Download presentation
Presentation is loading. Please wait.
1
Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology rjohari@mit.edu
2
Part I: Routing
3
A Simplified Internet My Computer Router Website
4
A Telephone Network My Telephone Switch Your Telephone
5
The Difference? Telephone NetworksCircuit Switched = Guaranteed service from the network The InternetPacket Switched = No guarantees from the network!
6
Packets From: My Computer To: Website Please send me your home page Data Header All files transmitted on the Internet are first broken into packets.
7
Routing How does a router know where to send a packet?
8
Routing Tables Router A Packet’s Destination Next Router WebsiteRouter B Routing Table Distance to Destination 2 Hops
9
Routing Table Update Router A Router C Website Router C says: “I am 1 hop away from Website.” Router B
10
Routing Table Update Router A Router C Website Router A’s routing table is updated.
11
Routing Table Update Router A Packet’s Destination Next Router WebsiteRouter C Routing Table Distance to Destination 1 Hop
12
Routing KEY POINTS: Routing is:Decentralized Anonymous
13
Part II: TCP and Denial of Service
14
Transmission Control Protocol Internet Protocol (routing) Transmission Control Protocol (reliable end-to-end)
15
Reliable Transmission Sender Receiver No acknowledgement: Sender resends packet 4 Packets 321... Acknowledgements 1 23 4...
16
TCP Examples E-mail upload/download Telnet session FTP file transfer Web page download –one web page download may mean many TCP connections!
17
Setting Up a TCP Connection My Computer 1.2.3.4 Website …as long as you respond to this message. SYN: Can I set up a connection with you? SYN-ACK: Yes, 1.2.3.4...
18
Denial of Service The Website can’t handle the load! What if: 1.1.2.3.4 isn’t my real IP address? (spoofing) No response! 2.I repeat 1 million times per minute? 1 million “half-open” connections!
19
Countermeasures: Filtering 1.Block Incoming SYN requests 2.Check source address on outgoing packets
20
For More Information Vern Paxson, “How to Own the Internet in Your Spare Time:” A discussion of how “worms” gain control of vulnerable computers.
21
Part III: Cryptography
22
Cryptography Cryptography : The art and/or science of encoding data so it can only be decoded by specific individuals.
23
Modern Cryptography Most modern cryptographic algorithms are widely known. The “secret” is the key which drives the algorithm.
24
Modern Cryptography Symmetric Key Cryptography Public Key Cryptography
25
Symmetric Keys: Example Sender’s Message: 6-1-7-4-9-5-7-5-4-7 Encryption: Add a fixed key to each number in a sequence. The Key : 3 Encrypted Message: 9-4-10-7-12-8-10-8-7-10 + Decryption: Subtract key from each number in sequence.
26
Symmetric Keys “Symmetric Keys” means: Both sender and receiver have the same key. An Internet problem: How do customers and websites share keys with each other?
27
Public Keys: Example Receiver says to sender: “Take this open padlock and box.”
28
Public Keys: Example Receiver says to sender: “Take this open padlock and box.” “Put anything you want to send me inside.”
29
Public Keys: Example Receiver says to sender: “Take this open padlock and box. Put anything you want to send me inside. Then close the box, and lock it.”
30
Public Keys: Example Receiver says to sender: “Take this open padlock and box. Put anything you want to send me inside. Then close the box, and lock it.”
31
Public Keys: Example Locking the box is one-way: –It is easy to do, but hard to undo But the receiver has a trap door: –He uses the key to unlock the box
32
On the Internet Customers use a website’s public key to encrypt data. Even though everyone knows the algorithm used, decryption is hard without the receiver’s private key.
33
A Final Note: Secure Sockets Layer (SSL) 1.Use public key encryption to ensure both parties share a symmetric key 2.Use (faster) symmetric key encryption for communication
34
Part IV: Spiders
35
Recursive Retrieval My Computer Web Page
36
Where is the Spider? My Computer Web Page
37
Where is the Spider? My Computer Web Page
38
Where is the Spider? My Computer Web Page
39
The Reality My Computer Web Page THE SPIDER STAYS HERE!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.