Download presentation
Presentation is loading. Please wait.
Published byRafe Bailey Modified over 8 years ago
1
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 1 Advanced Networking Developed by: Alberto Escudero Pascual, IT +46
2
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 2 Goals To understand “networking” aspects that can affect the overall performance of a wireless network To understand theinteractions between IEEE 802.11 (Physical/Link) and TCP (Transport) To be able to improve the quality of service of a network
3
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 3 Table of Contents Methodology of the unit OSI versus Internet (TCP/IP) PHY/MAC –Media Access Layer, Error Control, MAC and Encryption Network –IP addressing, Error Control, Routing, NAT, IP Tunneling, IPSec Transport –TCP, UDP, Layer 3 Firewalls Application –Proxies, Firewalls++
4
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 4 Methodology Travelling through the protocol 'stack' Bottom-up Focus on 'concepts', not implementation specific Identify 'key' issues that need to be consider in your network design
5
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 5 Methodology This unit is not: Magic A substitute for several weeks training in networking Training in how to implement each of the 'key' aspects that you need to consider
6
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 6 Wireless!
7
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 7 Physical1 Media AccessData link2 Network 3 Transport4 Session5 Presentation6 Application 7 TCP/IPOSILayer OSI versus TCP/IP
8
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 8 Physical layer –Modulation techniques, bit encoding, physical access to shared media –RS-232, V.35, 10BASET, ISDN Link Layer –Addressing/delivering packets on shared channel –Ethernet (IEEE 802.3), PPP, ATM Medium Access Control
9
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 9 IEEE 802.11 (WLAN) –Physical layer and link layer Physical layer protocols –IrDA –Spread Spectrum FHSS, DSSS, OFDM Media Access Layer
10
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 10 CSMA/CD –Aloha, Ethernet CSMA/CD and CSMA/CA IEEE 802.11 (WLAN) –TDD, CSMA/CA (RTS,CTS) IEEE 802.16 (WMAN) –TDMA, DAMA Error Control Protocols
11
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 11 48 bit unique address Hardware coded but can easily be modified MAC as authentication –Low security MAC Addressing
12
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 12 Secure data between hosts on same physical link Encryption algorithm and shared secret Requires trusted intermediate hosts WEP (low security) WPA, WPA-2 Does not provide end-to-end security Link Layer Encryption
13
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 13 Physical1 Media AccessData link2 Network 3 Transport4 Session5 Presentation6 Application 7 TCP/IPOSILayer OSI versus TCP/IP
14
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 14 IP Address –Routing, identify host, firewalling Subnetting –Netmask, classes –Subnetting is crucial –Troubleshooting –Limit to 32-64 hosts per subnet Network Layer (IP)
15
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 15 ICMP –Report problems that prevents delivery (destination unreachable) –Troubleshoot network (ping) –Large amount of ICMP? Viruses and trojans IP Error Control
16
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 16 Source and Destination routing Policy Routing –IP Source as routing decision Load balancing Routing
17
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 17 Shortage of public IP addresses Firewall/DMZ Traffic load balance Computing load balance Network Address Translation
18
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 18 Rewrites IP addresses –Let router act on others behalf Simple firewall security Limits access to outside services for internal hosts Masquerading - SNAT
19
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 19 Make internal services publicly available –Rewriting destination IP Avilability of services Affect routing of packets Redirect web requests Login/registration processes Destination NAT
20
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 20 Encapsulating IP packets inside of IP packets Requires fully routable end-points Provides no added security unless the encapsulated packet is encrypted IP Tunneling
21
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 21 Encapsulation inside of encrypted IP packets is known as: –Secure tunneling or VPN Secure tunneling is normally provided using IPSEC IP Tunneling
22
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 22 Ensures security on IP level Provides following protection: –Confidentiality –Authentication –Integrity Three main protocols: –AH, ESP, IKE IPSEC
23
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 23 –Fully functional firewalls instead of NAT –Use IPSec with compression –Consider Application layer VPN's Check www.openvpn.org IPSEC
24
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 24 Physical1 Media AccessData link2 Network 3 Transport4 Session5 Presentation6 Application 7 TCP/IPOSILayer OSI versus TCP/IP
25
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 25 Transfer of IP packets between processes using ports A port is a logical connection that associate a certain transfer with a running process Transport Layer
26
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 26 Connection-oriented Reliable transport –acknowledgements Flow control –sliding window –window size –congestion avoidance TCP
27
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 27 YesNoConnection establishment YesNoAcknowledgements Most application and protocols Priority of speed, small packets, multicast/broadcast Suitable for Low but higher thatn UDPLowOverhead YesNoRetransmission Sliding window, window size, congestion avoidance NoFlow control Reliable serviceBest effortQoS TCPUDPCharacteristics TCP versus UDP
28
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 28 –TCP brings bad performance in IEEE 802.11 –Scenario 1: lots of low bit rate nodes –Scenario 2: corrupted wireless packets TCP and IEEE 802.11 MAC
29
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 29 Layer 3 Firewalls Block outgoing traffic of type X Block incoming traffic of type Y Forward traffic of type Z –To provide an external service from an internal firewalled host –To provide multiple instances of a service from internal firewalled hosts for the purpose of load balancing
30
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 30 –Crucial in wireless networks –Traffic shaping and monitoring –Detecting, blocking and removing malicious programs that exhaust bandwidth resources Firewall Design
31
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 31 Physical1 Media AccessData link2 Network 3 Transport4 Session5 Presentation6 Application 7 TCP/IPOSILayer OSI versus TCP/IP
32
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 32 Identify and make sure that the sender/receiver is ready for communication Authenticate (sender, receiver, message) Identifiy necessary communication resources Ensure agreements (error recovery, data integrity, privacy) Determine protocol and data syntax at application leve l Application Layer
33
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 33 Prevents: SMTP, POP3 and DNS buffer overflow Webserver attacks based on information in http headers and requests Evil code hidden within SSL tunnels Block applications running at the top of HTTP (Messengering) Internal users to spread sensitive information Application Firewalls
34
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 34 Disadvantages: Reduce performance in network Expensive Overrides personal integrity Missconfiguration Application Firewalls
35
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 35 Anti-virus and Anti-spam –Blocks or tags content –SPAM represents 30-50% of SMTP Web proxy server –Caches frequently requested data in RAM –Caches DNS lookups Application Firewalls
36
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 36 Wise configuration of all protocol layers Good network architecture The goal: –Maximize the useful bits Advanced Wireless Networking Implies
37
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 37 Conclusions Building wireless networks that work is very “easy” Building wireless networks that perform well is not as “simple” Measure, measure, measure... Do not stop trying! Share your experiences with others.
38
Last updated: 24 April 2006 Alberto Escudero Pascual ItrainOnline MMTK www.itrainonline.org 38 Physical1 Media AccessData link2 Network 3 Transport4 Session5 Presentation6 Application 7 VoIPISOLayer Discussion Question: How can we optimised a VoIP wireless network?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.