Download presentation
Presentation is loading. Please wait.
Published byBernadette Rose Modified over 9 years ago
1
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University July 14- 18, 2014 Supported by National Science Foundation
2
Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU2 Internet: Millions of connected computing devices: End systems / Hosts (Running Net Apps) Communication Links (Wired or Wireless) Routers and Switches (Forward “Packets”) mobile network global ISP regional ISP home network institutional network Overview of Computer Networks
3
Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU3 Network of Networks ISPs Institutional Networks Home Networks Mobile Networks Internet Protocols: Control Sending & Receiving of Messages E.g.: TCP, IP, HTTP, 802.11 mobile network global ISP regional ISP home network institutional network Overview of Computer Networks
4
What is a Protocol? Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU4 Human Protocol: “What time is it?”, “I have a question.”, … Network Protocols: Machines instead of humans. Protocols define format and order of messages sent and received among network entities, and actions taken on message transmission and message receipt.
5
What is a Protocol? Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU5 Protocols define the interaction sequences over time: Hi Got the time? 2:00 TCP connection response Get http://www.awl.com/kurose-ross Time TCP connection request
6
Protocol Layers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU6 Networks are complex with many “pieces”: Hosts Routers Wired Links Wireless Links Applications Protocols Hardware Software …
7
Protocol Layers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU7 Networks are complex with many “pieces”: Hosts Routers Wired Links Wireless Links Applications Protocols Hardware Software … Q: How can we organize the structure of networks?
8
Example: Organization of Air Travel Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU8 A series of steps are taken at different “layers” : ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing
9
Example: Organization of Air Travel Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU9 Each layer implements a “service”: Via its own “internal-layer” actions. ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing ticket baggage gate takeoff/landing airplane routing
10
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU10 Application Transport Network Link Physical There are five layers in Internet Protocol Stack with different functionalities and protocols.
11
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU11 Application: Supporting network apps FTP, HTTP, SMTP, Skype Application Transport Network Link Physical
12
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU12 Application: Supporting network apps FTP, HTTP, SMTP, Skype Application Transport Network Link Physical
13
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU13 Application: Supporting network apps FTP, HTTP, SMTP, Skype Application Transport Network Link Physical
14
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU14 Application: Supporting network apps FTP, HTTP, SMTP, Skype Transport: Process-to-process data transfer TCP, UDP Application Transport Network Link Physical
15
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU15 Application: Supporting network apps FTP, HTTP, SMTP, Skype Transport: Process-to-process data transfer TCP, UDP Application Transport Network Link Physical They all use TCP Protocol for “reliable” data transmission. (Socket Programming) (Each socket has a port #)
16
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU16 Application: Supporting network apps FTP, HTTP, SMTP, Skype Transport: Process-to-process data transfer TCP, UDP Network: Routing from source to destination IP, Routing Protocols Application Transport Network Link Physical
17
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU17 Application: Supporting network apps FTP, HTTP, SMTP, Skype Transport: Process-to-process data transfer TCP, UDP Network: Routing from source to destination IP, Routing Protocols Application Transport Network Link Physical
18
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU18 Application: Supporting network apps FTP, HTTP, SMTP, Skype Transport: Process-to-process data transfer TCP, UDP Network: Routing from source to destination IP, Routing Protocols Application Transport Network Link Physical
19
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU19 Application: Supporting network apps FTP, HTTP, SMTP, Skype Transport: Process-to-process data transfer TCP, UDP Network: Routing from source to destination IP, Routing Protocols Link: Routing from source to destination Ethernet, IEEE 802.11 (WiFi) Application Transport Network Link Physical
20
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU20 Application: Supporting network apps FTP, HTTP, SMTP, Skype Transport: Process-to-process data transfer TCP, UDP Network: Routing from source to destination IP, Routing Protocols Link: Routing from source to destination Ethernet, IEEE 802.11 (WiFi) Application Transport Network Link Physical
21
Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU21 Application: Supporting network apps FTP, HTTP, SMTP, Skype Transport: Process-to-process data transfer TCP, UDP Network: Routing from source to destination IP, Routing Protocols Link: Routing from source to destination Ethernet, IEEE 802.11 (WiFi) Physical: Bit-by-bit transmission Application Transport Network Link Physical
22
Packets Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU22 Network communications are essentially 0-1 bit streams: But we break down bit streams to small bit chunks = packets. The packet at each layer: Can have different names (frame, segment, etc.) Can have different sizes
23
Packets Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU23 Application Transport Network Link Physical Application Transport Network Link Physical Message Segment Datagram Frame
24
Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU24 Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical
25
Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU25 Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Message
26
Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU26 Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Message HTHT Used by TCP and UDP Segment
27
Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU27 Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Message HTHT HNHN Used by IP, Routing Datagram
28
Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU28 Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Message HTHT HNHN HLHL Used by Ethernet, … Frame
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.