Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Computer networks Fundamentals of Information Technology Session 6.
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
CCNA – Network Fundamentals
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Socket Programming.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Latest version of Protocol.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Application Layer PART VI.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
What Is TCP/IP? The large collection of networking protocols and services called TCP/IP denotes far more than the combination of the two key protocols.
Distributed Systems Architecture Presentation II Presenters Rose Kit & Turgut Tezir.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Chapter 31 File Transfer & Remote File Access (NFS)
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Network Services Networking for Home & Small Business.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
112 Case of C/S Client/Server Security Client/Server on the Internet Distribute DBMS Distributed Programming Distributed Object-Oriented Computing Distribute.
BASIC INTERNET PROTOCOLS: http, ftp, telnet. Mirela Walczak.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Web Server.
Understand Internet Security LESSON Security Fundamentals.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
Java’s networking capabilities are declared by the classes and interfaces of package java.net, through which Java offers stream-based communications that.
Securing Access to Data Using IPsec Josh Jones Cosc352.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Securing Interconnect Networks By: Bryan Roberts.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Protocol Application TCP/IP Layer Model
Designing IIS Security (IIS – Internet Information Service)
Computer Networks Protocols
Presentation transcript:

Distributed Systems Ryan Chris Van Kevin

Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors and multicomputers Network Operating System –Specifically Written To Run Networks –Joins together many computers that each have their own operating system and allows them to share resources –Used for Local Area and Wide Area Networks

Internet vs. Intranet Internet –Public Network of Networks –Easily Accessible Through an ISP Intranet –Local and Private –Much Faster and Secure –Contained Within a Company or Business

Issues Relating To D.S. Transparency –Hides “Behind The Scenes” Activities Scalability –Whether or not a system can grow without loss of performance Software Interfaces –A distributed system can have many different types/brands of computers with different operating systems Security –Risks of security can arise from internal or external affairs in a distributed system

Packets Packets are fundamental units of information carriage used in computer networks A packet consists of three elements: Header, Data Area, and Trailer A datagram is a packet that can be sent independently of any connection setup

Protocol A standard that controls or enables the connection, communication, and data transfer between two computer endpoints Most recognizable protocol is the Internet protocol known as TCP/IP

Sockets There are two types of sockets: –Internet –IPC (Inter-Process Communication) IPC can be used in computing networking to create one end of a bi-directional link between two programs Defined as a combo of an IP address, a protocol, and a port number

Endpoints and Ports Endpoint is one end of a connection Some ports are: –Hardware –Software –Network

RPC Short for Remote Procedure Call Popular paradigm for implementing the client/server model of distributed computing Operates over UDP or TCP Client can execute a program on a server Client sends arguments to the server Encodes data by using XDR Protocol

Middleware Software that connects 2 separate applications Called a Conversion or Transition layer 1 st Middleware Product – Teleprocessing Monitor Need for middleware increases as IT becomes more complex Makes application development easier

Client/Server Model Term first used back in the 80’s One of the more important ideas in networking Common example is TCP/IP Client makes a request from the server, then the server sends back the fulfilled request Server is sometimes called a daemon Example – Internet Browser

Security Threats Interception –An unauthorized party that gains access to an asset. –Example: An unauthorized party eavesdropping on what you are doing, but not tampering with anything. Interruption –An asset of a system is destroyed, unavailable or unusable. –Example: An unauthorized party deleting a program so you can not use it.

Security Threats Modification –An unauthorized party gains access as well as tampers with assets. –Example: An unauthorized user modifying files on your computer Fabrication –An unauthorized party inserts fake objects into the system –Example: An unauthorized user adds a new file onto your computer.

Security Mechanisms Encryption  Encryption is the coding or scrambling of information so that it can be decoded and read by someone who has the correct decoding key.  Used to secure Web sites as well as other mediums of data transfer.  If a third party were to intercept the information you sent via an encrypted connection, they would not be able to read it.  Two Types  Symmetric  Requires only one key to encrypt and decrypt  Asymmetric  Requires two keys, one to encrypt and one to decrypt

Security Mechanisms Authentication Authentication is any process by which a system verifies the identity of a user who wishes to access it –Example Credentials (username and password) Authorization Authorization grants users access to different areas on a system based on their identity –Example User groups (Admin, User, Guest etc.)

Security Mechanisms Auditing –An independent review and examination of data processing, system records and activities. –Used to… Test for adequacy of system controls Ensure compliance with established security policy and operational procedures Detect breaches in security Recommend any indicated changes in control, security policy, and procedures

Client-Server Model Example – A client requests a web page from a server, the server then returns the website to the client