Presentation is loading. Please wait.

Presentation is loading. Please wait.

Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.

Similar presentations


Presentation on theme: "Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University."— Presentation transcript:

1 Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University July 14- 18, 2014 Supported by National Science Foundation

2 Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU2  Internet: Millions of connected computing devices: End systems / Hosts (Running Net Apps) Communication Links (Wired or Wireless) Routers and Switches (Forward “Packets”) mobile network global ISP regional ISP home network institutional network Overview of Computer Networks

3 Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU3  Network of Networks ISPs Institutional Networks Home Networks Mobile Networks  Internet Protocols: Control Sending & Receiving of Messages E.g.: TCP, IP, HTTP, 802.11 mobile network global ISP regional ISP home network institutional network Overview of Computer Networks

4 What is a Protocol? Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU4  Human Protocol: “What time is it?”, “I have a question.”, …  Network Protocols: Machines instead of humans. Protocols define format and order of messages sent and received among network entities, and actions taken on message transmission and message receipt.

5 What is a Protocol? Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU5  Protocols define the interaction sequences over time: Hi Got the time? 2:00 TCP connection response Get http://www.awl.com/kurose-ross Time TCP connection request

6 Protocol Layers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU6  Networks are complex with many “pieces”: Hosts Routers Wired Links Wireless Links Applications Protocols Hardware Software …

7 Protocol Layers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU7  Networks are complex with many “pieces”: Hosts Routers Wired Links Wireless Links Applications Protocols Hardware Software … Q: How can we organize the structure of networks?

8 Example: Organization of Air Travel Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU8  A series of steps are taken at different “layers” : ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing

9 Example: Organization of Air Travel Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU9  Each layer implements a “service”:  Via its own “internal-layer” actions. ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing ticket baggage gate takeoff/landing airplane routing

10 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU10 Application Transport Network Link Physical There are five layers in Internet Protocol Stack with different functionalities and protocols.

11 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU11  Application: Supporting network apps  FTP, HTTP, SMTP, Skype Application Transport Network Link Physical

12 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU12  Application: Supporting network apps  FTP, HTTP, SMTP, Skype Application Transport Network Link Physical

13 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU13  Application: Supporting network apps  FTP, HTTP, SMTP, Skype Application Transport Network Link Physical

14 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU14  Application: Supporting network apps  FTP, HTTP, SMTP, Skype  Transport: Process-to-process data transfer  TCP, UDP Application Transport Network Link Physical

15 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU15  Application: Supporting network apps  FTP, HTTP, SMTP, Skype  Transport: Process-to-process data transfer  TCP, UDP Application Transport Network Link Physical They all use TCP Protocol for “reliable” data transmission. (Socket Programming) (Each socket has a port #)

16 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU16  Application: Supporting network apps  FTP, HTTP, SMTP, Skype  Transport: Process-to-process data transfer  TCP, UDP  Network: Routing from source to destination  IP, Routing Protocols Application Transport Network Link Physical

17 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU17  Application: Supporting network apps  FTP, HTTP, SMTP, Skype  Transport: Process-to-process data transfer  TCP, UDP  Network: Routing from source to destination  IP, Routing Protocols Application Transport Network Link Physical

18 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU18  Application: Supporting network apps  FTP, HTTP, SMTP, Skype  Transport: Process-to-process data transfer  TCP, UDP  Network: Routing from source to destination  IP, Routing Protocols Application Transport Network Link Physical

19 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU19  Application: Supporting network apps  FTP, HTTP, SMTP, Skype  Transport: Process-to-process data transfer  TCP, UDP  Network: Routing from source to destination  IP, Routing Protocols  Link: Routing from source to destination  Ethernet, IEEE 802.11 (WiFi) Application Transport Network Link Physical

20 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU20  Application: Supporting network apps  FTP, HTTP, SMTP, Skype  Transport: Process-to-process data transfer  TCP, UDP  Network: Routing from source to destination  IP, Routing Protocols  Link: Routing from source to destination  Ethernet, IEEE 802.11 (WiFi) Application Transport Network Link Physical

21 Internet Protocol Stack Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU21  Application: Supporting network apps  FTP, HTTP, SMTP, Skype  Transport: Process-to-process data transfer  TCP, UDP  Network: Routing from source to destination  IP, Routing Protocols  Link: Routing from source to destination  Ethernet, IEEE 802.11 (WiFi)  Physical: Bit-by-bit transmission Application Transport Network Link Physical

22 Packets Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU22  Network communications are essentially 0-1 bit streams:  But we break down bit streams to small bit chunks = packets.  The packet at each layer:  Can have different names (frame, segment, etc.)  Can have different sizes

23 Packets Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU23 Application Transport Network Link Physical Application Transport Network Link Physical Message Segment Datagram Frame

24 Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU24  Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical

25 Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU25  Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Message

26 Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU26  Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Message HTHT Used by TCP and UDP Segment

27 Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU27  Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Message HTHT HNHN Used by IP, Routing Datagram

28 Packet Headers Summer Workshop on Cyber Security July 14 - 18, 2014 – Network Security, UCR & TTU28  Protocol at each layer adds its own “headers” for “control data”. Application Transport Network Link Physical Message HTHT HNHN HLHL Used by Ethernet, … Frame


Download ppt "Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University."

Similar presentations


Ads by Google