Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.

Slides:



Advertisements
Similar presentations
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Advertisements

1.1 Chapter 1 Introduction Lecture # 1 – 2 Ali Mustafa.
CMP206 – Introduction to Data Communication & Networks Lecture 1 - Networking Fundamentals.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
Internetworking Fundamentals (Lecture #1) Andres Rengifo Copyright 2008.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
A Guide to major network components
Networking Components
Computer Communication & Networks
Data Communication and Networking
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
Introduction to Data communication
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Week one - networks and Layered Communication Introduction to Networks Layered Communication OSI Model The Physical Layer The Data Link Layer.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Common Devices Used In Computer Networks
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Module 2: Information Technology Infrastructure
Networks QUME 185 Introduction to Computer Applications.
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Hub  A hub is a piece of hardware that connects multiple wired devices together on a single network. Hubs work at the physical layer (layer 1) of the.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Lecturer: Tamanna Haque Nipa
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Internetworking Concept and Architectural Model
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
1 Overview Remember, we are just beginning to herd the cats. Much of this will become clearer LATER! The more we learn, the more all of this will come.
Telecommunications, the Internet, and Wireless Technology.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
William Stallings Data and Computer Communications
Lecture 8 Virtual Switching (contd.) & Message Switching.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Introduction to Data Communication
3.2 Software Fundamentals. A protocol is a formal description of digital message formats and the rules for exchanging those messages in or between computing.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
When we communicate, we are sharing information. This sharing can be local or remote. Between individuals, local communication usually occurs face to face,
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
WAN Transmission Media
TOPIC 1.2 INTRODUCTION TO NETWORKING. OBJECTIVES By the end of the topic, students should be able to: a) List the elements of data communication systems.
Computer Network Architecture Lecture 2: Fundamental of Network.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
1. Introduction and Background Network Performance and Quality of Service.
Introduction and Overview of Network and Telecommunications.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Select appropriate hardware for building networks. Objective Course Weight 2%
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
1. Layered Architecture of Communication Networks: Circuit Switching & Packet Switching.
Computer Network Architecture Lecture 1: Introduction to Computer Networking.
MITM753: Advanced Computer Networks
Introduction and Overview of Network and Telecommunications
Some Important Network Characteristics for Security
CHAPTER 2 THE OSI MODEL.
Outline Network characteristics that affect security
Basics of Telecommunications and Networks
Presentation transcript:

Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014

Lecture 6 Page 2 Advanced Network Security Outline Network basics Packet switching Protocols and layering Internet architecture Routing Naming

Lecture 6 Page 3 Advanced Network Security Introduction Networking is a key technology for modern computer use An inherently complex subject I assume you’ve taken one or more networking classes So we’ll just do a quick review of important points here

Lecture 6 Page 4 Advanced Network Security Networking Basics Modern networks send and receive messages –Explicit operations on each end Depending on specifics, other hardware or media are also involved –Routers, switches, gateways –Media Wireless and wired

Lecture 6 Page 5 Advanced Network Security The Network Link A cable, wire, or perhaps just the aether The medium through which electromagnetic signals travel A piece of equipment on one end of the link creates the signal A piece on the other end receives and interprets it

Lecture 6 Page 6 Advanced Network Security Multihop Networking Most networks consist of more than one physical link Typically connected by routers or switches –We can think of them as special purpose computers Each network link represents a hop on a path from source to destination Modern networks expect most data to travel multiple hops

Lecture 6 Page 7 Advanced Network Security Organizing Multihop Networks Typically, routers and switches connect to a fixed, known set of links –Single hop mobile wireless is an important, but simple, exception –Wireless ad hoc networks are a less important, but complex, exception Part of the network’s job is to figure out which hops to use in each case

Lecture 6 Page 8 Advanced Network Security Circuit Switching Sender Receiver I want to talk to my buddy The network sets up an explicit path The network maintains that path All the information takes that path

Lecture 6 Page 9 Advanced Network Security Packet Switching Sender Receiver I want to talk to my buddy The network finds a new path for each packet The network does not remember paths The information might take many paths

Lecture 6 Page 10 Advanced Network Security Modern Network Characteristics Modern networks are mostly packet switched –More efficient in many ways Mostly using protocols developed for the Internet Mostly traversing networks run by different parties

Lecture 6 Page 11 Advanced Network Security Some Interesting Properties of Networking Physical limitations –Speed of light –Limited spectrum in free space Limited bandwidth for realistic media More hostile environment than single computer

Lecture 6 Page 12 Advanced Network Security More Interesting Properties Inherently shared resource –Not just because of limited availability –Sharing is the point –But shared resource limits all users Usually any participant can address any other

Lecture 6 Page 13 Advanced Network Security Variations in Network Parameters Bandwidth, delay, loss rate can all vary by orders of magnitude –Sometimes geographically –Sometimes temporally Yet networks with extreme parameter values are expected to interoperate

Lecture 6 Page 14 Advanced Network Security The Major Network Parameters Bandwidth Delay Loss rate

Lecture 6 Page 15 Advanced Network Security Bandwidth How much data can be moved across a network in a unit time Limited by physical characteristics of network medium But effective bandwidth delivered can be further limited by implementation

Lecture 6 Page 16 Advanced Network Security Delay Time it takes to deliver a piece of data Again, a fundamental physical limit is at the core –The speed of light But how you do things can make it a lot worse Jitter – the amount of variation observed in network delay

Lecture 6 Page 17 Advanced Network Security Loss Rate How much of the data you submit to the network that does not get delivered –In its correct form Generally due to uncorrected noise in the network But also due to how one handles overload conditions

Lecture 6 Page 18 Advanced Network Security Network Protocols Sets of rules that define how the network is used All communicating parties need to agree on the rules –Or communications don’t work well/at all Modern networks make use of a relatively small set of protocols