the Internet: “nuts and bolts” view
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
CP476 Internet ComputingCh.1 # 1 Lecture 2. A Brief Introduction to the Internet The objective is to understand The history of Internet What the Internet.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 0 TCP/IP Overview.
CS448 Computer Networking Chapter 1 Introduction to Computer Networks Instructor: Li Ma Office: NBC 126 Phone: (713)
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
1 CS 268: Graduate Computer Networks – Spring 2004  Instructor: -Ion Stoica 645 Soda Hall)  Lecture time: MW, 9:00-11:30 am.
1: Introduction1 Internet History r 1961: Kleinrock - queueing theory shows effectiveness of packet- switching r 1964: Baran - packet- switching in military.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
CPS Today’s topics Computer Applications Computer Communications Upcoming Computer Security ( Great Ideas, Chapter 11) Reading Great Ideas, Chapter.
Huda AL_Omairl - Network 71 Protocols and Network Software.
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
Human-Computer Interface Course 4. Content History of Internet What is Internet ? Internet Protocols The OSI 7 layers model TCP/IP The World Wide Web.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
CS 6401 Internetworking Outline Internet Architecture Best Effort Service Model.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_a Transport Protocols - UDP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Ch 1. Computer Networks and the Internet Myungchul Kim
The Transport Layer application transport network data link physical application transport network data link physical application transport network data.
Chapter 1 Communication Networks and Services Network Architecture and Services.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
William Stallings Data and Computer Communications
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 Network Communications A Brief Introduction. 2 Network Communications.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Network Processing Systems Design
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
Computer Communications
Graciela Perera Introduction Graciela Perera
CS 3214 Computer Systems Networking.
Slides taken from: Computer Networking by Kurose and Ross
CS 3214 Computer Systems Lecture 21 Godmar Back.
Chapter 5 Network and Transport Layers
CS 3214 Computer Systems Networking.
Computer Science 457 Networking and the Internet
TCP/IP Protocol Suite: Review
Network Basics and Architectures Neil Tang 09/05/2008
Presentation transcript:

Fall 2008CS 334: Computer Security1 Networks Tutorial

Thanks… To Anthony Joseph, Doug Tygar, Umesh Vazirani, and David Wagner for generously allowing me to use their slides as the basis for this set of slides. Fall 2008CS 334: Computer Security2

Outline Communications Network Taxonomy –Packet Networks The Internet Transport Layer: UDP/IP, TCP/IP Network Service Examples P2P applications Fall 2008CS 334: Computer Security3

What is a Communications Network? (End-system Centric View) Network offers one basic service: move information –Bird, fire, messenger, truck, telegraph, telephone, Internet … What distinguish different types of networks? –The services they provide, security, … Fall 2008CS 334: Computer Security4

What is a Communications Network? (End-system Centric View) What distinguish the services? –Latency –Bandwidth –Loss rate –Number of end systems –Service interface (how to invoke the service?) –Others Reliability, unicast vs. multicast, real-time... What are the security issues? –Authentication, privacy, anonymity, integrity, … Fall 2008CS 334: Computer Security5

What is a Communication Network (Infrastructure Centric View) Communication medium: electron, photon Network components: –Links – carry bits from 1 place to 1 or more: fiber, copper, wireless,… –Interfaces – attach devices to links –Switches/routers – interconnect links: electronic/optic, crossbar/Banyan –Hosts – communication endpoints: PCs, PDAs, cell phones, toasters Fall 2008CS 334: Computer Security6

What is a Communication Network (Infrastructure Centric View) Protocols – rules governing communication between nodes –TCP/IP, ATM, MPLS, SONET, Ethernet, X.25 Applications: Web browser, X Windows, FTP,... Low-level security issues: –Authentication, privacy, integrity, … Fall 2008CS 334: Computer Security7

Network Components (Examples) Fall 2008CS 334: Computer Security8 LinksInterfacesSwitches/routers Fibers Coaxial CableTelephone switch Large router Wireless card Ethernet card

Taxonomy of Communication Networks Communication networks can be classified based on the way in which the nodes exchange information: Fall 2008CS 334: Computer Security9 Communication Network Broadcast Communication Network Switched Communication Network Circuit-switched Communication Network Packet-switched Communication Network Virtual Circuit Network Datagram Network

Broadcast vs Switched Communications Networks Broadcast Communication Networks –Information transmitted by any node is received by every other node in the network Examples: usually in LANs (non-switched Ethernet, WiFi) Switched Communication Networks –Information transmitted to a sub-set of designated nodes Examples: WANs (Telephony Network, Internet), switched Ethernet –Problem: how to forward information to intended node(s)? Done by special nodes (e.g., routers, switches) executing routing protocols Can the routing process be subverted? Fall 2008CS 334: Computer Security10

Taxonomy of Communication Networks Communication networks can be classified based on the way in which the nodes exchange information: Fall 2008CS 334: Computer Security11 Communication Network Broadcast Communication Network Switched Communication Network Circuit-switched Communication Network Packet-switched Communication Network Virtual Circuit Network Datagram Network Public Telephone Network

Taxonomy of Communication Networks Communication networks can be classified based on the way in which the nodes exchange information: Fall 2008CS 334: Computer Security12 Communication Network Broadcast Communication Network Switched Communication Network Circuit-switched Communication Network Packet-switched Communication Network Virtual Circuit Network Datagram Network

Datagram Packet Switching Each packet is independently switched –Each packet header contains destination address No resources are pre-allocated (reserved) in advance Example: IP networks Fall 2008CS 334: Computer Security13

Timing of Datagram Packet Switching Fall 2008CS 334: Computer Security14

Datagram Packet Switching Fall 2008CS 334: Computer Security15

Outline Communications Network Taxonomy –Packet Networks The Internet Transport Layer: UDP/IP, TCP/IP Network Service Examples P2P applications Fall 2008CS 334: Computer Security16

The Internet Global scale, general purpose, heterogeneous- technologies, public, computer network Internet Protocol –Open standard: Internet Engineering Task Force (IETF) as standard body ( ) –Technical basis for other types of networks Intranet: enterprise IP network Developed by the research community Fall 2008CS 334: Computer Security17

History of the Internet 68-70’s: started as a research project, 56 kbps, initially 4 nodes (UCLA, UCSB, SRI, Utah) then < 100 computers 80-83: TCP/IP, DNS; ARPANET and MILNET split 85-86: NSF builds NSFNET as backbone, links 6 Supercomputer centers, 1.5 Mbps, 10,000 computers 87-90: link regional networks, NSI (NASA), ESNet (DOE), DARTnet, TWBNet (DARPA), 100,000 computers Fall 2008CS 334: Computer Security18

History of the Internet 90-92: NSFNET moves to 45 Mbps, 16 mid-level networks 94: NSF backbone dismantled, multiple private backbones; Introduction of Commercial Internet Today: backbones run at 10 Gbps, close to 600M computers in 150 countries Fall 2008CS 334: Computer Security19

Network “Cloud” Fall 2008CS 334: Computer Security20

Regional Nets + Backbone Fall 2008CS 334: Computer Security21

Backbones + NAPS + ISPs Fall 2008CS 334: Computer Security22

Core Networks + Access Networks Fall 2008CS 334: Computer Security23

Computers Inside the Core Fall 2008CS 334: Computer Security24

Internet Protocol Layers Fall 2008CS 334: Computer Security25

Services Provided by the Internet Shared access to computing resources –telnet (1970’s), ssh (1990’s) Shared access to data/files –FTP, NFS, AFS (1980’s), CIFS (late 90’s) Communication medium over which people interact – (1980’s), on-line chat rooms, instant messaging (1990’s) –audio, video, Voice-over-IP (1990’s, early 00’s) replacing telephone network? Fall 2008CS 334: Computer Security26

Services Provided by the Internet Medium for information dissemination –USENET (1980’s) –WWW (1990’s) replacing newspaper, magazine? –Audio, video (late 90’s, early 00’s) replacing radio, TV? –File sharing (late 90’s, early 00’s) Fall 2008CS 334: Computer Security27

Addressing Every Internet host has an IP address –e.g., Packets include destination address –Network is responsible for routing packet to address Host-view: Fall 2008CS 334: Computer Security28 helllowthe

IP-centric View Fall 2008CS 334: Computer Security29

Routing Routers have “routing tables” –Tables mapping each destination with an outgoing link –Requires that routing table is highly compressible! –Implications for address assignment, mobility, etc. Routing decisions made packet-by-packet –Routers keep no connection state Question: Why have the network do routing? –Why not the hosts? –Compare delivery-by-hand to FedEx Fall 2008CS 334: Computer Security30

Internet Service “Best-Effort” service –No guarantees about packet delivery –Hosts must cope with loss, delay, reordering, duplication Why not guarantee no loss and low delay? IP packets are addressed to a host –How to decide which application gets which packets? Need a transport layer! Fall 2008CS 334: Computer Security31

Outline Communications Network Taxonomy –Packet Networks The Internet Transport Layer: UDP/IP, TCP/IP Network Service Examples P2P applications Fall 2008CS 334: Computer Security32

Transport Layer Fall 2008CS 334: Computer Security33

Ports Need to decide which application gets which packets Solution: map each socket to a port Client must know server’s port Separate 16-bit port address space for UDP and TCP –(src_IP, src_port, dest_IP, dest_port) uniquely identifies TCP connection Well known ports (0-1023): everyone agrees which services run on these ports –e.g., ssh: 22, http: 80 –On UNIX, must be root to gain access to these ports (why?) Ephemeral ports (most ): given to clients –e.g., chat client gets one of these Fall 2008CS 334: Computer Security34

Fall 2008CS 334: Computer Security35 IP Internet Protocol Stack (note difference between TCP and IP) R1 ETH FDDI IP ETH TCP R2 FDDI PPP IP R3 PPP ETH IP H1 IP ETH TCP H8

Headers IP header: used for IP routing, fragmentation, error detection… UDP header: used for multiplexing/demultiplexing, error detection TCP header: used for multiplexing/demultiplexing, flow and congestion control Fall data TCP/UDP IP Application TCP IP UDP Application TCP IP UDP data TCP/UDP IP

UDP User Datagram Protocol Minimalist transport protocol Same best-effort service model as IP Messages up to 64KB “Fire and Forget” Provides multiplexing/demultiplexing to IP Does not provide flow and congestion control Application examples: video/audio streaming, VoIP Fall 2008CS 334: Computer Security37

UDP Service and Header Service: –Send datagram from (IPa, Port 1) to (IPb, Port 2) –Service is unreliable, but error detection possible Header: UDP length is UDP packet length (including UDP header and payload, but not IP header) Optional UDP checksum is over UDP packet Fall 2008CS 334: Computer Security38 Source port UDP length Destination port Payload (variable) UDP checksum 01631

TCP Transmission Control Protocol Reliable, in-order, and at most once delivery Messages can be of arbitrary length Provides multiplexing/demultiplexing to IP Provides congestion control and avoidance Application examples: file transfer, chat, P2P Fall 2008CS 334: Computer Security39

TCP Service 1.Open connection 2.Reliable byte stream transfer from (IPa, TCP Port1) to (Ipb, TCP Port2) 1.Indication if connection fails: Reset 3.Close connection Fall 2008CS 334: Computer Security40

TCP Timing Diagram Fall 2008CS 334: Computer Security41 Hello there This is good

Outline Communications Network Taxonomy –Packet Networks The Internet Transport Layer: UDP/IP, TCP/IP Network Service Examples P2P applications Fall 2008CS 334: Computer Security42

Domain Name Service (DNS) Humans/applications use machine names –e.g., Network (IP) uses IP addresses –e.g., DNS translates between the two –An overlay service in its own right –Global distribution of name-to-IP address mapping — a kind of content distribution system as well –Unsung hero of the Internet Fall 2008CS 334: Computer Security43

File Transfer (FTP, SCP, etc) Fall 2008CS 334: Computer Security44

Question Why isn’t the network in this picture? –Network just delivers (or not) packets to their destination –It plays no other role in application Obvious concept now, but novel at the time –Makes it both harder and easier for applications –Hosts more complex, applications less efficient –Long-term flexibility Security issues are hidden –Ex: Broadcast vs. switched Fall 2008CS 334: Computer Security45

message exchange is similar to previous example, except Exchange is between mail servers DNS gives name of mail server for domain Fall 2008CS 334: Computer Security46

Web Fall 2008CS 334: Computer Security47

Outline Communications Network Taxonomy –Packet Networks The Internet Transport Layer: UDP/IP, TCP/IP Network Service Examples P2P applications Fall 2008CS 334: Computer Security48

Challenges Find where a particular file is stored –Napster used central servers to store index Scaling to hundreds of millions Machines come and go Fall 2008CS 334: Computer Security49

P2P Services in the Internet: Napster, Gnutella, BitTorrent Fall 2008CS 334: Computer Security50