Download presentation
Presentation is loading. Please wait.
Published byEthel Holmes Modified over 9 years ago
1
Networking Kevin, Ray, Kelvin, Stephan, Norman, Phil
2
History - ARPANET (Advanced Research Projects Agency Network) - World's first operational packet-switching network - Became the core network of what composes the global Internet - Originally consisted of terminals in UCLA, Standford, UCSB, and the University of Utah
3
History - DoD was concerned about our ability to survive a nuclear strike due to lack of a reliable communications network - Paul Baran and Rand corp. say that most reliable would be a computer network which broke the message into units (packets) and sent them along to the destination
4
Networks As We Know Them Today A collection of computers and devices interconnected by communications channels that facilitate communications among users and allows user to share resources Source: http://en.wikipedia.org/wiki/Computer_netw ork
5
Purposes of a Modern Network Facilitates communications – E-mail, IM’s, chat rooms Sharing hardware – A set of printers to be used by a whole office Sharing data Sharing software – Running programs via a remote connection
6
Outline Kevin – Network Ray – IP'S and Packets Kelvin – Sockets Stephan – Security Norman – Hardware Phil - Conclusion
7
IP addresses And Packets
8
IP’S And Macs NIC has unique Mac address(physical address) IP address is logical IPv4 and IPv6
9
Packets All info on networks travel in packets Data is broken up and sent Each packet can take a different path Allows for best path Put back together when received
10
EXAMPLE
11
Packet structure Fixed length and varying length Three main parts o Header(most important) o Data o Trailer Have error checking
12
Header Contains all information about data being sent – Packet length – Packet number – Destination and origin Every packet contains header Can vary in size
13
Other parts Data section contains the data Trailer identifies end Check sum error checking – All words in the message are XOR – Receiving end performs same operation and includes original XOR – If not all zeros error occurred
14
Sockets
15
What are sockets? - Used for client/server interaction - Mechanism for transfer of data - Socket API is provided by the OS - Interface between applications and networking and transfer protocols
16
How do sockets work? - Server process waits for client - Server accepts and binds client - Server waits for client request - Server replies to request - Close
17
How do sockets work? (Diagram) Link: http://publib.boulder.i bm.com/infocenter/i series/v5r4/topic/rz ab6/rxab6500.gif
18
Accepting connections - Usually threaded to listen on many ports - Client sends a connection request - Server binds the client using IP and port number - Analogous to telephone/ext
19
Transferring Data - Sockets are identified by socket identifier, aka socket number - OS decodes packets to determine socket number, then forwards payload to application - Sockets are bidirectional - Different kinds of sockets use different protocols (TCP/UDP/etc.)
20
Security
21
What is it? Protection Layers of security Administrator privileges
22
How does it work Authentication of user Firewall enforced policies What about worms and viruses? Need IPS or IDS Encryption
23
IPS and IDS Intrusion Detection System(IDS) Network Intrusion Detection System Host-based Intrusion Detection System NIDS HIDS
24
IPS and IDS cont... Intrusion Prevention System(IPS) Improvement of IDS Classifications NIPS – Network-based Intrusion Prevention WIPS – Wireless-based Intrusion Prevention NBA – Network Behavior Analysis HIPS – Host-based Intrusion Prevention
25
Detection Methods Signature-based Detection Statistical Anomaly-Based Detection Stateful Protocol Analysis Detection
26
Hardware
27
Network Interface Card Simply an I/O device Sends and receives data to the network in the form of packets Will do DMA reads/writes directly to/from main memory Can generate headers, but this is usually done by the CPU
28
Network Interface Card After creating the frame or packet, the OS will create a buffer descriptor which will tell where and how large the data is After creating the buffer descriptor, the OS will notify the NIC that it is ready The NIC will then do a DMA read for the descriptor and then for the actual frame The frame is then sent out to the network
29
Network Interface Card OS will also have the NIC keep buffer descriptors pointing to free space in main memory When a frame is received, it will do a DMA write to main memory It will then modify the descriptor to reflect the received data, DMA write it to memory, and notify the OS that a frame is ready
30
Drivers Handles the translation from standard I/O function calls to the hardware’s specific required software in order to run Can run in both kernel and user mode Kernel mode used mainly for speed User mode used mainly for stability
31
Hub Sends all packets to all other systems connected to it High tendency to cause data collisions – Collisions refer to when two or more systems send data over the network, requiring the now- fragmented data to be retransmitted
32
Switch Like a hub, connects multiple systems together to form a new network Operates by forwarding data to specific systems on the network May be able to be piggy-backed, but may also require crossover cables Have unmanaged and managed modes where unmanaged refers to plug-and-play
33
Switch Avoids data collisions by sending data only to its intended destination as a full-duplex machine Keeps track of MAC addresses of each connected system (nodes) in a table
34
Router Connects networks together and forwards traffic between them Most have built-in switches Performs the job of a computer which acts as a gateway (much cheaper than the computer)
35
Router ComputerInternetSwitch Computer RouterInternetSwitch Computer InternetModern Router Computer
36
Conclusion What did we learn?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.