Scis.regis.edu ● CS 468: Advanced UNIX Class 7 Dr. Jesús Borrego Regis University 1.

Slides:



Advertisements
Similar presentations
Introduction to TCP/IP
Advertisements

CCNA1 v3 Module 9 v3 CCNA 1 Module 9 JEOPARDY K. Martin Galo Valencia.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
IP Address 1. 2 Network layer r Network layer protocols in every host, router r Router examines IP address field in all IP datagrams passing through it.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
IP Addressing: introduction
IP Address 1. 2 Network layer r Network layer protocols in every host, router r Router examines IP address field in all IP datagrams passing through it.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
CSE452:Computer Networks
1 Version 3.0 Module 9 TCP/IP Protocol and IP Addressing.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
Chapter Overview TCP/IP Protocols IP Addressing.
CS 356 Systems Security Spring Dr. Indrajit Ray
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
OSI Model Routing Connection-oriented/Connectionless Network Services.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
DHCP: Dynamic Host Configuration Protocol
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 4 Network Layer.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different protocols pertaining to communications and networking.
Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Chapter 9.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 Introduction to Networking Dr. Mahdi Nasereddin PPU.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
Network Layer4-1 Subnets How many?
1 Chapter 4: Network Layer r 4.4 IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP m IPv6 r 4.5 Routing algorithms m Hierarchical routing.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Chapter 9 Networking Graham Glass and King Ables, UNIX for Programmers and Users, Third Edition, Pearson Prentice Hall, Original Notes by Raj Sunderraman.
1 TCP/IP Networking. 2 TCP/IP TCP/IP is the networking protocol suite most commonly used with UNIX, Windows, NT and most other OS’s. TCP/IP defines a.
1 TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Instructor & Todd Lammle
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
TCP/IP (Transmission Control Protocol / Internet Protocol)
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني.
Telecommunications Essentials John R. Durrett July 5, 2005.
The Internet Network layer
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
Network Basics CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Computer Communication Networks
Chapter 4: Network Layer
Wide Area Networks and Internet CT1403
DHCP: Dynamic Host Configuration Protocol
Presentation transcript:

scis.regis.edu ● CS 468: Advanced UNIX Class 7 Dr. Jesús Borrego Regis University 1

Topics IA Lab visit was scheduled for last week; rescheduled for next week Review of Homework 5 Networking Homework 6 Review for final Q&A 2

Networking Computers connecting to other computers Computers connecting to the Internet Network Topologies Network Devices Internetworking Communicating with Users Data distribution NFS 3

Communication model 4 Communications Infrastructure Source Transmitter Transmission System Receiver Destination

OSI Model 5 Physical Data Link Network Transport Session Presentation Application

Internet Protocol Stack 6 Transport Physical Data Link Control Network/ Internet Transport Application

OSI vs. IP 7 Physical Data Link Network Transport Session Presentation Application Physical Data Link Control Network/ Internet Transport Application

Ethernet Mbps 1 Gbps server Ethernet switch institutional router to institution’s ISP  typically used in companies, universities, etc ▫10 Mbps, 100Mbps, 1Gbps, 10Gbps Ethernet ▫today, end systems typically connect into Ethernet switch

Bridges Connects separate networks ▫One Ethernet network to another one ▫“Bridges” two network segments together ▫Makes it appear as if the two segments were a single one Wire length is limited due to degradation of signal Bridges allow extension of physical limitation of wire 9

Routers Bridges cannot accommodate large networks Routers connect two or more networks ▫“Routes” incoming messages to appropriate network Can be used to connect a LAN to an ISP (Internet Service Provider) Can be used to link the different networks in the global Internet 10

Gateway Used to connect remote LANs to a WAN (Wide Area Network) 11

Topologies Typical LAN topologies include: Bus ▫Single link for all computers Ring (Token) ▫Each computer connected to at least 2 other computers Star ▫Central server 12

Internetworking – Packet Switching 13  sequence of A & B packets has no fixed timing pattern  Time Division Multiplexing (TDM) A B C 100 Mb/s Ethernet 1.5 Mb/s D E statistical multiplexing queue of packets waiting for output link

Internet Address IPv4 – 4 Octets Class A: 0*.*.*.* (two reserved, all 0’s and all 1’s) Class B: 10*.*.*.* Class C: 110*.*.*.* Class D: 111*.*.*.* Class E: 1111*.*.*.* Many subnet calculators available online 14

Ports and common services 15

Users in your system users – local host users rusers - users on local network who – more info than users rwho – more info than rusers w – more information than who whois – information about major internet sites hostname – displays local host name finger – lists information about a user 16

Finger utility 17

User communication on a network write – send individual lines to user talk – interactive split screen two-way chat wall – send messages to all users on local host mail – send messages mesg – disables incoming messages to your terminal 18

File transfer on network Rcp (remote copy) – copy files from one host to another uucp (unix-to-unix copy) – like rcp, copies files between two hosts ftp (file transfer protocol/program) – copy files between local host and other hosts Commands for ftp: UPU page

Distributed access commands rlogin – provides login to remote servers rsh – execute shell commands on remote Unix hosts telnet – executes commands on remote telnet hosts 20

Network File System (NFS) Public domain specification developed by Sun Microsystems Allows you to mount several local file systems into a single network file hierarchy Provides remote mount capability Uses RPC to mount a file system on remote machine 21

Internet control ICANN – Internet Corporation for Assigned Names and Numbers – allocates names and domains ISOC – Internet Society – represents Internet users, technical advisory society IGF – Internet Governance Forum, global forum established by the United Nations in

Network Standards RFC: Request for Comments RFC 114/959: A File Transfer Protocol RFC 791: Internet Protocol RFC 793: Transmission Control Protocol RFC 1945: Hypertext Transfer Protocol HTTP 1.0 RFC 2251: Lightweight Directory Access Protocol RFC 2460: Internet Protocol v6 (IPv6) RFC 4251: Secure Shell (SSH) Protocol Architecture 24

Internet Protocols 26

Internet Protocols 27 BGP - Border Gateway Protocol FTP - File Transfer Protocol HTTP - Hypertext Transfer Protocol ICMP - Internet Control Message Protocol IGMP - Internet Group Management Protocol IP - Internet Protocol MIME - Multipurpose Internet Mail Extension Source: Stallings, W. (2007). Data and computer communications (8th ed.). Upper Saddle River, NJ: Pearson Prentice Hall.

Internet Protocols (Cont’d) 28 OSPF – Open Shortest Path First RSVP – Resource ReSerVation Protocol SMTP – Simple Mail Transfer Protocol SNMP – Simple Network Management Protocol TCP – Transmission Control Protocol UDP – User Datagram Protocol Source: Stallings, W. (2007). Data and computer communications (8th ed.). Upper Saddle River, NJ: Pearson Prentice Hall.

Sample Flow 31 Server Application Presentation Session Transport Network Data Link Physical Data Server Application Presentation Session Transport Network Data Link Physical Data

IPv4 32

IPv6 33

Internet Addressing Media Access Control (MAC): used by hardware IPv4 and IPv6 used by software to determine source, destination, and component location (NIC, not computers) Hostnames used by people Data link layer maps IPs to hardware Hostnames can map names to IPs 34

Sample subnet calculator 35 Source:

CIDR Classless Inter-Domain Routing Netmasks that do not end in a byte boundary Each byte has 8 bits To subnet with 26 bits – not a byte boundary (8, 16, 24), we use the convention /26 37

26 bits6 bits

CIDR Calculator 39 Source:

NAT Private addresses can be used internally by an organization NAT captures internal addresses and prevents them from exiting the corporate environment NAT maintains a table of internal versus external addresses to ensure that no internal addresses escape to the global Internet 42

Routing The process of determining the output path for an incoming packet Routing tables are maintained in the kernel and also in routers throughout the Internet If the server does not know where to send it next, it uses the Address Resolution Protocol to determine next action 44

Routing value in arriving packet’s header routing algorithm local forwarding table header value output link

ARP ARP discovers the hardware address associated with an IP address If the destination address is not in the same network, ARP determines the next hop router If address is not known, it send a broadcast message “Does anybody know where X is?” Response is received and then the protocol uses the response 46

DHCP Dynamic Host Configuration Protocol (RFC 2131) When a host connects to a network, it obtains a ‘lease’ on an IP address, gateways, DNS name servers, Syslog hosts, and others. If the lease is not renewed, it expires 47

DHCP interaction 48 DHCP server: arriving client time DHCP discover src : , 68 dest.: ,67 yiaddr: transaction ID: 654 DHCP offer src: , 67 dest: , 68 yiaddrr: transaction ID: 654 Lifetime: 3600 secs DHCP request src: , 68 dest:: , 67 yiaddrr: transaction ID: 655 Lifetime: 3600 secs DHCP ACK src: , 67 dest: , 68 yiaddrr: transaction ID: 655 Lifetime: 3600 secs

Security Issues Default IP forwarding on a server should be disabled to prevent the server to act as a router ICMP redirect (you should not send packet to me, send to XYZ) can compromise system Source routing can slip through firewalls ▫Do not want to accept or forward source- routed packets 49

Security Issues (Cont’d) IP spoofing means changing source or destination in packet header ▫Receiver may believe source and reply to a malicious server (man-in-the-middle attack) Host-based firewalls are preferred to client- based firewalls VPN – allow remote uses to create ‘tunnels’ to the private network ▫Requires encryption 50

Virtual Private Network (VPN) IP spoofing means changing source or destination in packet header ▫Receiver may believe source and reply to a malicious server (man-in-the-middle attack) Host-based firewalls are preferred to client- based firewalls VPN – allow remote uses to create ‘tunnels’ to the private network ▫Requires encryption 51

52 VPN

Routing Routing has different meanings: ▫Actual forwarding packets ▫Management of routing tables Routing consists of determining the ‘next hop’ in the route towards the destination 63

Routing Daemons Routing daemons collect information from three sources: ▫Configuration files ▫Existing routing tables ▫Routing daemons on other systems Daemons collect this information to determine optimal route and new routes are added to routing tables 65

Homework 6 (last) 1.What is the difference between a bridge, a router, and a gateway? 2.Describe 3 Internet Protocols and provide examples of where they can be used. 3.What are the differences between ftp and rcp? Which one is better and why? 4.Explain how ICMP redirection can cause vulnerabilities in a network. 5.Using an IP subnet calculator of your choice, answer the questions in E14.3 found in the USAH book. Capture the calculator screen. 68

Review for Final Same format as Midterm ▫2 hour, take home ▫8 questions ▫ to by midnight ▫All material from week 4-7 Week 8: 2 hour class, 2 hour take home final 69

Questions? 70