Top Banner
1 IT Networks - Lecture 2 Mark Gleeson [email protected] (01) 896 2666 5th May 2009 Physical Sciences in Medicine
37

1 IT Networks - Lecture 2 Mark Gleeson [email protected] (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

1

IT Networks - Lecture 2

Mark [email protected]

(01) 896 2666

5th May 2009

Physical Sciences in Medicine

Page 2: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

2

Routing

• Networks are formed of smaller networks joined together

• The question arises of how you communicate where you need to cross numerous networks

• We call the selection of the route to use routing

• Challenges– Potentially many routes to your destination– You can get lost – dead ends, loops– Each packet potentially can take different

route

Page 3: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

3

The Scenario

• Computer A establishes IP address of Computer B• Computer A creates IP packet with address of

Computer B as destination and its own IP address as source

• Routers are responsible to direct packet towards destination

Computer A Computer B

Page 4: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

4

The Scenario

• Best route: Smallest number of hops?

Computer A Computer B

Page 5: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

5

The Scenario

• Best route: – Fastest round-trip time?– Highest Bandwidth?

Computer A Computer B

Page 6: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

6

Routing Basics

• Routing Tables– Creating tables

• Dynamic vs. Static– Maintaining tables

• Periodic vs. Aperiodic

Computer A Computer Bnode1

node2

node3

node1

node2

node3

node1

node2

node3

node6

node5

node7

node1

node2

node3

node8

node3

node5

node1

node2

node3

node3

node8

node5

node1

node2

node3

node3

node4

node5

node1

node2

node3

node1

node2

node3

node1

node2

node3

node1

node2

node3

node1

node2

node3

node1

node2

node3

node1

node2

node3

node1

node2

node3

node1

node2

node3

node1

node2

node3

Page 7: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

7

Structure of the Internet

• Autonomous Systems– e.g. Companies, ISPs, 3rd-level

Institutions

Autonomous Systems

Page 8: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

8

Autonomous Systems

• Stub network– Network that does not forward to other network

• Transit network– Network that forwards traffic between other

networks• Point-to-point link

Stub NetworkTransit

Network Point-to-Point

Page 9: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

9

Yet another Layer ?!?

• Transport Layer – TCP • Why should you care?• Applications use TCP as main

communication mechanism– HTTP– Remote procedure calls (RPC)

• File Transfer

Page 10: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

10

Network Layer vs Transport Layer

Network Layer Transport Layer

•Communication between two nodes

•Communication between processes

•Best effort delivery •Ordered, guaranteed delivery

•Connection-less communication

•Connection-oriented communication

Page 11: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

11

Transport Layer

• Process-to-Process Delivery

Page 12: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

12

IP Addresses & Port Numbers

• IP Addresses determine the host

• Port Numbers determine the application

Page 13: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

13

Communication at Transport Layer

• Comms at Transport Layer from port to port

• IP implementation multiplexes depending on protocol field in IP header

Page 14: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

14

Client-Server Paradigm

Server

Port

80

Port

14430

Port

12420

Client A

Client B

Port

14

Page 15: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

15

Problems

• Connection establishment• Connection termination• Ordered Delivery• Retransmission strategy• Duplication detection• Crash recovery• Flow control

Page 16: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

16

Section 4 - Network Hardware

• Connecting hosts and networks require hardware devices which include..

• Networking and Internetworking Devices– Repeaters– Bridges– Hubs– Switches– Routers– Gateways– Brouters

• Modems• Transmission Media

Page 17: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

17

Networking and Internetworking Devices• These devices can be divided into 3

categories – Repeaters, – Bridges, – Routers and Gateways.

• Repeaters and Bridges are used at the Networking of hosts

• Routers and Gateways are used for Internetworking

Page 18: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

18

Repeaters and Bridges

• Repeaters– Operate at the physical layer. They

regenerate signals. • Bridges

– Operate at the physical and data link layers.

– They are used to divide a network into segments and can control traffic flow and are useful for securing the network.

– They can also regenerate signals.

Page 19: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

19

What is a Switch

• A layer 2 device – Data Link Layer• Builds a table of the MAC addresses of devices

attached on each port• ‘Store and Forward’

– Switch receives a packet– Verifies it is error free– Looks at its destination MAC– Sends the packet on

• ‘Cut Through’– Starts to forward packet once it reads the

destination address– No error checking

• Improved performance

Photo thanks to Cisco Systems

Page 20: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

20

What is a Router

• A layer 3 device – – Works at physical, data link and network layers

e.g. Internet Protocol (IP) level– Is a bridge between a number of distinct networks

• Example your internal network and the internet beyond

• Range from simple devices• ADSL router for home users

– To• Extremely complex enterprise level

• Looks at the destination of each IP packet and determines where it would be sent on for its next hop– Tries to select the best route

Page 21: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

21

Connecting Devices and the OSI Model

Page 22: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

22

Transmission Media

• Transmission Media Characteristics– Bandwidth– Response Time for a request

• Transmission Media Types– Twisted Pair– Coaxial cable- – Fiber Optics– Wireless Media – Radio, Microwaves,

Infrared, Lightwave

Page 23: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

23

Unshielded Twisted-Pair Cable (UTP)• Most common type of cable used in computer

networks• 8 wires forming 4 pairs• Different qualities

– Cat 3 – for 10Mbps– Cat 5 - for 100Mbps– Cat 5e – for 1Gbps

• Most common in current use– Cat 6 – better for 1Gbps may allow 10Gbps

• Best to future proof to avoid pain later• Cables of different types look identical

– Cable type is printed on the side

Page 24: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

24

Fiber Optics

• An optical transmission system has three components– The light source– The transmission medium – The detector.

• A pulse of light indicates a 1, lack of light indicates a 0. • The transmission medium is a unidirectional ultra thin fibre

of glass or plastic• The system would leak light except for the fact that when

a light ray passes from one medium to another it is refracted (bent). The amount of refraction depends on the properties of the two media. The aim is to get the angle of incidence of the light at such a point to make the light refract back into the medium. In the case of a fibre optic cable this means the light is trapped within the cable.

• At the centre of the cable is the glass/plastic core which is surrounded by a glass cladding and then a plastic coating.

Page 25: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

25

Transmission Media Performance

Medium Cost Speed Attenuation EMI Security

UTP Low 1-100Mbps High High Low

STP Moderate 1Mbps-1Gbps High Moderate Low

Coax Moderate 1Mbps-1Gbps Moderate Moderate Low

Optical Fibre

High 10Mbps-10Gbps Low Low High

Radio Moderate 1-54Mbps Low-High High Low

Microwave High 1Mbps- 10Gbps Variable High Moderate

Satellite High 1Mbps- 10Gbps Variable High Moderate

Cellular High 9.6-19.2Kbps Low Moderate Low

Page 26: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

26

Section 6 - Security

• Security Issues

• Virtual Private Networks

• Issues with wireless networks

• Methods of attack

• Risks

Page 27: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

27

Security Issues

• Secrecy– Keeping information out of the hands of

unauthorised users.• Authentication

– Making sure you are talking to the right person.

• Data Integrity control– Making sure the data is correct.

• Security effects each layer in the network design.

Page 28: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

28

No Network Is Secure

• Original Ethernet– Every host on the bus could see and capture every

transmission made• Trivial to recover passwords, web pages you viewed

• The physical network itself cannot be considered to be secure– Wires can be tapped

• Wireless communications available to all within range with a suitable receiver

• Need to trade off the strength of security with the practicality of the measures– Users when faced with a complex process may attempt

to undermine the system• Sharing of passwords• Not logging out

Page 29: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

29

Wireless Networks

• Extremely vulnerable to attack– Anyone with a suitable radio can listen

• IEEE 802.11 originally used a 40 bit WEP key– Wired Equivalent Privacy

• Shared encryption key by all users of the network• Later versions supported a 104 bit key• Proved to be very easy to crack in both versions

• WiFi Protected Access (WPA/WPA2) – Based on 802.11i standard– EAP extensible Authentication Protocol

• Authentication framework not a protocol• Can integrate with existing authentication systems• 802.1x

Page 30: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

30

VPN – Virtual Private Network (1/2)• Best practice in Network Management

is to heavily restrict access to external users or to block it totally– Avoid potential security issues– Protect from hackers

• What of legitimate users– People who work at other locations

Page 31: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

31

VPN – Virtual Private Network (2/2)• Not strictly a security solution• Two implementations

– Connecting you to a remote network– A network within a network, the VLAN

• Allows you to access resources on another network as if you where connected directly

• A secure encrypted tunnel between your computer and others on the same network

• Typically requires a dedicated ‘VPN box’ on the office end network to provide the service

Page 32: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

32

VPN - Connecting you to a remote network

• Ideal for a single user– Work from home, on the road, other

institution• User needs VPN client software

– Setup can be complex for users– Need to implicitly log in to access the

network• Not transparent

– Potential security risk if users computer is breeched• Hacker may have access into network

Page 33: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

33

Methods of Attack (1/3)

• Impersonation– Using someone else’s password or a terminal that is

already logged on.• Active wire-tapping

– Connecting a device(authorised/unauthorised) to a communication link to obtain access to data through the generation of false messages.

• Passive wire-tapping– Monitoring data coming over a communication link.

• Traffic flow analysis– Analysing the frequency of data traffic, seeing which

data is encrypted and which is not.• Eavesdropping

– interception of information

Page 34: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

34

Methods of Attack (2/3)

• Replay– Play back a recording of a communication

• Routing Table modification – Sending messages to the wrong address or multiple

addresses.• Audit Trail Information Modification

– To cover up an attack.• Operational Staff Table Modification

– To change access rights.• Bogus Frame insert

– Inserting bogus information as a frame.• Data Portion Modification

– Modify the data portion of a message.• Viruses

Page 35: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

35

Methods of Attack (3/3)

• Sequencing Information Modification – Change the order of the pieces of information.

• Message Deletion – Removing the message completely

• Protocol Control Information modification – To send data to a different location.

• Misuse of resources – Swamping communication lines – Denial of service

• Interruption of power supply – Denial of service

• Malicious physical damage – Denial of service

• Theft– Parts of computers or entire computers could be stolen.

Confidentiality issues arise.

Page 36: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

36

Virtual Local Area Networks(VLAN)• One physical network can contain many

virtual networks– Simplifies the network– Easier to manage and can be altered in

software without recourse to pulling cables

• The 802.1Q draft standard defines Layer 1 and Layer 2 VLAN's

• Switches and Routers tag packets with a VLAN id (12 bits in length) only

• Each network user sees just one network

Page 37: 1 IT Networks - Lecture 2 Mark Gleeson gleesoma@cs.tcd.ie (01) 896 2666 5th May 2009 Physical Sciences in Medicine.

37

Virtual Local Area Networks

• Can be organised by– Port on switch basis – Layer 1

• E.g. Ports E1-E16 + D18 on LAN 1, E17-E32 on LAN 2

• Good at organisation level, e.g. LAN 1 is one dept/floor

• Bad if users are mobile– Protocol used – Layer 2

• All IP traffic on LAN x, IPX on LAN y– By MAC address – Layer 2

• List of MAC addresses in each VLAN maintained• Good for mobility, plug in anywhere• Significant administrative overhead to maintain list