Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.

Slides:



Advertisements
Similar presentations
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Advertisements

5: DataLink Layer5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: Were making these slides freely available to all (faculty, students,
Introduction 2 1: Introduction.
Dr. Philip Cannata 1 Computer Networking. Dr. Philip Cannata 2.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
Introduction to Security Computer Networks Computer Networks Term B10.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security Lecture.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
CS 325 Computer Networks Sami Rollins Fall 2003.
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Network Architecture and the OSI Reference Model Computer Networks Computer Networks Term B10.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks.
Dr. Philip Cannata 1 Principles of Network Applications.
CPSC 441 TUTORIAL TA: FANG WANG NETWORK SECURITY.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Protocol layers, service models.
Introduction1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Introduction Protocol “layers” Networks are complex, with many “pieces”:  hosts  routers  links of various media  applications  protocols  hardware,
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
Introduction Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
ECE 4400:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi.
Introduction 1-1 “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
Chapter 3 Transport Layer
Chapter 1 Introduction Circuit/Packet Switching Protocols Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
TCP/IP Network.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Introduction 1-1 Networking Admin  1 to 4 lectures a week for 11 weeks for a total of 23 lectures  Interleaves with Functional Programming  First prac.
OSI Model Data Communications. 7 layer “research” model ApplicationPresentationSessionTransportNetworkLinkPhysical.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
CPSC441 Computer Communications Aniket Mahanti Introduction 1-1.
CPSC 441 TUTORIAL – APRIL 4, 2012 TA: MARYAM ELAHI NETWORK SECURITY.
Marina Papatriantafilou – Introduction to computer communication Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
1: Introduction1 Internet Services and Protocols Adapted from “Computer Networking: A Top Down Approach Featuring the Internet” Kurose and Ross, Addison.
Introduction 1-1 1DT057 Distributed Information Systems Chapter 1 Introduction.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Computer Networks Dr. Adil Yousif CS Lecture 1.
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420.
Graciela Perera Introduction Graciela Perera
CS 3214 Computer Systems Networking.
Day 01 - The Internet.
Part 0: Networking Review
Network Introduction.
Slides taken from: Computer Networking by Kurose and Ross
OSI Protocol Stack Given the post man exemple.
CS 3214 Computer Systems Networking.
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 423.
Chapter 3 Transport Layer
Chapter 1: Introduction
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
Chapter 1 Introduction Computer Networking: A Top Down Approach
Presentation transcript:

Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) that you mention their source (after all, we’d like people to use our book!)  If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

Introduction What’s the Internet: “nuts and bolts” view  millions of connected computing devices:  hosts = end systems  running network apps  communication links  fiber, copper, radio, satellite  transmission rate: bandwidth  Packet switches: forward packets (chunks of data)  routers and switches wired links wireless links router mobile network global ISP regional ISP home network institutional network smartphone PC server wireless laptop 1-2

Introduction  Internet: “network of networks”  Interconnected ISPs  protocols control sending, receiving of msgs  e.g., TCP, IP, HTTP, Skype, What’s the Internet: “nuts and bolts” view mobile network global ISP regional ISP home network institutional network 1-3

What’s the Internet: “service” view  Infrastructure that provides services to applications:  Web, VoIP, , games, e- commerce, social nets, …  provides programming interface to apps  hooks that allow sending and receiving app programs to “connect” to Internet  provides service options, analogous to postal service mobile network global ISP regional ISP home network institutional network Introduction 1-4

Introduction What’s a protocol? human protocols:  “what’s the time?”  “I have a question”  introductions … specific msgs sent (syntax) … specific actions taken when msgs received, or other events (semantics) network protocols:  machines rather than humans  all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt 1-5

Introduction a human protocol vs. a computer network protocol: Hi Got the time? 2:00 TCP connection response Get time TCP connection request What’s a protocol? 1-6

Introduction A closer look at network structure:  network edge:  hosts: clients and servers  servers often in data centers  access networks, physical media: wired, wireless communication links  network core:  interconnected routers  network of networks mobile network global ISP regional ISP home network institutional network 1-7

Introduction Access networks and physical media Q: How to connect end systems to edge router?  residential access nets  institutional access networks (school, company)  mobile access networks 1-8

Introduction  mesh of interconnected routers  packet-switching: hosts break application-layer messages into packets  forward packets from one router to the next, across links on path from source to destination The network core 1-9

Introduction Protocol “layers” Networks are complex, with many “pieces”:  hosts  routers  links of various media  applications  protocols  hardware, software Question: is there any hope of organizing structure of network? …. or how to deal with complexity? 1-10

Introduction Why layering? dealing with complex systems:  explicit structure allows identification, relationship of complex system’s pieces  layered reference model for discussion  modularization eases maintenance, updating of system  change of implementation of layer’s service transparent to rest of system  e.g., change in gate procedure doesn’t affect rest of system 1-11

Introduction Internet (TCP/IP) protocol stack  application: supporting network applications  FTP, SMTP, HTTP, Skype, etc.  transport: process-process data transfer  TCP, UDP  network: routing of datagrams from source to destination  IP, routing protocols  link: data transfer between neighboring network elements  Ethernet, (WiFi), PPP  physical: bits “on the wire” application transport network link physical 1-12

Introduction ISO/OSI reference model  presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine-specific conventions  session: synchronization, checkpointing, recovery of data exchange  Internet stack “missing” these layers!  these services, if needed, must be implemented in application  needed? application presentation session transport network link physical 1-13

Introduction source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M network link physical link physical HtHt HnHn HlHl M HtHt HnHn M HtHt HnHn M HtHt HnHn HlHl M router switch Encapsulation message M HtHt M HnHn frame 1-14

Introduction Network security  field of network security:  how bad guys can attack computer networks  how we can defend networks against attacks  how to design architectures that are immune to attacks  Internet not originally designed with (much) security in mind  original vision: “a group of mutually trusting users attached to a transparent network”  Internet protocol designers playing “catch-up”  security considerations in all layers! 1-15

Introduction Bad guys: put malware into hosts via Internet  malware can get in host from:  virus: self-replicating infection by receiving/executing object (e.g., attachment)  worm: self-replicating infection by passively receiving object that gets itself executed  spyware malware can record keystrokes, web sites visited, upload info to collection site  infected host can be enrolled in botnet, used for spam. DDoS attacks 1-16

Introduction target Denial of Service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (botnet) 3. send packets to target from compromised hosts Bad guys: attack server, network infrastructure 1-17

Introduction Bad guys can sniff packets packet “sniffing”:  broadcast media (shared ethernet, wireless)  promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A B C src:B dest:A payload  Wireshark is a (free) packet-sniffer 1-18

Introduction Bad guys can use fake addresses IP spoofing: send packet with false source address A B C src:B dest:A payload 1-19 … lots more on cybersecurity