Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology

Similar presentations


Presentation on theme: "Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology"— Presentation transcript:

1 Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology rjohari@mit.edu

2 Part I: Routing

3 A Simplified Internet My Computer Router Website

4 A Telephone Network My Telephone Switch Your Telephone

5 The Difference? Telephone NetworksCircuit Switched = Guaranteed service from the network The InternetPacket Switched = No guarantees from the network!

6 Packets From: My Computer To: Website Please send me your home page Data Header All files transmitted on the Internet are first broken into packets.

7 Routing How does a router know where to send a packet?

8 Routing Tables Router A Packet’s Destination Next Router WebsiteRouter B Routing Table Distance to Destination 2 Hops

9 Routing Table Update Router A Router C Website Router C says: “I am 1 hop away from Website.” Router B

10 Routing Table Update Router A Router C Website Router A’s routing table is updated.

11 Routing Table Update Router A Packet’s Destination Next Router WebsiteRouter C Routing Table Distance to Destination 1 Hop

12 Routing KEY POINTS: Routing is:Decentralized Anonymous

13 Part II: TCP and Denial of Service

14 Transmission Control Protocol Internet Protocol (routing) Transmission Control Protocol (reliable end-to-end)

15 Reliable Transmission Sender Receiver No acknowledgement: Sender resends packet 4 Packets 321... Acknowledgements 1 23 4...

16 TCP Examples E-mail upload/download Telnet session FTP file transfer Web page download –one web page download may mean many TCP connections!

17 Setting Up a TCP Connection My Computer 1.2.3.4 Website …as long as you respond to this message. SYN: Can I set up a connection with you? SYN-ACK: Yes, 1.2.3.4...

18 Denial of Service The Website can’t handle the load! What if: 1.1.2.3.4 isn’t my real IP address? (spoofing) No response! 2.I repeat 1 million times per minute? 1 million “half-open” connections!

19 Countermeasures: Filtering 1.Block Incoming SYN requests 2.Check source address on outgoing packets

20 For More Information Vern Paxson, “How to Own the Internet in Your Spare Time:” A discussion of how “worms” gain control of vulnerable computers.

21 Part III: Cryptography

22 Cryptography Cryptography : The art and/or science of encoding data so it can only be decoded by specific individuals.

23 Modern Cryptography Most modern cryptographic algorithms are widely known. The “secret” is the key which drives the algorithm.

24 Modern Cryptography Symmetric Key Cryptography Public Key Cryptography

25 Symmetric Keys: Example Sender’s Message: 6-1-7-4-9-5-7-5-4-7 Encryption: Add a fixed key to each number in a sequence. The Key : 3 Encrypted Message: 9-4-10-7-12-8-10-8-7-10 + Decryption: Subtract key from each number in sequence.

26 Symmetric Keys “Symmetric Keys” means: Both sender and receiver have the same key. An Internet problem: How do customers and websites share keys with each other?

27 Public Keys: Example Receiver says to sender: “Take this open padlock and box.”

28 Public Keys: Example Receiver says to sender: “Take this open padlock and box.” “Put anything you want to send me inside.”

29 Public Keys: Example Receiver says to sender: “Take this open padlock and box. Put anything you want to send me inside. Then close the box, and lock it.”

30 Public Keys: Example Receiver says to sender: “Take this open padlock and box. Put anything you want to send me inside. Then close the box, and lock it.”

31 Public Keys: Example Locking the box is one-way: –It is easy to do, but hard to undo But the receiver has a trap door: –He uses the key to unlock the box

32 On the Internet Customers use a website’s public key to encrypt data. Even though everyone knows the algorithm used, decryption is hard without the receiver’s private key.

33 A Final Note: Secure Sockets Layer (SSL) 1.Use public key encryption to ensure both parties share a symmetric key 2.Use (faster) symmetric key encryption for communication

34 Part IV: Spiders

35 Recursive Retrieval My Computer Web Page

36 Where is the Spider? My Computer Web Page

37 Where is the Spider? My Computer Web Page

38 Where is the Spider? My Computer Web Page

39 The Reality My Computer Web Page THE SPIDER STAYS HERE!


Download ppt "Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology"

Similar presentations


Ads by Google