SlideShare a Scribd company logo
1 of 51
CIS 3360: Security in Computing
Pre-Knowledge: Internet and Networking
Cliff Zou
Spring 2012
2
Objectives
 Obtain the basic knowledge of computer
networking and the Internet
 Concepts of network applications, Internet
 Basic knowledge of network protocols: TCP/IP
 Reading assignment:
 Wikipiedia tutorials:
 http://en.wikipedia.org/wiki/Internet
 http://en.wikipedia.org/wiki/TCP/IP
 Reference book:
 Computer Networking: A Top Down Approach
Featuring the Internet, 5th edition. Jim Kurose,
Keith Ross, Addison-Wesley, Pearson
Education, 2010
Lecture Materials
Some of these slides are adapted from the
slides copyrighted by
Jim Kurose, Keith Ross
Addison-Wesley, Pearson
Education2010.
Computer Networking: A Top Down
Approach Featuring the Internet, 5th
edition.
3
4
A Little Bit of Internet History
 1961: Kleinrock - queueing theory shows effectiveness of packet-
switching
 1967: ARPAnet conceived by Advanced Research Projects Agency
 1969: First ARPAnet node operational
 1972: 15 nodes in ARPAnet; First e-mail program
 1973: Metcalfe’s PhD thesis proposes Ethernet
 1974: Cerf and Kahn - architecture for interconnecting networks
 1983: deployment of TCP/IP
 1982: smtp e-mail protocol defined
 1983: DNS defined for name-to-IP-address translation
 early 1990s: Web
 Late 1990’s – 2000’s: instant messaging, P2P file sharing; network
security, est. 50 million host, 100 million+ users, backbone links
running at Gbps
5
Cerf and Kahn’s internetworking principles:
 minimalism, autonomy - no internal
changes required to interconnect
networks
 best effort service model
 stateless routers
 decentralized control
define today’s Internet architecture
6
What is the Internet?
Application Application
Network Network
Data Link
Transport Transport
Data Link
Physical
link
Web, Email…
TCP, UDP
IP
Ethernet, cellular
Some Internet applications
 E-mail
 Web
 Instant messaging
 Remote login
 P2P file sharing
 Multi-user network
games
 Streaming stored video
clips
 Internet telephone
 Real-time video
conference
 Massive parallel
computing
8 8
Internet
 Internet: loosely
hierarchical “network of
networks”
 Major Components: Hosts,
Routers, Communication links
 Protocols: for sending,
receiving of msgs
 e.g., TCP, IP, HTTP, FTP, PPP
 Internet standards
 RFC: Request for comments
 IETF: Internet Engineering Task
Force
local ISP
company
network
regional ISP
router workstation
server
mobile
9 9
Internet: Three Components
 End systems (hosts):
millions of connected
computing devices
executing network
applications
 Routers: forwarding packets
(chunks of data)
 Communication links:
Connecting hosts and
routers
 fiber, copper, radio, satellite
 transmission rate =
bandwidth
local ISP
company
network
regional ISP
router
workstation
server
mobile
10
10
Internet Service
 Communication infrastructure enables distributed
applications:
 Web, email, games, e-commerce, file sharing
 Communication services provided to applications:
 Connectionless unreliable
 connection-oriented reliable
11
11
Internet structure: network of networks
 roughly hierarchical
 at center: “tier-1” ISPs (e.g., UUNet, BBN/Genuity, Sprint,
AT&T), national/international coverage
 treat each other as equals
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-1
providers
interconnect
(peer)
privately
NAP
Tier-1 providers
also interconnect
at public network
access points
(NAPs)
12
12
Internet structure: network of networks
 “Tier-2” ISPs: smaller (often regional) ISPs
 Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
NAP
Tier-2 ISP
Tier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
Tier-2 ISP pays
tier-1 ISP for
connectivity to
rest of Internet
 tier-2 ISP is
customer of
tier-1 provider
Tier-2 ISPs
also peer
privately with
each other,
interconnect
at NAP
13
13
Internet structure: network of networks
 “Tier-3” ISPs and local ISPs
 last hop (“access”) network (closest to end systems)
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
NAP
Tier-2 ISP
Tier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
local
ISP Tier 3
ISP
local
ISP
local
ISP
local
ISP
Local and
tier- 3 ISPs
are customers
of
higher tier
ISPs
connecting
them to rest
of Internet
14
14
Internet structure: network of networks
 a packet passes through many networks!
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
NAP
Tier-2 ISP
Tier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
local
ISP Tier 3
ISP
local
ISP
local
ISP
local
ISP
“Real” Internet delays and routes
 What do “real” Internet delay & loss look like?
 Traceroute program: provides delay measurement
from source to router along end-end Internet path
towards destination. For all i:
 sends three packets that will reach router i on path towards
destination
 router i will return packets to sender
 sender times interval between transmission and reply.
3 probes
3 probes
3 probes
“Real” Internet delays and routes
1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms
2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms
3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms
4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms
5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms
6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms
7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms
8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms
9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms
10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms
11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms
12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms
13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms
14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms
15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms
16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms
17 * * *
18 * * *
19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms
traceroute: gaia.cs.umass.edu to www.eurecom.fr
Three delay measurements from
gaia.cs.umass.edu to cs-
gw.cs.umass.edu
* means no response (probe lost, router not replying)
trans-oceanic
link
Under Windows is “tracert”
Traceroute from My Home Computer
Where a Router is Placed?
 There are many public websites provide
IP location service
 www.geobytes.com/iplocator.htm
 http://www.iplocation.net/
 Based on traceroute and IP locator, you
can know the complete routing path of a
connection
 Major reason why many networks block
traceroute traffic
19
Protocol
network protocols:
 all communication activity in Internet governed by
protocols
Protocols define format, order of
messages sent and received among network
entities, and actions taken on message
transmission, receipt
What’s a protocol?
a human protocol and a computer network protocol:
Hi
Hi
Got the
time?
2:00
TCP connection
request
TCP connection
response
Get http://www.awl.com/kurose-ross
<file>
time
22
22
A closer look at network structure:
 network edge:
applications and
hosts
 network core:
 routers
 network of
networks
 Connection:
communication
links
The network edge:
 end systems (hosts):
 run application programs
 e.g. Web, email
 at “edge of network”
 client/server model
 client host requests, receives
service from always-on server
 e.g. Web browser/server; email
client/server
 peer-peer model:
 minimal (or no) use of
dedicated servers
 e.g. Gnutella, KaZaA
Network edge: connection-oriented
service
TCP [ Transmission Control Protocol ]
 reliable, in-order : byte-stream data transfer
 loss: acknowledgements and retransmissions
 flow control:
 sender won’t overwhelm receiver
 congestion control:
 senders “slow down sending rate” when network congested
Examples of applications using TCP:
 HTTP (Web), FTP (file transfer), SSH
(remote secure login), SMTP (email)
Network edge: connectionless service
 UDP [User Datagram Protocol]
 connectionless
 unreliable data transfer
 no flow control
 no congestion control
Examples of applications using UDP:
 streaming media, teleconferencing, DNS, Internet
telephony
The Network Core
 mesh of interconnected
routers
 data transfer methods
through net
 circuit switching:
dedicated circuit per
call: telephone net
 packet-switching:
data sent through
net in discrete
“chunks”
Circuit Switching
End-end resources
reserved for “call”
 call setup required
 link bandwidth, switch
capacity
 dedicated resources: no
sharing
 circuit-like (guaranteed)
performance
Packet-switched networks
 Move packets through routers from source to
destination
 datagram network:
 destination address in packet determines next hop
 routes may change during session
 virtual circuit network:
 each packet carries tag (virtual circuit ID), tag determines next
hop
 fixed path determined at call setup time, remains fixed thru call
 routers maintain per-call state
Internet protocol stack
 application: supporting network
applications
 FTP, SMTP, HTTP
 transport: host-host data transfer
 TCP, UDP
 network: routing of datagrams from
source to destination
 IP, routing protocols
 link: data transfer between neighboring
network elements
 PPP, Ethernet
 physical: bits “on the wire or wireless”
application
transport
network
link
physical
message
segment
datagram
frame
source
application
transport
network
link
physical
Ht
Hn
Hl M
Ht
Hn M
Ht M
M
destination
application
transport
network
link
physical
Ht
Hn
Hl M
Ht
Hn M
Ht M
M
network
link
physical
link
physical
Ht
Hn
Hl M
Ht
Hn M
Ht
Hn
Hl M
Ht
Hn M
Ht
Hn
Hl M Ht
Hn
Hl M
router
switch
Encapsulation
Message Flow
 transport segment from
sending to receiving host
 on sending side
encapsulates segments
into datagrams
 on receiving side, delivers
segments to transport
layer
 network layer protocols in
every host, router
 router examines header
fields in all IP datagrams
passing through it
application
transport
network
data link
physical
application
transport
network
data link
physical
network
data link
physical network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
network
data link
physical
31
TCP/IP
Introduction
32
 TCP  Transport Layer
 IP  Network Layer
 Networking security mainly deals
with these two services/protocols
33
Transport Layer
 TCP - connection-oriented service
 Provide reliable data transmission
 Used by most data-based, not time-sensitive
network applications
 Email, Web, file transfer….
 Require to set up TCP connection channel first
 UDP – connectionless service
 Unreliable data transmission
 Error packets will be discarded without
retransmission
 No additional delay for future incoming packets
 Used for time-sensitive, error-tolerant applications
 VOIP, video streaming, DNS….
34
Transport vs. network layer
 network layer: logical communication between hosts
 transport layer: logical communication between
processes
 relies on, enhances, network layer services
A
B
C
D
Sport:4625
Dport: 80
Sport:8050
Dport: 25
Addressing processes
 to receive messages, process must have identifier
 identifier includes both IP address and port numbers
associated with process on host.
 host device has unique 32-bit IP address
 IP address is for addressing a host/computer
 Example port numbers:
 HTTP server: 80
 Mail server: 25
 to send HTTP message to gaia.cs.umass.edu web
server:
 IP address: 128.119.245.12
 Port number: 80
TCP and UDP Port Numbers
 16 bits (0 – 65535)
 Internet Assigned Numbers Authority
(IANA) www.iana.org
 Well known ports (0 -1023)
 Example: HTTP – 80, SMTP – 25
 Registered ports (1024 – 49151)
 Example: HTTP alternate 8080 used for web
proxy and caching server
 Dynamic and/or private ports: (49152–
65535)
 Each TCP connection is identified by
4-tuple:
 source IP address
 source port number
 dest IP address
 dest port number
 These four values are widely used in
network filtering and intrusion
detection
38
UDP Packet Header
 UDP packet
header is 8
bytes long
 Port number is
16 bits long
 Checksum for
verifying packet
error
39
source port # dest port #
32 bits
Application
data
(message)
UDP segment format
length checksum
Length, in
bytes of UDP
segment,
including
header
UDP Transmission Process
40
Host A
time
Host B
X
 No acknowledgement
from recipient
 Sending rate is
controlled by sender
(bounded by sender’s
bandwidth)
TCP Transmission Process (simplified
without considering piplining)
41
Need sequence # and acknowledge # to
distinguish each packet
TCP segment structure
(Header is 20 bytes normally)
source port # dest port #
32 bits
application
data
(variable length)
sequence number
acknowledgement number
Receive window
Urg data pnter
checksum
F
S
R
P
A
U
head
len
not
used
Options (variable length)
URG: urgent data
(generally not used)
ACK: ACK #
valid
PSH: push data now
RST, SYN, FIN:
connection estab
(setup, teardown
commands)
# bytes
rcvr willing
to accept
counting
by bytes
of data
(not segments!)
Internet
checksum
(as in UDP)
TCP seq. #’s and ACKs
Seq. #’s:
 byte stream “number” of first byte in segment’s data
ACKs:
 seq # of next byte expected from other side
 Cumulative ack ack to receive all bytes until the
specified #
Q: how receiver handles out-of-order segments?
 TCP spec doesn’t say
 Practical approach: save in buffer
Q: How TCP implement duplex communication?
 Seq. # for sending data, Ack# for receiving data
An example of TCP Duplex Communication
Host A Host B
User
host ACKs
receipt, send
back use
password
host ACKs
receipt, echoes
back ‘pass’
time
simple telnet scenario
42
79
Sequence number is
based on bytes, not packets!
ACK Only in Duplex Communication ?
45
host ACKs
receipt, send
back use
password
time
ACK only packet, seq# is the first byte
to be transmitted in the future
(the packet has no data section)
TCP: retransmission scenarios
Host A
time
premature timeout
Host B
Seq=92
timeout
Host A
loss
timeout
lost ACK scenario
Host B
X
time
Seq=92
timeout
SendBase
= 100
SendBase
= 120
SendBase
= 120
Sendbase
= 100
TCP retransmission scenarios
(more)
Host A
loss
timeout
Cumulative ACK scenario
Host B
X
time
SendBase
= 120
Host A
time
premature timeout
Host B
Seq=92
timeout
Seq=92
timeout
SendBase
= 120
SendBase
= 120
Sendbase
= 100
TCP Connection Setup ---
Three-Way Handshaking
Step 1: client host sends TCP SYN
segment to server
 specifies initial seq #
 no data
Step 2: server host receives SYN,
replies with SYN/ACK segment
 server allocates buffers
 specifies server initial seq. #
Step 3: client receives SYN/ACK,
replies with ACK segment, which
may contain data
client server
TCP Connection Setup
 Most firewalls, packet capturing software,
and intrusion detection software use TCP
connection setup packets to determine
how to deal with the new connection
 Very important to understand the three-way
handshake
49
TCP Connection Management (cont.)
Closing a connection:
close();
Step 1: client end system
sends TCP/FIN control
segment to server
Step 2: server receives FIN,
replies with ACK. Closes
connection, sends FIN.
client server
close
close
closed
timed
wait
TCP Connection Management (cont.)
Step 3: client receives FIN,
replies with ACK.
 Enters “timed wait” - will
respond with ACK to
received FINs
Step 4: server, receives ACK.
Connection closed.
client server
closing
closing
closed
timed
wait closed
Some applications simply
send RST to terminate TCP
connections immediately

More Related Content

Similar to preKnowledge-InternetNetworking Android's mobile operating system is based on the Linux kernel and is the world's best-selling Smartphone.ppt

Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksAtif Shahzad
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingMohsen Sarakbi
 
ip net basic understanding slide show ppt
ip net basic understanding slide show pptip net basic understanding slide show ppt
ip net basic understanding slide show pptlolo749806
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batchJaimin Jani
 
1 introduction
1 introduction1 introduction
1 introductiongafurov_x
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUICFarzad Soltani
 
Lecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingLecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingMd. Mashiur Rahman
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture NotesFellowBuddy.com
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1whiz5
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.pptTariq Emad
 

Similar to preKnowledge-InternetNetworking Android's mobile operating system is based on the Linux kernel and is the world's best-selling Smartphone.ppt (20)

Dist 03-4
Dist 03-4Dist 03-4
Dist 03-4
 
class30.ppt
class30.pptclass30.ppt
class30.ppt
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 
Chapter1
Chapter1Chapter1
Chapter1
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
ip-basics.ppt
ip-basics.pptip-basics.ppt
ip-basics.ppt
 
ip net basic understanding slide show ppt
ip net basic understanding slide show pptip net basic understanding slide show ppt
ip net basic understanding slide show ppt
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 
1 introduction
1 introduction1 introduction
1 introduction
 
lis508p02a-10.ppt
lis508p02a-10.pptlis508p02a-10.ppt
lis508p02a-10.ppt
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Lecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingLecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworking
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
1st Talk
1st Talk1st Talk
1st Talk
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1Week 1B.pdf Networking introduction week 1
Week 1B.pdf Networking introduction week 1
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.ppt
 

More from jeronimored

Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical Layerjeronimored
 
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...jeronimored
 
Intel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptIntel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptjeronimored
 
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...jeronimored
 
TelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom ModelTelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom Modeljeronimored
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Managementjeronimored
 
Coding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced ModulationCoding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced Modulationjeronimored
 
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.pptjeronimored
 
A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...jeronimored
 
Erroneous co-routines can block system Formal interfaces slow down system
Erroneous co-routines can block system Formal  interfaces slow down systemErroneous co-routines can block system Formal  interfaces slow down system
Erroneous co-routines can block system Formal interfaces slow down systemjeronimored
 
Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004jeronimored
 
Resource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time SystemsResource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time Systemsjeronimored
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...jeronimored
 
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.jeronimored
 
Network Management Network Management Model
Network Management Network Management ModelNetwork Management Network Management Model
Network Management Network Management Modeljeronimored
 
Saumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona TucsonSaumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona Tucsonjeronimored
 
An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...jeronimored
 
application Fundamentals Android Introduction
application Fundamentals  Android Introductionapplication Fundamentals  Android Introduction
application Fundamentals Android Introductionjeronimored
 
linux-lecture1.ppt
linux-lecture1.pptlinux-lecture1.ppt
linux-lecture1.pptjeronimored
 
5 - System Administration.ppt
5 - System Administration.ppt5 - System Administration.ppt
5 - System Administration.pptjeronimored
 

More from jeronimored (20)

Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical LayerComputer Networks 7.Physical Layer
Computer Networks 7.Physical LayerComputer Networks 7.Physical Layer
 
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...Android – Open source mobile OS developed ny the Open Handset Alliance led by...
Android – Open source mobile OS developed ny the Open Handset Alliance led by...
 
Intel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.pptIntel microprocessor history lec12_x86arch.ppt
Intel microprocessor history lec12_x86arch.ppt
 
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
Intro Ch 01BA business alliance consisting of 47 companies to develop open st...
 
TelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom ModelTelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom Model
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
 
Coding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced ModulationCoding, Information Theory (and Advanced Modulation
Coding, Information Theory (and Advanced Modulation
 
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
 
A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...A microprocessor is the main component of a microcomputer system and is also ...
A microprocessor is the main component of a microcomputer system and is also ...
 
Erroneous co-routines can block system Formal interfaces slow down system
Erroneous co-routines can block system Formal  interfaces slow down systemErroneous co-routines can block system Formal  interfaces slow down system
Erroneous co-routines can block system Formal interfaces slow down system
 
Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004Welcome to Introduction to Algorithms, Spring 2004
Welcome to Introduction to Algorithms, Spring 2004
 
Resource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time SystemsResource Management in (Embedded) Real-Time Systems
Resource Management in (Embedded) Real-Time Systems
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
 
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
MICMicrowave Tubes – klystron, reflex klystron, magnetron and TWT.
 
Network Management Network Management Model
Network Management Network Management ModelNetwork Management Network Management Model
Network Management Network Management Model
 
Saumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona TucsonSaumya Debray The University of Arizona Tucson
Saumya Debray The University of Arizona Tucson
 
An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...An operating system (OS) provides a virtual execution environment on top of h...
An operating system (OS) provides a virtual execution environment on top of h...
 
application Fundamentals Android Introduction
application Fundamentals  Android Introductionapplication Fundamentals  Android Introduction
application Fundamentals Android Introduction
 
linux-lecture1.ppt
linux-lecture1.pptlinux-lecture1.ppt
linux-lecture1.ppt
 
5 - System Administration.ppt
5 - System Administration.ppt5 - System Administration.ppt
5 - System Administration.ppt
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

preKnowledge-InternetNetworking Android's mobile operating system is based on the Linux kernel and is the world's best-selling Smartphone.ppt

  • 1. CIS 3360: Security in Computing Pre-Knowledge: Internet and Networking Cliff Zou Spring 2012
  • 2. 2 Objectives  Obtain the basic knowledge of computer networking and the Internet  Concepts of network applications, Internet  Basic knowledge of network protocols: TCP/IP  Reading assignment:  Wikipiedia tutorials:  http://en.wikipedia.org/wiki/Internet  http://en.wikipedia.org/wiki/TCP/IP  Reference book:  Computer Networking: A Top Down Approach Featuring the Internet, 5th edition. Jim Kurose, Keith Ross, Addison-Wesley, Pearson Education, 2010
  • 3. Lecture Materials Some of these slides are adapted from the slides copyrighted by Jim Kurose, Keith Ross Addison-Wesley, Pearson Education2010. Computer Networking: A Top Down Approach Featuring the Internet, 5th edition. 3
  • 4. 4 A Little Bit of Internet History  1961: Kleinrock - queueing theory shows effectiveness of packet- switching  1967: ARPAnet conceived by Advanced Research Projects Agency  1969: First ARPAnet node operational  1972: 15 nodes in ARPAnet; First e-mail program  1973: Metcalfe’s PhD thesis proposes Ethernet  1974: Cerf and Kahn - architecture for interconnecting networks  1983: deployment of TCP/IP  1982: smtp e-mail protocol defined  1983: DNS defined for name-to-IP-address translation  early 1990s: Web  Late 1990’s – 2000’s: instant messaging, P2P file sharing; network security, est. 50 million host, 100 million+ users, backbone links running at Gbps
  • 5. 5 Cerf and Kahn’s internetworking principles:  minimalism, autonomy - no internal changes required to interconnect networks  best effort service model  stateless routers  decentralized control define today’s Internet architecture
  • 6. 6 What is the Internet? Application Application Network Network Data Link Transport Transport Data Link Physical link Web, Email… TCP, UDP IP Ethernet, cellular
  • 7. Some Internet applications  E-mail  Web  Instant messaging  Remote login  P2P file sharing  Multi-user network games  Streaming stored video clips  Internet telephone  Real-time video conference  Massive parallel computing
  • 8. 8 8 Internet  Internet: loosely hierarchical “network of networks”  Major Components: Hosts, Routers, Communication links  Protocols: for sending, receiving of msgs  e.g., TCP, IP, HTTP, FTP, PPP  Internet standards  RFC: Request for comments  IETF: Internet Engineering Task Force local ISP company network regional ISP router workstation server mobile
  • 9. 9 9 Internet: Three Components  End systems (hosts): millions of connected computing devices executing network applications  Routers: forwarding packets (chunks of data)  Communication links: Connecting hosts and routers  fiber, copper, radio, satellite  transmission rate = bandwidth local ISP company network regional ISP router workstation server mobile
  • 10. 10 10 Internet Service  Communication infrastructure enables distributed applications:  Web, email, games, e-commerce, file sharing  Communication services provided to applications:  Connectionless unreliable  connection-oriented reliable
  • 11. 11 11 Internet structure: network of networks  roughly hierarchical  at center: “tier-1” ISPs (e.g., UUNet, BBN/Genuity, Sprint, AT&T), national/international coverage  treat each other as equals Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-1 providers interconnect (peer) privately NAP Tier-1 providers also interconnect at public network access points (NAPs)
  • 12. 12 12 Internet structure: network of networks  “Tier-2” ISPs: smaller (often regional) ISPs  Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs Tier 1 ISP Tier 1 ISP Tier 1 ISP NAP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP pays tier-1 ISP for connectivity to rest of Internet  tier-2 ISP is customer of tier-1 provider Tier-2 ISPs also peer privately with each other, interconnect at NAP
  • 13. 13 13 Internet structure: network of networks  “Tier-3” ISPs and local ISPs  last hop (“access”) network (closest to end systems) Tier 1 ISP Tier 1 ISP Tier 1 ISP NAP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP Local and tier- 3 ISPs are customers of higher tier ISPs connecting them to rest of Internet
  • 14. 14 14 Internet structure: network of networks  a packet passes through many networks! Tier 1 ISP Tier 1 ISP Tier 1 ISP NAP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP
  • 15. “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from source to router along end-end Internet path towards destination. For all i:  sends three packets that will reach router i on path towards destination  router i will return packets to sender  sender times interval between transmission and reply. 3 probes 3 probes 3 probes
  • 16. “Real” Internet delays and routes 1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms 8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms 16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms traceroute: gaia.cs.umass.edu to www.eurecom.fr Three delay measurements from gaia.cs.umass.edu to cs- gw.cs.umass.edu * means no response (probe lost, router not replying) trans-oceanic link Under Windows is “tracert”
  • 17. Traceroute from My Home Computer
  • 18.
  • 19. Where a Router is Placed?  There are many public websites provide IP location service  www.geobytes.com/iplocator.htm  http://www.iplocation.net/  Based on traceroute and IP locator, you can know the complete routing path of a connection  Major reason why many networks block traceroute traffic 19
  • 20. Protocol network protocols:  all communication activity in Internet governed by protocols Protocols define format, order of messages sent and received among network entities, and actions taken on message transmission, receipt
  • 21. What’s a protocol? a human protocol and a computer network protocol: Hi Hi Got the time? 2:00 TCP connection request TCP connection response Get http://www.awl.com/kurose-ross <file> time
  • 22. 22 22 A closer look at network structure:  network edge: applications and hosts  network core:  routers  network of networks  Connection: communication links
  • 23. The network edge:  end systems (hosts):  run application programs  e.g. Web, email  at “edge of network”  client/server model  client host requests, receives service from always-on server  e.g. Web browser/server; email client/server  peer-peer model:  minimal (or no) use of dedicated servers  e.g. Gnutella, KaZaA
  • 24. Network edge: connection-oriented service TCP [ Transmission Control Protocol ]  reliable, in-order : byte-stream data transfer  loss: acknowledgements and retransmissions  flow control:  sender won’t overwhelm receiver  congestion control:  senders “slow down sending rate” when network congested Examples of applications using TCP:  HTTP (Web), FTP (file transfer), SSH (remote secure login), SMTP (email)
  • 25. Network edge: connectionless service  UDP [User Datagram Protocol]  connectionless  unreliable data transfer  no flow control  no congestion control Examples of applications using UDP:  streaming media, teleconferencing, DNS, Internet telephony
  • 26. The Network Core  mesh of interconnected routers  data transfer methods through net  circuit switching: dedicated circuit per call: telephone net  packet-switching: data sent through net in discrete “chunks”
  • 27. Circuit Switching End-end resources reserved for “call”  call setup required  link bandwidth, switch capacity  dedicated resources: no sharing  circuit-like (guaranteed) performance
  • 28. Packet-switched networks  Move packets through routers from source to destination  datagram network:  destination address in packet determines next hop  routes may change during session  virtual circuit network:  each packet carries tag (virtual circuit ID), tag determines next hop  fixed path determined at call setup time, remains fixed thru call  routers maintain per-call state
  • 29. Internet protocol stack  application: supporting network applications  FTP, SMTP, HTTP  transport: host-host data transfer  TCP, UDP  network: routing of datagrams from source to destination  IP, routing protocols  link: data transfer between neighboring network elements  PPP, Ethernet  physical: bits “on the wire or wireless” application transport network link physical
  • 30. message segment datagram frame source application transport network link physical Ht Hn Hl M Ht Hn M Ht M M destination application transport network link physical Ht Hn Hl M Ht Hn M Ht M M network link physical link physical Ht Hn Hl M Ht Hn M Ht Hn Hl M Ht Hn M Ht Hn Hl M Ht Hn Hl M router switch Encapsulation
  • 31. Message Flow  transport segment from sending to receiving host  on sending side encapsulates segments into datagrams  on receiving side, delivers segments to transport layer  network layer protocols in every host, router  router examines header fields in all IP datagrams passing through it application transport network data link physical application transport network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical 31
  • 33.  TCP  Transport Layer  IP  Network Layer  Networking security mainly deals with these two services/protocols 33
  • 34. Transport Layer  TCP - connection-oriented service  Provide reliable data transmission  Used by most data-based, not time-sensitive network applications  Email, Web, file transfer….  Require to set up TCP connection channel first  UDP – connectionless service  Unreliable data transmission  Error packets will be discarded without retransmission  No additional delay for future incoming packets  Used for time-sensitive, error-tolerant applications  VOIP, video streaming, DNS…. 34
  • 35. Transport vs. network layer  network layer: logical communication between hosts  transport layer: logical communication between processes  relies on, enhances, network layer services A B C D Sport:4625 Dport: 80 Sport:8050 Dport: 25
  • 36. Addressing processes  to receive messages, process must have identifier  identifier includes both IP address and port numbers associated with process on host.  host device has unique 32-bit IP address  IP address is for addressing a host/computer  Example port numbers:  HTTP server: 80  Mail server: 25  to send HTTP message to gaia.cs.umass.edu web server:  IP address: 128.119.245.12  Port number: 80
  • 37. TCP and UDP Port Numbers  16 bits (0 – 65535)  Internet Assigned Numbers Authority (IANA) www.iana.org  Well known ports (0 -1023)  Example: HTTP – 80, SMTP – 25  Registered ports (1024 – 49151)  Example: HTTP alternate 8080 used for web proxy and caching server  Dynamic and/or private ports: (49152– 65535)
  • 38.  Each TCP connection is identified by 4-tuple:  source IP address  source port number  dest IP address  dest port number  These four values are widely used in network filtering and intrusion detection 38
  • 39. UDP Packet Header  UDP packet header is 8 bytes long  Port number is 16 bits long  Checksum for verifying packet error 39 source port # dest port # 32 bits Application data (message) UDP segment format length checksum Length, in bytes of UDP segment, including header
  • 40. UDP Transmission Process 40 Host A time Host B X  No acknowledgement from recipient  Sending rate is controlled by sender (bounded by sender’s bandwidth)
  • 41. TCP Transmission Process (simplified without considering piplining) 41 Need sequence # and acknowledge # to distinguish each packet
  • 42. TCP segment structure (Header is 20 bytes normally) source port # dest port # 32 bits application data (variable length) sequence number acknowledgement number Receive window Urg data pnter checksum F S R P A U head len not used Options (variable length) URG: urgent data (generally not used) ACK: ACK # valid PSH: push data now RST, SYN, FIN: connection estab (setup, teardown commands) # bytes rcvr willing to accept counting by bytes of data (not segments!) Internet checksum (as in UDP)
  • 43. TCP seq. #’s and ACKs Seq. #’s:  byte stream “number” of first byte in segment’s data ACKs:  seq # of next byte expected from other side  Cumulative ack ack to receive all bytes until the specified # Q: how receiver handles out-of-order segments?  TCP spec doesn’t say  Practical approach: save in buffer Q: How TCP implement duplex communication?  Seq. # for sending data, Ack# for receiving data
  • 44. An example of TCP Duplex Communication Host A Host B User host ACKs receipt, send back use password host ACKs receipt, echoes back ‘pass’ time simple telnet scenario 42 79 Sequence number is based on bytes, not packets!
  • 45. ACK Only in Duplex Communication ? 45 host ACKs receipt, send back use password time ACK only packet, seq# is the first byte to be transmitted in the future (the packet has no data section)
  • 46. TCP: retransmission scenarios Host A time premature timeout Host B Seq=92 timeout Host A loss timeout lost ACK scenario Host B X time Seq=92 timeout SendBase = 100 SendBase = 120 SendBase = 120 Sendbase = 100
  • 47. TCP retransmission scenarios (more) Host A loss timeout Cumulative ACK scenario Host B X time SendBase = 120 Host A time premature timeout Host B Seq=92 timeout Seq=92 timeout SendBase = 120 SendBase = 120 Sendbase = 100
  • 48. TCP Connection Setup --- Three-Way Handshaking Step 1: client host sends TCP SYN segment to server  specifies initial seq #  no data Step 2: server host receives SYN, replies with SYN/ACK segment  server allocates buffers  specifies server initial seq. # Step 3: client receives SYN/ACK, replies with ACK segment, which may contain data client server
  • 49. TCP Connection Setup  Most firewalls, packet capturing software, and intrusion detection software use TCP connection setup packets to determine how to deal with the new connection  Very important to understand the three-way handshake 49
  • 50. TCP Connection Management (cont.) Closing a connection: close(); Step 1: client end system sends TCP/FIN control segment to server Step 2: server receives FIN, replies with ACK. Closes connection, sends FIN. client server close close closed timed wait
  • 51. TCP Connection Management (cont.) Step 3: client receives FIN, replies with ACK.  Enters “timed wait” - will respond with ACK to received FINs Step 4: server, receives ACK. Connection closed. client server closing closing closed timed wait closed Some applications simply send RST to terminate TCP connections immediately