SlideShare a Scribd company logo
1 of 44
Internet
MIS 416 – Module II
Spring 2002
Networking and Computer Security
• What is Internet?
• Internet Protocols
• Protocol hierarchies
• The OSI reference model
• Services in the OSI model
Topics
• It is a network of networks
• Any network connected to the internet
– Conform to certain naming conventions
– Must run the IP protocol
– IP protocol is also called Internet dial tone
• Internet has a hierarchical topology
– End Systems connected to local ISPs through access networks
– Access Network examples – LAN, telephone line with a modem, high
speed cable networks
– Local ISPs connected to regional ISPs, regional ISPs connected to
national & international ISPs
– Construction analogous with Lego construction
What is the Internet?
• Allows distributed applications to exchange data with each
other
• Applications include: FTP, Telnet, Mail, WWW, distributed
games, video conferencing
• Provides two kinds of services
– Connection Oriented Service (TCP): Establish connection prior to data
exchange, coupled with reliable data transfer, flow control, congestion
control etc.
– Connectionless Service (UDP): No handshake prior to data exchange,
No acknowledgement of data received, no flow/congestion control
Role of Internet
ISP
ISP
Multi-media
Modem
University
Home
Ethernet
Lan Security
Hosting Platform
Origins of
Online Content
Internet – Information Flow
• Internet is a very complex system
• Set of layers and protocols represents the Network
Architecture.
• Protocols are stacked vertically as series of ‘layers’.
• Each layer has a well defined interface.
– Allows for easy replacement of layer
• Each layer offers Services to layer above, shielding
implementation details.
• Each layer on one machine communicates with
corresponding layer on another machine using
Protocol for the Layer.
Protocol Hierarchies
Layers, Protocols &
Interfaces
Physical communications medium
Layer 1 Layer 1
Layer 1 protocol
Layer 2 Layer 2
Layer 1/2
interface
Layer 1/2
interface
Layer 2 protocol
Layer n protocol
Layer n Layer n
Layer 2/3
interface
Layer n-1/n
interface
Layer 2/3
interface
Layer n-1/n
interface
Layer n/n+1
interface
Layer n/n+1
interface
A protocol defines the format and the order of messages
exchanged between two of more communicating entities
as well as the actions taken on the transmission and/or
receipt of a message or other event.
Protocols
TCP Connection Request
TCP Connection Response
Get http://www.ibm.com/index.html
Index.html
Hi
Hi
Got the Time?
8:50
• Examine the mail system in context of layering and standardized
protocols
– Each letter has a standard format for the address.
Internet Architecture – Simple Analogy
Sender’s Home
Sender’s Mail Box
Sender’s Post Office
Routed
Receiver’s Home
Receiver’s Mail Box
Receiver’s Post Office
Layered Architecture -
Internet
Application Layer
Transport Layer
Network Layer
Link Layer
Physical Network
Application Layer
Transport Layer
Network Layer
Link Layer
Message
Packet (Bridge)
Datagram (Router)
Frame (Hub)
Host A Host B
Port-to-Port
Host-to-Host
Node-to-Node
Http, Ftp, Smtp,
Telnet
TCP, UDP
Ethernet, FDDI
IP
Examples
• Implements application protocol
– Users invoke applications using this protocol
• Application Layer Protocol defines
– Types of messages exchanged e.g. request or
response
– Syntax of the various message types, such as,
fields in the messages and how they are delineated
– Semantics of the fields i.e. meaning of information
in each field
– Rules for determining when and how a process
sends messages and responds to messages
Application Layer
• Different applications use different protocols
– Web Servers/Browsers use HTTP
– File Transfer Utilities use FTP
– Electronic Mail applications use SMTP
– Naming Servers use DNS
• Interacts with transport layer to send messages
– Choose the transport layer protocol
– Fix transport layer parameters, such as,
buffer/segment sizes
Application Layer Protocol
• Socket is the interface between the application layer and the
transport layer
• Two parameter are required for identifying receiving process
– Host machine identifier - IP Address
– Host machine process identifier - Port
Application Layer Protocol
TCP/UDP
with
Buffers
and
Variables
Controlled by
Application
Developer
Controlled by
Operating
System
HOST
Process Process
Controlled by
Operating
System
Controlled by
Application
Developer
HOST
TCP/UDP
with
Buffers
and
Variables
Socket Socket
Internet
• Two types of messages
– HTTP request message
– HTTP response message
Application Layer Example: HTTP
Method sp URL sp Version ctr lf
Header Field Name : Value cr lf
Header Field Name : Value cr lf
cr lf
Message Body
Http Request Message Format
Get /somedir/page.html HTTP/1.1
Connection: close
User-agent: Mozilla
Accept: text/html, image/gif, image/jpeg
Accept-language: fr
(extra carriage return, line feed)
Request
Line
•
•
Header
Lines
Http Request Message Example
• Provides for logical communication between applications
running on different hosts
– Application multiplexing and demultiplexing
• Implemented in the end systems but not in network routers
• On sending side
– Divides stream of application message into smaller units (packets),
– Adds the transport header to each chunk
– Sends message to network layer
• On receiving side
– Takes the header off the message packets
– Reassembles the packets in order
– Sends message to the application layer
• Two internet transport protocols available
– TCP
– UDP
Transport Layer
• TCP (Transmission Control Protocol)
• Connection Oriented Service (requires handshake)
– Duplex
– Simplex
• Reliable Data Transfer
– Guaranteed delivery of packets
• Congestion Control
– Throttles process when network is congested
• No guarantee of a minimum transmission rate
• Suitable for reliability critical/ non time critical applications
– FTP
– SMTP
– Telnet
– HTTP
Internet Transport Protocols:TCP
• Stands for User Datagram Protocol
• Lightweight transport protocol
• Connectionless (no handshake)
• Unreliable data transport service
– No acknowlegements (lost packets not resent)
• Messages may arrive out of order
• No congestion control
– Application can pump as many packets over the socket as it
chooses
• Suitable for loss-tolerant time critical applications
– Audio/Video streaming
– Internet Telephony
Internet Transport Protocols: UDP
• Source / Destination Port Numbers
– Multiplexing / Demultiplexing
• Sequence Number & Acknowledgement
Number
– Congestion Control
• Window size
– Flow control
• Length Field
– Length of TCP header in 32-bit words
• Unused field is currently unused
• Flag Field contains 6 bits
– ACK: shows value in acknowledgement field is
valid
– RST, SYN, FIN bits used for connection setup
and teardown
– PSH bit indicates data should be passed to upper
layer immediately
– URG – indicates that there is data in the
segment which is marked as urgent
• Ptr to urgent data
Points to last byte of the urgent data
• Options field is used when sender and receiver
negotiate the maximum segment size.
Transport Layer Example
Source Port Number Destination Port Number
Sequence Number
Acknowledgement Number
UR
G
AC
K
P
S
H
R
S
T
S
Y
N
F
I
N
Header
Length
Unused Receiver Window Size
Source Port Pointer to Urgent Data
Options
Data
32-bits
GET /directory/dirsearch.html HTTP/1.1
Host: www.phoenix.co.uk
Src: 1081 Dst: 80
Chksum: 0xa858
HTTP Message
TCP header
• Provides communication service between two hosts
– Transports packets from sending host to receiving host
• Encapsulates packets in IP datagram with IP header
• Three primary tasks
• Path Determination
– Determine the route taken by a packet as it flows from sender to receiver
• Switching
– Arriving packet is moved to the appropriate output link
• Call Setup
– Handshake prior to routing packets (required by some network
architectures)
• If addressed to local machine, remove the IP datagram header and
pass up to transport layer.
Network Layer
• Version: IP protocol version
• Header Length
• TOS
– Allows different types of IP datagrams to
be differentiated
• Datagram Length
– Length of data + header
• Identifiers, Flags Fragmentation offset
– Deal with fragmentation
• Time-to-live (TTL)
– Decremented each time a router processes a
datagram Datagram dropped when field is
zero
• Protocol
– Indicates transport level protocol
e.g. 6 indicates TCP, 17 indicates UDP
• Checksum: Used for error checking
• Data – Contains the transport layer segment
Network Layer Example
GET /directory/dirsearch.html HTTP/1.1
Host: www.phoenix.co.uk
Src: 1081 Dst: 80
Chksum: 0xa858
Src: 192.168.0.40
Dst: 192.168.0.50 TTL: 128
HTTP Message
IP datagram header
32-bit destination IP Address
Packet Length (bytes)
Time to Live Headerchecksum
Options (if any)
Data
32-bits
32-bit source IP Address
Version
Header
Length
Type of
Service
16-bit identifier
13-bit Fragm-
entation Offset
Flags
Upper Layer
Protocol
TCP header
• Host identifiers are classified in three categories
– Names: Identify what an object is
– Addresses identify where object is
– Routes identify how to get to the object
• Each host on a TCP/IP internet is assigned a unique 32-bit
internet address that is used in all communications with that host.
– Bits of IP addresses on the same host Provide unique address to each host
– Written as four decimal integers separated by decimal points
– Each integer gies the value of one octet of the IP address
• The 32-bit internet address
– 10000000 00001010 00000010 00011110
– 128.10.2.30
Internet Address
• Each host on a TCP/IP internet is assigned a unique
32-bit internet address that is used in all
communication with that host.
• Conceptually each address is a pair (hostid, netid)
– Netid identifies a network
– Hostid identifies a host on that network
• Since IP addresses encode both a network and a host
on that network, they do not specify individual
computers, but a connection to a network
– A router which connects to n networks will have n addresses
– A multi-homed host will have multiple addresses
TCP/IP – Internet
Addressing
• Class of address assigned depends network size
• Each IP address should be class A, B, or C
– Class A used for more than 216 hosts on network
– Class B used when more than 28 but less than 216 hosts on
network
– Class C used for less than 28 hosts on network
TCP/IP – Classes of IP
Addresses
hostid
hostid
hostid
0
1 1 0
0
netid
0
netid
1
1 netid
1
Multicast address
1
0
1 1 1 Reserved for future use
1
Class A
Class B
Class C
Class D
Class E
8 16 24 31
0
32-bits
• Internet addresses can be used to refer to networks as
well as individual hosts
– An address with all bits of the hostid equal to 0 is reserved
to refer to the network
• IP addresses can be used to specify a broadcast
– Directed broadcasts are used to broadcast messages to target
networks
– A directed broadcast address has a valid netid hostid with all
bits set to 1
– Local network broadcast address is used for broadcast to
local network independent of any host address
– Local broadcast address consists of 32 1’s
TCP/IP – Network & Broadcast
Addresses
• A field consisting of zeros means this
– IP address with all hostid fields 0 means this host
– A netid of 0 means the current
• 127.0.0.0 is the loop back address and used primarily for testing
TCP/IP as well as for inter-process comm.
• Dotted Decimal Notation is used to represent IP addresses
– IP addresses are written as four decimal integers separated by decimal
points
– Each integer gives the value of one octet of the IP address
– 10000000 00001010 00000010 00011110  128.10.2.30
TCP/IP – Network & Broadcast Addresses
contd.
Footnotes:
1 Allowed only at system startup and is never a valid destination address.
2 Never a valid source address.
3 Should never appear on a network.
TCP/IP – Summary of
Exceptions
all 0s
all l s
all 0s host
net all 1s
127 Anything (often 1)
This host1
Host on this net1
Limited broadcast (local net)2
Directed broadcast for net2
Loopback3
• Inadequate to respond to the fast growth of networks
– Immense administrative overhead to manage network
addresses
– Routing tables in routers extremely large causing large
overheads when routers exchange routing table information
– Address space of networks will be eventually exhausted
(Already short of class B addresses)
• Original scheme modified to allow sharing of network
addresses
– Transparent Routers
– ARP
– Standard IP Subnets
Problems with conventional IP
Addressing
• Allows multiple networks to share the same network address
• The IP address is redefined such that
– The network id is left intact
– The host id portion is split into subnetwork id and hostid
• TCP/IP subnet standard permits subnet interpretation to be
chosen independently ofr each physical network.
• Once a subnet partition is selected the all machines on the
network must honour it.
Standard IP Subnets
host id
0 netid
1
Original Scheme
host id
0 Netid (Internet)
1
Subnet Scheme Netid (Local)
• Allows multiple networks to share the same network address
Subnets – Hierarchical Addressing
R1
R3
R2
R5
R4
To the internet
Network 1
Network 2 Network 3
Network 4 Network 5
• Sites that use subnet addressing must also choose a 32-bit
subnet mask for each network.
– Bits for network identifier are set to 1
– Bits for the host identifier are set to 0
• For a class B address if the third octet is used for local netid
– Subnet Mask  11111111 11111111 11111111 00000000
• Dotted Decimal Notation is also popular for subnet masks
– {<network number>, <subnet number>, <host number>}
– e.g. 128.10.6.62
Subnet Masks - Representation
• Transfers network layer datagrams over a link
from node to node
– A node is a router or a host
– A link is the communication path along two nodes
• Link Layer protocol defines the format of the
packets exchanged between the nodes
• The packets exchanged by link layer are called
frames
– Each frame typically encapsulates one datagram
– e.g. Ethernet, token ring, FDDI, PPP
Link Layer
• Framing and Link Access
• Reliable delivery
• Flow Control
• Error Detection
• Error Correction
• Two types of services are provided
– Half-Duplex and Full-Duplex
• Implemented in adapters commonly called Network Interface
Cards (NIC)
Link Layer - Services
IP Module Frame IP Module
Frame
Transmitting
Adapter
Receiving
Adapter
Sending
Node
Reveiving
Node
Communication Link
• Ethernet is the dominant protocol in the LAN market
– Primary factors are cost and complexity
• Many topologies of Ethernet
– Bus Topology
– Star Topology
• Supports multiple medium
– Coaxial Cable
– Copper Wire
– Fiber Optic
• Can transmit data at different rates
– 10Mbps, 100Mbps, 1Gbps
Link Layer Example - Ethernet
Data  Contains the IP datagram
Destination Address  LAN address of destination adapter
Source Address  LAN address of source adapter
Type  Permits Ethernet to multiplex network-layer
protocols (allow different protocols)
CRC (Cyclic Redundancy Check) Allow receiving adapter to detect whether
errors have crept into the frame
Link Layer Example - Ethernet
Preamble
Dest.
Address
Source
Address
Type Data CRC
• Accepts IP datagrams and transmits over
specific networks.
• Maybe a simple device driver (e.g. an Ethernet
driver) or a complex subsystem with further
data link protocols.
Physical Layer
Layered Architecture -
WWW
Application Layer
Transport Layer
Internet Layer
Network Layer
Physical Network
Application Layer
Transport Layer
Internet Layer
Network Layer
HTTP Message
TCP Packet
IP Datagram
Ethernet Frame
Web Browser Web Server
• The data may be routed via numerous
nodes called routers
Routing
Web Browser
Web Server
Router
Network
A
Network
B
Protocol Layering - Routing
Application Layer
Transport Layer
Network Layer
Link Layer
Physical Network
Application Layer
Transport Layer
Network Layer
Link Layer
Message
Packet
Frame Frame
Datagram Datagram
Network Layer
Link Layer
Physical Network
Host B
Host A
Router
• Determining the path that the packets should take in
going from one host to another is called routing
• A graph can be used to represent a network
– The nodes correspond to the physical nodes and the edges
correspond to the node connections
Routing
A
D
B C
F
E
1
2
2 3
1
1
2
5
3
• A the heart of the routing is the routing algorithm
• There are two kinds of routing algorithms
– A global routing algorithm uses the knowledge of the entire
network while making selection
– A decentralized algorithm calculates the least cost path in
an iterative distributed manner
• The routing algorithms can also be classified as
– Static: Routes change very slowly over time usually via
manual intervention
– Dynamic: Change routing paths as network traffic loads or
the topology changes
Routing Algorithms
• Only two types of algorithms typically used on
the Internet
– A dynamic global link state algorithm
– A dynamic decentralized distance vector algorithm
Routing Algorithms
• Switch is a generic term for a device that switches data
(packets or frames)
• Hub is link layer switch (node to node)
– Operates on ethernet frames
– L2 switch
– Uses physical addresses (mac addresses)
• Bridge connects two LANS or two segments of the
same LAN
– Protocol Independent
– Operates on ethernet frames
– L2 switch
– Uses physical addresses (mac addresses)
Hub, Switch and Router
• Router is network layer switch (host to host)
– Also called L3 switch
– Uses network addresses
– Operates on packets
• Gateway is a generic term for an
internetworking system
– Can be implemented in software and/or hardware
– Can operate at any level of the OSI model from
application protocols to low-level signaling.
• http://pcwebopedia.com
Hub, Switch and Router
• In TCP/IP any machine on the same network can be
contacted directly, but machines on another network
must be contacted through a router or gateway.
• Router is a specific device (software or hardware) that
forwards a transmission from a local network to other
networks.
• Since the router is another device on the network, it
needs to have its own internal IP address that the
computers can contact.
Routers

More Related Content

Similar to networking and computer security prasantation

Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdfhelloraja
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdfhelloraja
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
tcp ip protocols.ppt
tcp ip protocols.ppttcp ip protocols.ppt
tcp ip protocols.pptssuser3acfba
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
chapter07 - The Internet.pdf
chapter07 - The Internet.pdfchapter07 - The Internet.pdf
chapter07 - The Internet.pdfsatonaka3
 
Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptKristopher Hefner
 
TCP-IP NETWORKING FOR WIRELESS SYSTEMS
TCP-IP NETWORKING FOR WIRELESS SYSTEMS TCP-IP NETWORKING FOR WIRELESS SYSTEMS
TCP-IP NETWORKING FOR WIRELESS SYSTEMS BuddiesSairamit
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internatKritika Purohit
 
Comptia Security + Chapter 1 501
Comptia Security           + Chapter 1 501Comptia Security           + Chapter 1 501
Comptia Security + Chapter 1 501AbdulalimBhnsawy
 

Similar to networking and computer security prasantation (20)

tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
tcp ip protocols.ppt
tcp ip protocols.ppttcp ip protocols.ppt
tcp ip protocols.ppt
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
chapter07 - The Internet.pdf
chapter07 - The Internet.pdfchapter07 - The Internet.pdf
chapter07 - The Internet.pdf
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7
 
Dist 03-4
Dist 03-4Dist 03-4
Dist 03-4
 
Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.ppt
 
TCP-IP NETWORKING FOR WIRELESS SYSTEMS
TCP-IP NETWORKING FOR WIRELESS SYSTEMS TCP-IP NETWORKING FOR WIRELESS SYSTEMS
TCP-IP NETWORKING FOR WIRELESS SYSTEMS
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
 
Comptia Security + Chapter 1 501
Comptia Security           + Chapter 1 501Comptia Security           + Chapter 1 501
Comptia Security + Chapter 1 501
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

Recently uploaded

Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 

Recently uploaded (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 

networking and computer security prasantation

  • 1. Internet MIS 416 – Module II Spring 2002 Networking and Computer Security
  • 2. • What is Internet? • Internet Protocols • Protocol hierarchies • The OSI reference model • Services in the OSI model Topics
  • 3. • It is a network of networks • Any network connected to the internet – Conform to certain naming conventions – Must run the IP protocol – IP protocol is also called Internet dial tone • Internet has a hierarchical topology – End Systems connected to local ISPs through access networks – Access Network examples – LAN, telephone line with a modem, high speed cable networks – Local ISPs connected to regional ISPs, regional ISPs connected to national & international ISPs – Construction analogous with Lego construction What is the Internet?
  • 4. • Allows distributed applications to exchange data with each other • Applications include: FTP, Telnet, Mail, WWW, distributed games, video conferencing • Provides two kinds of services – Connection Oriented Service (TCP): Establish connection prior to data exchange, coupled with reliable data transfer, flow control, congestion control etc. – Connectionless Service (UDP): No handshake prior to data exchange, No acknowledgement of data received, no flow/congestion control Role of Internet
  • 6. • Internet is a very complex system • Set of layers and protocols represents the Network Architecture. • Protocols are stacked vertically as series of ‘layers’. • Each layer has a well defined interface. – Allows for easy replacement of layer • Each layer offers Services to layer above, shielding implementation details. • Each layer on one machine communicates with corresponding layer on another machine using Protocol for the Layer. Protocol Hierarchies
  • 7. Layers, Protocols & Interfaces Physical communications medium Layer 1 Layer 1 Layer 1 protocol Layer 2 Layer 2 Layer 1/2 interface Layer 1/2 interface Layer 2 protocol Layer n protocol Layer n Layer n Layer 2/3 interface Layer n-1/n interface Layer 2/3 interface Layer n-1/n interface Layer n/n+1 interface Layer n/n+1 interface
  • 8. A protocol defines the format and the order of messages exchanged between two of more communicating entities as well as the actions taken on the transmission and/or receipt of a message or other event. Protocols TCP Connection Request TCP Connection Response Get http://www.ibm.com/index.html Index.html Hi Hi Got the Time? 8:50
  • 9. • Examine the mail system in context of layering and standardized protocols – Each letter has a standard format for the address. Internet Architecture – Simple Analogy Sender’s Home Sender’s Mail Box Sender’s Post Office Routed Receiver’s Home Receiver’s Mail Box Receiver’s Post Office
  • 10. Layered Architecture - Internet Application Layer Transport Layer Network Layer Link Layer Physical Network Application Layer Transport Layer Network Layer Link Layer Message Packet (Bridge) Datagram (Router) Frame (Hub) Host A Host B Port-to-Port Host-to-Host Node-to-Node Http, Ftp, Smtp, Telnet TCP, UDP Ethernet, FDDI IP Examples
  • 11. • Implements application protocol – Users invoke applications using this protocol • Application Layer Protocol defines – Types of messages exchanged e.g. request or response – Syntax of the various message types, such as, fields in the messages and how they are delineated – Semantics of the fields i.e. meaning of information in each field – Rules for determining when and how a process sends messages and responds to messages Application Layer
  • 12. • Different applications use different protocols – Web Servers/Browsers use HTTP – File Transfer Utilities use FTP – Electronic Mail applications use SMTP – Naming Servers use DNS • Interacts with transport layer to send messages – Choose the transport layer protocol – Fix transport layer parameters, such as, buffer/segment sizes Application Layer Protocol
  • 13. • Socket is the interface between the application layer and the transport layer • Two parameter are required for identifying receiving process – Host machine identifier - IP Address – Host machine process identifier - Port Application Layer Protocol TCP/UDP with Buffers and Variables Controlled by Application Developer Controlled by Operating System HOST Process Process Controlled by Operating System Controlled by Application Developer HOST TCP/UDP with Buffers and Variables Socket Socket Internet
  • 14. • Two types of messages – HTTP request message – HTTP response message Application Layer Example: HTTP Method sp URL sp Version ctr lf Header Field Name : Value cr lf Header Field Name : Value cr lf cr lf Message Body Http Request Message Format Get /somedir/page.html HTTP/1.1 Connection: close User-agent: Mozilla Accept: text/html, image/gif, image/jpeg Accept-language: fr (extra carriage return, line feed) Request Line • • Header Lines Http Request Message Example
  • 15. • Provides for logical communication between applications running on different hosts – Application multiplexing and demultiplexing • Implemented in the end systems but not in network routers • On sending side – Divides stream of application message into smaller units (packets), – Adds the transport header to each chunk – Sends message to network layer • On receiving side – Takes the header off the message packets – Reassembles the packets in order – Sends message to the application layer • Two internet transport protocols available – TCP – UDP Transport Layer
  • 16. • TCP (Transmission Control Protocol) • Connection Oriented Service (requires handshake) – Duplex – Simplex • Reliable Data Transfer – Guaranteed delivery of packets • Congestion Control – Throttles process when network is congested • No guarantee of a minimum transmission rate • Suitable for reliability critical/ non time critical applications – FTP – SMTP – Telnet – HTTP Internet Transport Protocols:TCP
  • 17. • Stands for User Datagram Protocol • Lightweight transport protocol • Connectionless (no handshake) • Unreliable data transport service – No acknowlegements (lost packets not resent) • Messages may arrive out of order • No congestion control – Application can pump as many packets over the socket as it chooses • Suitable for loss-tolerant time critical applications – Audio/Video streaming – Internet Telephony Internet Transport Protocols: UDP
  • 18. • Source / Destination Port Numbers – Multiplexing / Demultiplexing • Sequence Number & Acknowledgement Number – Congestion Control • Window size – Flow control • Length Field – Length of TCP header in 32-bit words • Unused field is currently unused • Flag Field contains 6 bits – ACK: shows value in acknowledgement field is valid – RST, SYN, FIN bits used for connection setup and teardown – PSH bit indicates data should be passed to upper layer immediately – URG – indicates that there is data in the segment which is marked as urgent • Ptr to urgent data Points to last byte of the urgent data • Options field is used when sender and receiver negotiate the maximum segment size. Transport Layer Example Source Port Number Destination Port Number Sequence Number Acknowledgement Number UR G AC K P S H R S T S Y N F I N Header Length Unused Receiver Window Size Source Port Pointer to Urgent Data Options Data 32-bits GET /directory/dirsearch.html HTTP/1.1 Host: www.phoenix.co.uk Src: 1081 Dst: 80 Chksum: 0xa858 HTTP Message TCP header
  • 19. • Provides communication service between two hosts – Transports packets from sending host to receiving host • Encapsulates packets in IP datagram with IP header • Three primary tasks • Path Determination – Determine the route taken by a packet as it flows from sender to receiver • Switching – Arriving packet is moved to the appropriate output link • Call Setup – Handshake prior to routing packets (required by some network architectures) • If addressed to local machine, remove the IP datagram header and pass up to transport layer. Network Layer
  • 20. • Version: IP protocol version • Header Length • TOS – Allows different types of IP datagrams to be differentiated • Datagram Length – Length of data + header • Identifiers, Flags Fragmentation offset – Deal with fragmentation • Time-to-live (TTL) – Decremented each time a router processes a datagram Datagram dropped when field is zero • Protocol – Indicates transport level protocol e.g. 6 indicates TCP, 17 indicates UDP • Checksum: Used for error checking • Data – Contains the transport layer segment Network Layer Example GET /directory/dirsearch.html HTTP/1.1 Host: www.phoenix.co.uk Src: 1081 Dst: 80 Chksum: 0xa858 Src: 192.168.0.40 Dst: 192.168.0.50 TTL: 128 HTTP Message IP datagram header 32-bit destination IP Address Packet Length (bytes) Time to Live Headerchecksum Options (if any) Data 32-bits 32-bit source IP Address Version Header Length Type of Service 16-bit identifier 13-bit Fragm- entation Offset Flags Upper Layer Protocol TCP header
  • 21. • Host identifiers are classified in three categories – Names: Identify what an object is – Addresses identify where object is – Routes identify how to get to the object • Each host on a TCP/IP internet is assigned a unique 32-bit internet address that is used in all communications with that host. – Bits of IP addresses on the same host Provide unique address to each host – Written as four decimal integers separated by decimal points – Each integer gies the value of one octet of the IP address • The 32-bit internet address – 10000000 00001010 00000010 00011110 – 128.10.2.30 Internet Address
  • 22. • Each host on a TCP/IP internet is assigned a unique 32-bit internet address that is used in all communication with that host. • Conceptually each address is a pair (hostid, netid) – Netid identifies a network – Hostid identifies a host on that network • Since IP addresses encode both a network and a host on that network, they do not specify individual computers, but a connection to a network – A router which connects to n networks will have n addresses – A multi-homed host will have multiple addresses TCP/IP – Internet Addressing
  • 23. • Class of address assigned depends network size • Each IP address should be class A, B, or C – Class A used for more than 216 hosts on network – Class B used when more than 28 but less than 216 hosts on network – Class C used for less than 28 hosts on network TCP/IP – Classes of IP Addresses hostid hostid hostid 0 1 1 0 0 netid 0 netid 1 1 netid 1 Multicast address 1 0 1 1 1 Reserved for future use 1 Class A Class B Class C Class D Class E 8 16 24 31 0 32-bits
  • 24. • Internet addresses can be used to refer to networks as well as individual hosts – An address with all bits of the hostid equal to 0 is reserved to refer to the network • IP addresses can be used to specify a broadcast – Directed broadcasts are used to broadcast messages to target networks – A directed broadcast address has a valid netid hostid with all bits set to 1 – Local network broadcast address is used for broadcast to local network independent of any host address – Local broadcast address consists of 32 1’s TCP/IP – Network & Broadcast Addresses
  • 25. • A field consisting of zeros means this – IP address with all hostid fields 0 means this host – A netid of 0 means the current • 127.0.0.0 is the loop back address and used primarily for testing TCP/IP as well as for inter-process comm. • Dotted Decimal Notation is used to represent IP addresses – IP addresses are written as four decimal integers separated by decimal points – Each integer gives the value of one octet of the IP address – 10000000 00001010 00000010 00011110  128.10.2.30 TCP/IP – Network & Broadcast Addresses contd.
  • 26. Footnotes: 1 Allowed only at system startup and is never a valid destination address. 2 Never a valid source address. 3 Should never appear on a network. TCP/IP – Summary of Exceptions all 0s all l s all 0s host net all 1s 127 Anything (often 1) This host1 Host on this net1 Limited broadcast (local net)2 Directed broadcast for net2 Loopback3
  • 27. • Inadequate to respond to the fast growth of networks – Immense administrative overhead to manage network addresses – Routing tables in routers extremely large causing large overheads when routers exchange routing table information – Address space of networks will be eventually exhausted (Already short of class B addresses) • Original scheme modified to allow sharing of network addresses – Transparent Routers – ARP – Standard IP Subnets Problems with conventional IP Addressing
  • 28. • Allows multiple networks to share the same network address • The IP address is redefined such that – The network id is left intact – The host id portion is split into subnetwork id and hostid • TCP/IP subnet standard permits subnet interpretation to be chosen independently ofr each physical network. • Once a subnet partition is selected the all machines on the network must honour it. Standard IP Subnets host id 0 netid 1 Original Scheme host id 0 Netid (Internet) 1 Subnet Scheme Netid (Local)
  • 29. • Allows multiple networks to share the same network address Subnets – Hierarchical Addressing R1 R3 R2 R5 R4 To the internet Network 1 Network 2 Network 3 Network 4 Network 5
  • 30. • Sites that use subnet addressing must also choose a 32-bit subnet mask for each network. – Bits for network identifier are set to 1 – Bits for the host identifier are set to 0 • For a class B address if the third octet is used for local netid – Subnet Mask  11111111 11111111 11111111 00000000 • Dotted Decimal Notation is also popular for subnet masks – {<network number>, <subnet number>, <host number>} – e.g. 128.10.6.62 Subnet Masks - Representation
  • 31. • Transfers network layer datagrams over a link from node to node – A node is a router or a host – A link is the communication path along two nodes • Link Layer protocol defines the format of the packets exchanged between the nodes • The packets exchanged by link layer are called frames – Each frame typically encapsulates one datagram – e.g. Ethernet, token ring, FDDI, PPP Link Layer
  • 32. • Framing and Link Access • Reliable delivery • Flow Control • Error Detection • Error Correction • Two types of services are provided – Half-Duplex and Full-Duplex • Implemented in adapters commonly called Network Interface Cards (NIC) Link Layer - Services IP Module Frame IP Module Frame Transmitting Adapter Receiving Adapter Sending Node Reveiving Node Communication Link
  • 33. • Ethernet is the dominant protocol in the LAN market – Primary factors are cost and complexity • Many topologies of Ethernet – Bus Topology – Star Topology • Supports multiple medium – Coaxial Cable – Copper Wire – Fiber Optic • Can transmit data at different rates – 10Mbps, 100Mbps, 1Gbps Link Layer Example - Ethernet
  • 34. Data  Contains the IP datagram Destination Address  LAN address of destination adapter Source Address  LAN address of source adapter Type  Permits Ethernet to multiplex network-layer protocols (allow different protocols) CRC (Cyclic Redundancy Check) Allow receiving adapter to detect whether errors have crept into the frame Link Layer Example - Ethernet Preamble Dest. Address Source Address Type Data CRC
  • 35. • Accepts IP datagrams and transmits over specific networks. • Maybe a simple device driver (e.g. an Ethernet driver) or a complex subsystem with further data link protocols. Physical Layer
  • 36. Layered Architecture - WWW Application Layer Transport Layer Internet Layer Network Layer Physical Network Application Layer Transport Layer Internet Layer Network Layer HTTP Message TCP Packet IP Datagram Ethernet Frame Web Browser Web Server
  • 37. • The data may be routed via numerous nodes called routers Routing Web Browser Web Server Router Network A Network B
  • 38. Protocol Layering - Routing Application Layer Transport Layer Network Layer Link Layer Physical Network Application Layer Transport Layer Network Layer Link Layer Message Packet Frame Frame Datagram Datagram Network Layer Link Layer Physical Network Host B Host A Router
  • 39. • Determining the path that the packets should take in going from one host to another is called routing • A graph can be used to represent a network – The nodes correspond to the physical nodes and the edges correspond to the node connections Routing A D B C F E 1 2 2 3 1 1 2 5 3
  • 40. • A the heart of the routing is the routing algorithm • There are two kinds of routing algorithms – A global routing algorithm uses the knowledge of the entire network while making selection – A decentralized algorithm calculates the least cost path in an iterative distributed manner • The routing algorithms can also be classified as – Static: Routes change very slowly over time usually via manual intervention – Dynamic: Change routing paths as network traffic loads or the topology changes Routing Algorithms
  • 41. • Only two types of algorithms typically used on the Internet – A dynamic global link state algorithm – A dynamic decentralized distance vector algorithm Routing Algorithms
  • 42. • Switch is a generic term for a device that switches data (packets or frames) • Hub is link layer switch (node to node) – Operates on ethernet frames – L2 switch – Uses physical addresses (mac addresses) • Bridge connects two LANS or two segments of the same LAN – Protocol Independent – Operates on ethernet frames – L2 switch – Uses physical addresses (mac addresses) Hub, Switch and Router
  • 43. • Router is network layer switch (host to host) – Also called L3 switch – Uses network addresses – Operates on packets • Gateway is a generic term for an internetworking system – Can be implemented in software and/or hardware – Can operate at any level of the OSI model from application protocols to low-level signaling. • http://pcwebopedia.com Hub, Switch and Router
  • 44. • In TCP/IP any machine on the same network can be contacted directly, but machines on another network must be contacted through a router or gateway. • Router is a specific device (software or hardware) that forwards a transmission from a local network to other networks. • Since the router is another device on the network, it needs to have its own internal IP address that the computers can contact. Routers