I-1 Internet Intro Taekyoung Kwon

Slides:



Advertisements
Similar presentations
TCP/IP MODEL Maninder Kaur
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
Evolution of the Internet Mrs. Wilson Internet Basics & Beyond Rocky Point High School.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
Introduction to TCP/IP TCP / IP –including 2 protocols Protocol : = a set of rules that govern the communication between different devices Protocol : =
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
IS Network and Telecommunications Risks
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Middle Boxes Lixia Zhang UCLA Computer Science Dept Sprint Research Symposium March 8-9, 2000.
Review on Networking Technologies Linda Wu (CMPT )
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
DELAY-TOLERANT NETWORKS Volodymyr Goncharov Freiburg Uni, WS 2009, Seminar Ad Hoc Netzwerke.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Network Components 101 Travis Hill.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Network protocols
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Release 16/07/2009Jetking Infotrain Ltd. Assembling and Cabling Cisco Devices Chapter 3.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 3.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Internet Security - Farkas1 CSCE 813 Internet Security TCP/IP.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
The Internet Trisha Cummings ITE115. What is the Internet? The Internet is a world-wide network of computer networks that use a common communications.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Network Architecture: Design Philosophies IS250 Spring 2010 John Chuang
Networking & the Internet. 2 What is a Network? □ A computer network allows computers to communicate with many other computers and to share resources.
Management for IP-based Applications Mike Fisher BTexaCT Research
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Overview Remember, we are just beginning to herd the cats. Much of this will become clearer LATER! The more we learn, the more all of this will come.
Chapter 5 Networking and Communication. Learning Objectives Upon successful completion of this chapter, you will be able to: understand the history and.
1 Lecture # 21 Evolution of Internet. 2 Circuit switching network This allows the communication circuits to be shared among users. E.g. Telephone exchange.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
Multimedia & Mobile Communications Lab.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
IPv 邱文揚 Joseph 李家福 Frank. Introduction The scale of IPv4 Internet has become far larger than one could ever imagine when designing.
Mas Idayu Sabri 2004 WXET1143: Introduction to the Internet, Intranet and Extranet. Lecture1: Introduction.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Network Processing Systems Design
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
COMPUTER NETWORKS and INTERNETS
A quick intro to networking
* Essential Network Security Book Slides.
I. Basic Network Concepts
Chapter 11 Inventing the Internet
Computing Over Distance
Application Layer Mobility Management Scheme for Wireless Internet
دیواره ی آتش.
Topic 12: Virtual Private Networks
ARPANET, Internet, Truth, Justice, Freedom of Speech, ...
Presentation transcript:

i-1 Internet Intro Taekyoung Kwon

Internet Background Era of Cold War –Sputnik in > ARPA, NASA Government sponsored goal –Department of Defense (DoD) To maintain communication via computers even with threat of war –No central authority –Designed to operate while some systems are broken 2

Another motivation Na ï ve researchers 3 ARPA -> Defense Advanced Research Projects Agency (DARPA)

Paradigm shift Circuit switching → Packet Switching –data to be transmitted is divided into small packets of information and labeled to identify the sender and recipient –sent over a network and then reassembled at their destination –if any packet did not arrive or was not intact, original sender is requested to resend the packet 4

Context When Packet Switching was proposed –Packet Switching is a new idea telco gave it a -5 on a scale of 1-10 –Computers are million dollar items and ARPA can’t buy new ones every year but minicomputers have just arrived –Time-sharing and inter-process communication are new ideas –Personal Computers don’t exist –Networks are expensive 5

The Internet is born in Enable sharing of supercomputer power 4 nodes –UCLA –Stanford (SRI) –UC Santa Barbara –U of Utah Including BBN, some say 5 nodes

Zoom in to UCLA 7 Interface Message Processor

1972: Robert Kahn 8

2000s: middle-age Now it faces problems 9 IP TCP UDP Applications token radio, copper, fiber PPP Eth IP “hourglass” IP TCP UDP Applications token radio, copper, fiber PPP Eth diffserv intserv mcast mobile NAT IPSEC Expanding waist?

Internet standardization Protocol: a set of rules governing communication between hosts or devices 10 3GPP, IEEE

11 Now around 1B hosts! But count only hosts with domain names Internet hosts

Network prefixes 12 Source: bgp.potaroo.net

13 Traffic breakdown Cisco: By 2013 Video Will Be 90 Percent Of All Consumer IP Traffic And 64 Percent of Mobile

Environment: trusted → untrusted Requires a far more secure Internet –What do we mean by security? –What aspects are the network’s responsibility? Major design challenges: –Resilience to large-scale external attacks (DDoS) –Resilience to compromised routers –Easy authentication of data –Forensics and auditing –Providing both accountability and privacy 14

users: researchers → customers Customers demand high availability –Service is almost never interrupted Internet was designed for strong recovery properties –Recovering from serious failures How can the Internet provide 5 9’s of availability? –and doing so in a cost-effective manner –Internet currently at 2-3 9’s 15

operators: nonprofit → commercial Operators must be able to manage their networks –Configuration –Troubleshooting –Middleboxes (proxies, firewalls, NATs, etc.) –Policy (routing, access control) What are the right abstractions for management? –What mechanisms best support them? 16

usage: host-oriented → data- oriented Internet was designed around a host-oriented model –User tells client to contact another host (telnet, ftp) Current usage is mostly data-centric –User wants to access particular data or service –Does not care where that service is located Mismatch currently handled by ad hoc mechanisms –Akamai, P2P Right abstractions for a data-oriented Internet? 17

connectivity: e2e IP → intermittent Architecture assumes end-to-end IP connectivity In some niche settings, each link is intermittent and end-to-end connectivity is rare –Space, underwater, developing economies –Led to call for “delay-tolerant networking” (DTN) More generally want to shield applications from networking details –Opportunistic and context-dependent communication What’s the right API to enable this generality? 18

New requirements Mobility Scalability (e.g. network prefixes) Traffic Explosion (Especially wireless) Multicasting/Broadcasting Security Delay tolerant networks (DTNs) –E.g. vehicular ad hoc networks (VANETs) Multimedia, realtime applications –Video Adaptation –QoS, QoE Data center network Cyber physical system (CPS) E-911 –Should be able to disseminate emergency info –Spatial distribution 19