Download presentation
Presentation is loading. Please wait.
Published byJoanna Booker Modified over 9 years ago
1
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher August, 2014
2
Lecture 8 Page 2 Advanced Network Security Outline Basics of Internet architecture Routing for the Internet and other networks Naming issues in networks
3
Lecture 8 Page 3 Advanced Network Security Internet Architecture The Internet is a network of networks It connects together different networks –Controlled by different parties –In different geographical locations –Under different legal and political control –Using different underlying technologies
4
Lecture 8 Page 4 Advanced Network Security So the Internet Isn’t Really This
5
Lecture 8 Page 5 Advanced Network Security It’s More Like This Except much, much bigger And much, much more complicated
6
Lecture 8 Page 6 Advanced Network Security High Level Internet Organization Subnetworks are considered to be: –Tier 1 networks –Tier 2 networks –Or tier 3 networks Definitions of tiers slightly imprecise But commonly understood
7
Lecture 8 Page 7 Advanced Network Security Tier 1 Networks All tier 1 networks interconnect directly In essence, the Internet backbone Tier 1 networks mostly move data between each other –Without paying each other per packet or for amount of bandwidth used Until it is moved down to lower tier networks for delivery Examples: AT&T, Sprint, NTT
8
Lecture 8 Page 8 Advanced Network Security Tier 2 Networks ISPs that do some peering, but also pay some other networks for data transit Essentially, large ISPs They connect to some tier 1 networks –And to some tier 3 networks –Perhaps even directly to customers Examples: British Telecom, Comcast
9
Lecture 8 Page 9 Advanced Network Security Tier 3 Networks ISPs that primarily provide direct service to customers They typically connect to one or more tier 2 networks Tend to be highly regional Usually lower bandwidth networks Example: Thang Long Data Center
10
Lecture 8 Page 10 Advanced Network Security How They Fit Together
11
Lecture 8 Page 11 Advanced Network Security Some Basic Internet Policies Valley-free –Once traffic goes up in tiers, it doesn’t go down until you get close to delivery I.e., customer->tier-3->tier-2->tier-1->tier-2->tier-3- >receiver Not customer->tier-3->tier-2->tier-1->tier-2->tier-1->tier2- >tier-3->customer That’s a valley! Prefer customer route, then peer, then provider - Go down before sideways - Go sideways before up Typical policy, not ironclad rule
12
Lecture 8 Page 12 Advanced Network Security Why Should We Care? Security solutions at Internet level must match Internet realities Some parties won’t do certain things –Tier 1 won’t filter packets Others might –Tier 3 might filter packets Don’t design solutions based on unrealistic assumptions
13
Lecture 8 Page 13 Advanced Network Security Autonomous Systems A key organizational concept for the Internet Abbreviated “AS” A subnetwork run by a single organization –Whose machines are tightly connected together Identified by a unique number Often, Internet is viewed as a set of connected ASes
14
Lecture 8 Page 14 Advanced Network Security Internet Routing IP assumes the sites it visits know where to send a packet next Based on forwarding tables –Except for the final destination How to we build and maintain these tables? Routing protocols
15
Lecture 8 Page 15 Advanced Network Security Routing Protocols Internet nodes exchange information about how to reach destinations –Specified by ranges of IP addresses Different routing protocols used in different parts of the Internet Used to create forwarding tables
16
Lecture 8 Page 16 Advanced Network Security Styles of Routing Protocols Link state protocols –Pass around information about state of links Distance vector protocols –Pass around information about how far away things are Path vector protocols –Pass around paths that can reach various places Ad hoc protocols –Search for paths as necessary (typically for mobile scenarios)
17
Lecture 8 Page 17 Advanced Network Security BGP A path vector protocol The core protocol for routing in the Internet backbone Autonomous systems exchange path information Can also be used within an AS
18
Lecture 8 Page 18 Advanced Network Security OSPF and RIP Protocols used within a single network Such as a large company’s network OSPF is a link state protocol RIP is a distance vector protocol Generally only suitable for networks of limited size
19
Lecture 8 Page 19 Advanced Network Security Security Issues for Routing Protocols Largely integrity and availability Generally, routing info is not regarded as secret –Though perhaps some of it should be None of the original protocols include any integrity mechanisms We’ll discuss routing security in detail
20
Lecture 8 Page 20 Advanced Network Security Internet Naming At the low level, IP addresses are the names understood by the Internet But IP addresses are not convenient names for users –No semantic meaning Tying a high level entity to an IP address is limiting So we need other names, as well
21
Lecture 8 Page 21 Advanced Network Security Goals of Standard Internet Naming To tie some high level name to an IP address Generally a name indicating some machine –Or collection of machines working together Not to tie name to a particular data item or user
22
Lecture 8 Page 22 Advanced Network Security Internet Domain Names A string defining a resource on the Internet –Like a web site, mail server, etc. Typically readable by humans Often 1-to-1 connection between domain name and a machine –But not always –Several machines can share domain name –One machine can host several domain names
23
Lecture 8 Page 23 Advanced Network Security A Typical Domain Name lever.cs.ucla.edu My research group’s server at UCLA Its IP address is 131.179.192.136 When a person or program wants to send data there, they use the name When the Internet delivers packets there, it uses the IP address Clearly, we need to translate
24
Lecture 8 Page 24 Advanced Network Security Format of Internet Domain Names The domain name is a string divided into components by dots –lever.cs.ucla.edu A hierarchical organization –Read right to left –So “edu” is the “highest” level in the example Ultimately, translates down to one IP address –Which might be different each time you ask...
25
Lecture 8 Page 25 Advanced Network Security Name Translation in the Internet Can be done many ways But almost always, we use DNS DNS = Domain Name Service A special service to do these translations
26
Lecture 8 Page 26 Advanced Network Security Basics of DNS A hierarchical name resolution system With lots of caching Integrity and availability are big concerns –Secrecy isn’t –Name translations are public info Basic version does not perform any integrity checking We’ll talk about security issues later
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.